Title: Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles, Author: Mark Buckwell
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: Network Security Through Data Analysis: From Data to Action, Author: Michael Collins
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Understanding Cybersecurity: Emerging Governance and Strategy, Author: Gary Schaub
Title: Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network, Author: Stephen Watkins
Title: Integrating ISA Server 2006 with Microsoft Exchange 2007, Author: Fergus Strachan
Title: Stealing The Network: How to Own the Box, Author: Syngress
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: Firewall Policies and VPN Configurations, Author: Syngress
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Ethereal Packet Sniffing, Author: Syngress
Title: Cyber Strategy: Risk-Driven Security and Resiliency, Author: Carol A. Siegel
Title: Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control, Author: R. Thandeeswaran
Title: Web Services Security, Author: Mark O'Neill
Explore Series
Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Author: Ryan Trost
Title: Security in RFID and Sensor Networks, Author: Paris Kitsos
Title: Funktionale Sicherheit nach ISO 26262: Ein Praxisleitfaden zur Umsetzung, Author: Vera Gebhardt
Title: Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security, Author: Omar Santos

Pagination Links