Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: Windows Security Monitoring: Scenarios and Patterns, Author: Andrei Miroshnikov
Title: Penetration Testing Essentials, Author: Sean-Philip Oriyano
Title: A Beginner's Guide To Web Application Penetration Testing, Author: Ali Abdollahi
Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: The Network Security Test Lab: A Step-by-Step Guide, Author: Michael Gregg
Title: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Author: Jennifer Minella
Title: CEH v10 Certified Ethical Hacker Study Guide, Author: Ric Messier
Title: Linux Server Security: Hack and Defend, Author: Chris Binnie
Title: Fundamentals of Information Systems Security, Author: David Kim
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Mastering Palo Alto Networks - Third Edition: The complete journey to firewall mastery from setup to advanced security, Author: Tom Piens Aka 'Reaper
Title: Hadoop Security: Protecting Your Big Data Platform, Author: Ben Spivey
Title: The Android Malware Handbook: Detection and Analysis by Human and Machine, Author: Qian Han
Title: SQL Server Security Distilled, Author: Morris Lewis
Title: Windows Server 2003 Networking Recipes: A Problem-Solution Approach, Author: Robbie Allen
Title: Practical Cloud Security: A Guide for Secure Design and Deployment, Author: Chris Dotson

Pagination Links