Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: Zero Trust Architecture, Author: Cindy Green-Ortiz
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: Secret History: The Story of Cryptology, Author: Craig Bauer
Title: CyberMedics: Navigating AI and Security in the Medical Field, Author: Varun Sapra
Title: AI-Enabled Threat Detection and Security Analysis for Industrial IoT, Author: Hadis Karimipour
Title: Attack and Defend Computer Security Set, Author: Dafydd Stuttard
Title: The GRC Bible, Author: Tolulope Michael
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II, Author: Sokratis Katsikas
Title: Integrating ISA Server 2006 with Microsoft Exchange 2007, Author: Fergus Strachan
Title: Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools, Author: Abbas Moallem
Title: Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I, Author: Haixin Duan
Title: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers, Author: Weili Han
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper

Pagination Links