Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: Zero Trust Architecture, Author: Cindy Green-Ortiz
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: Secret History: The Story of Cryptology, Author: Craig Bauer
Title: AAA Identity Management Security, Author: Vivek Santuka
Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: A Machine-Learning Approach to Phishing Detection and Defense, Author: O.A. Akanbi
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Security in an IPv6 Environment, Author: Daniel Minoli
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Fog/Edge Computing For Security, Privacy, and Applications, Author: Wei Chang
Title: Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity, Author: Rheinwerk Publishing
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies, Author: Babak Akhgar
Title: Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems, Author: Y.-W. Peter Hong

Pagination Links