Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: The Cambridge Handbook of Surveillance Law, Author: David Gray
Title: Cyber Insecurity: Navigating the Perils of the Next Information Age, Author: Richard J. Danzig
Title: Internet Security: A Jumpstart for Systems Administrators and IT Managers, Author: Tim Speed
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: New Directions of Modern Cryptography, Author: Zhenfu Cao
Title: Internet and Wireless Security, Author: J. Regnault
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: Anti-Hacker Tool Kit, Third Edition, Author: Mike Shema
Title: 5G Cyber Risks and Mitigation, Author: Sabhyata Soni
Title: Cisco ASA Configuration, Author: Richard Deal
Explore Series
Title: Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19-21, 2021, Proceedings, Author: Limei Lin
Title: VCP6-NV Official Cert Guide (Exam #2V0-641), Author: Elver Sena Sosa
Title: Securing IoT in Industry 4.0 Applications with Blockchain, Author: P Kaliraj
Title: Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions, Author: Clint Bodungen

Pagination Links