Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: The Official (ISC)2 SSCP CBK Reference, Author: Mike Wills
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: CISSP All-in-One Exam Guide, Seventh Edition, Author: Fernando Maymi
Title: Edge Intelligence and Analytics for Internet of Things, Author: Govind P. Gupta
Title: Disseminating Security Updates at Internet Scale, Author: Jun Li
Title: Network Security: Private Communication in a Public World, Author: Charlie Kaufman
Title: Security Engineering and Tobias on Locks Two-Book Set, Author: Ross Anderson
Title: Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD, Author: Ryan Russell
Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: Physical-Layer Security: From Information Theory to Security Engineering, Author: Matthieu Bloch
Title: Cyber Threat Intelligence, Author: Martin Lee
Title: AI for Big Data-Based Engineering Applications from Security Perspectives, Author: Balwinder Raj
Title: Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers, Author: Radu Sion
Title: Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency - Data or Trust?, Author: Ulf Mattsson
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework, Author: Anne Kohnke

Pagination Links