Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, Author: Marc Goodman
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Multimedia Content Encryption: Techniques and Applications, Author: Shiguo Lian
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Oracle Database 12c Security, Author: Scott Gaetjen
Title: Netcat Power Tools, Author: Jan Kanclirz
Title: Anonymity, Author: Alison Macrina
Explore Series
Title: Designing an IAM Framework with Oracle Identity and Access Management Suite, Author: Jeff Scheidel
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Privacy and Data Protection Law in Ireland, Author: Denis Kelleher
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Digital Preservation, Author: Marilyn Deegan
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, Author: John Hoopes
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham

Pagination Links