Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: Application Security Program Guide: Building a Comprehensive Application and Product Security Program, Author: Ahmed Abdul-Rahman
Title: Army Techniques Publication ATP 6-02.71 Techniques for Department of Defense Information Network Operations April 2019, Author: United States Government Us Army
Title: Asset Protection through Security Awareness, Author: Tyler Justin Speed
Title: Big Data, Surveillance and Crisis Management, Author: Kees Boersma
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: Cracking the Fortress: Bypassing Modern Authentication Mechanism, Author: Josh Luberisse
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Defending the Digital Perimeter Network Security Audit Readiness Strategies, Author: J. L. Parham
Title: DoD 5220.22-M National Industrial Security Program Operating Manual Incorporating Change 2 May 2016, Author: United States Government Us Army
Title: Evolving Roles of Chief Information Security Officers and Chief Risk Officers, Author: Dr. Michael C. Redmond Phd
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering, Author: Josh Luberisse
Title: How to Cheat at Managing Information Security, Author: Mark Osborne
Title: How to Deploy One Password for Online Securities, Author: Abby Lotts
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework, Author: Anne Kohnke
Title: Information Security Governance Simplified: From the Boardroom to the Keyboard, Author: Todd Fitzgerald
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series

Pagination Links