Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Oracle E-Business Suite Security, Author: John Abel
Explore Series
Title: Network Defense and Countermeasures: Principles and Practices, Author: William Easttom II
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Information Assurance: Dependability and Security in Networked Systems, Author: Yi Qian
Title: Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency - Data or Trust?, Author: Ulf Mattsson
Title: Threat Forecasting: Leveraging Big Data for Predictive Analysis, Author: John Pirc
Title: Enterprise Level Security: Securing Information Systems in an Uncertain World, Author: William R. Simpson
Title: Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities, Author: Mark Dowd
Title: Security Information and Event Management (SIEM) Implementation, Author: David R. Miller
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: IT Auditing Using Controls to Protect Information Assets, Third Edition, Author: Chris Davis

Pagination Links