Title: Data-Driven Security: Analysis, Visualization and Dashboards / Edition 1, Author: Jay Jacobs
Title: Privacy Risk Analysis / Edition 1, Author: Sourya Joyee De
Title: Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures / Edition 1, Author: Alessandro Aldini
Title: Critical Information Infrastructure Security: 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers, Author: Sandro Bologna
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: Training Law Enforcement Officers / Edition 1, Author: Rick D. Giovengo
Title: Crafting the InfoSec Playbook / Edition 1, Author: Jeff Bollinger
Title: Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1, Author: Dan Farmer
Title: Applied Information Security: A Hands-on Approach / Edition 1, Author: David Basin
Title: Digital Forensics: Threatscape and Best Practices, Author: John Sammons
Title: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Author: Johnny Long
Title: Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control, Author: Paul Cerrato
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies, Author: Ira Winkler
Title: Cyber-Physical Attacks: A Growing Invisible Threat, Author: George Loukas PhD
Title: Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, Author: Nihad Ahmad Hassan
Title: Cyber Guerilla, Author: Jelle Van Haaster
Title: Digital Signal Processing, Author: Joao Marques de Carvalho
Title: Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense, Author: Gavin Watson
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring

Pagination Links