Title: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation / Edition 1, Author: Bruce Dang
Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory / Edition 1, Author: Michael Hale Ligh
Title: Cryptography Engineering: Design Principles and Practical Applications / Edition 1, Author: Niels Ferguson
Title: Hardware Security: A Hands-on Learning Approach, Author: Swarup Bhunia Ph.D.
Title: Group Policy: Fundamentals, Security, and the Managed Desktop / Edition 3, Author: Jeremy Moskowitz
Title: Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, Author: Eric D. Knapp
Title: Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments, Author: Andy Richter
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition / Edition 2, Author: James M. Adcock
Title: Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Gangs and Organized Crime / Edition 1, Author: Gregg W. Etter
Title: Foundations of Cryptography: Volume 1, Basic Tools, Author: Oded Goldreich
Title: Random Number Generators-Principles and Practices: A Guide for Engineers and Programmers / Edition 1, Author: David Johnston
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: CPTED and Traditional Security Countermeasures: 150 Things You Should Know / Edition 1, Author: Lawrence Fennelly
Title: Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry / Edition 2, Author: Harlan Carvey
Title: Practical Handbook for Professional Investigators / Edition 3, Author: Rory J. McMahon CLI CFE
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework / Edition 1, Author: Jessey Bullock
Title: Machine Learning and Security: Protecting Systems with Data and Algorithms / Edition 1, Author: Clarence Chio
Title: Foundations of Cryptography: Volume 2, Basic Applications, Author: Oded Goldreich

Pagination Links