Title: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security / Edition 1, Author: Will Arthur
Title: Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies, Author: Ira Winkler
Title: Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, Author: Eric Cole
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Automated Security Analysis of Android and iOS Applications with Mobile Security Framework, Author: Henry Dalziel
Title: Beautiful Security: Leading Security Experts Explain How They Think / Edition 1, Author: Andy Oram
Title: Brute Force: Cracking the Data Encryption Standard / Edition 1, Author: Matt Curtin
Title: Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency, Author: John Sullivant
Title: Building Blockchain Apps / Edition 1, Author: Michael Yuan
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: Codes: An Introduction to Information Communication and Cryptography / Edition 1, Author: Norman L. Biggs
Title: Computer Forensics JumpStart / Edition 2, Author: Michael G. Solomon
Title: Crafting the InfoSec Playbook / Edition 1, Author: Jeff Bollinger
Title: Criminal Enterprise Investigation / Edition 1, Author: Thomas A. Trier
Title: Cryptography InfoSec Pro Guide / Edition 1, Author: Sean-Philip Oriyano
Title: Cyber Guerilla, Author: Jelle Van Haaster
Title: Cyber Security Awareness for CEOs and Management, Author: David Willson
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives, Author: Eric Cole
Title: Cyber-Physical Attacks: A Growing Invisible Threat, Author: George Loukas PhD

Pagination Links