Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: American Black Chamber, Author: Herbert O. Yardley
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation / Edition 1, Author: Bruce Dang
Title: Cryptography Engineering: Design Principles and Practical Applications / Edition 1, Author: Niels Ferguson
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory / Edition 1, Author: Michael Hale Ligh
Title: Building Blockchain Apps / Edition 1, Author: Michael Yuan
Title: Quantum Information Theory / Edition 2, Author: Mark M. Wilde
Title: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy / Edition 2, Author: Patrick Engebretson Ph.D.
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Group Policy: Fundamentals, Security, and the Managed Desktop / Edition 3, Author: Jeremy Moskowitz
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition / Edition 2, Author: James M. Adcock
Title: Managing Risk and Information Security: Protect to Enable / Edition 2, Author: Malcolm W. Harkins
Title: Gangs and Organized Crime / Edition 1, Author: Gregg W. Etter
Title: Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, Author: Eric D. Knapp

Pagination Links