Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings, Author: Ioana Boureanu
Title: Computer Security -- ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings, Author: Michael Backes
Title: Foundations of Cyber Deception: Modeling, Analysis, Design, Human Factors, and Their Convergence, Author: Quanyan Zhu Pre-Order Now
Title: Cyber Defense and Situational Awareness, Author: Alexander Kott
Title: Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part II, Author: Serge Fehr
Title: Advances in Cryptology - ASIACRYPT'99: International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings, Author: Kwok Yan Lam
Title: Blockchain - ICBC 2022: 5th International Conference, Held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings, Author: Shiping Chen
Title: Nine Steps to Success: An ISO27001:2013 Implementation Overview, Author: Alan Calder
Title: Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings, Author: Ueli Maurer
Title: Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting, Author: John Hoopes
Title: Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers, Author: Gilbert Peterson
Title: European Axis Signal Intelligence in World War II, Author: National Security Agency
Title: Professional Security Management: A Strategic Guide, Author: Charles Swanson
Title: Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security, Author: Zahir Tari
Title: Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs, Author: Simson Garfinkel
Title: Digital Forensics with Kali Linux: Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guide, Author: Shiva V.N. Parasram
Title: Advanced Malware Analysis and Intelligence: Investigating malicious code with static and dynamic analysis and threat intelligence (English Edition), Author: Mahadev Thukaram
Title: Hadamard Transforms, Author: Sos Agaian
Title: CISSP Practice Exams, Fifth Edition, Author: Shon Harris

Pagination Links