1 - 20 of 684 results
Title: Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: Eleventh Hour CISSP: Study Guide / Edition 3, Author: Eric Conrad
Title: Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley
Title: The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Author: Joshua Holden
Title: Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies, Author: Craig P. Bauer
Title: CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002 / Edition 2, Author: Michael Gregg
Title: How to Be Invisible, Third Edition: Protect Your Home, Your Children, Your Assets, and Your Life, Author: J. J. Luna
Title: The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Metasploit: The Penetration Tester's Guide, Author: David Kennedy
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework / Edition 1, Author: Jessey Bullock
Title: Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code / Edition 1, Author: Michael Ligh
Title: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, Author: Bruce Dang
Title: Software Security: Building Security In, Author: Gary McGraw
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Title: The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals, Author: Jill D. Rhodes
Title: Defensive Security Handbook: Best Practices for Securing Infrastructure, Author: Lee Brotherston
Title: The Practice of Network Security Monitoring: Understanding Incident Detection and Response / Edition 1, Author: Richard Bejtlich
Title: Hacking Wireless Networks For Dummies, Author: Kevin Beaver
Title: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, Author: Bruce Schneier

Pagination Links