1 - 20 of 2538 results
Title: Guide to Computer Forensics and Investigations (with DVD) / Edition 5, Author: Bill Nelson
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh Read an excerpt of this book!
Title: Eleventh Hour CISSP: Study Guide / Edition 3, Author: Eric Conrad
Title: Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley Read an excerpt of this book!
Title: Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick Read an excerpt of this book!
Title: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, Author: Bruce Dang Read an excerpt of this book!
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick Read an excerpt of this book!
Title: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, Author: Bruce Schneier
Title: Cybersecurity and Cyberwar: What Everyone Needs to Know, Author: Peter W. Singer Read an excerpt of this book!
Title: CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002 / Edition 2, Author: Michael Gregg Read an excerpt of this book!
Title: Hacking For Dummies, Author: Kevin Beaver Read an excerpt of this book!
Title: The InfoSec Handbook: An Introduction to Information Security, Author: Umesha Nayak Read an excerpt of this book!
Title: The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, Author: Dafydd Stuttard Read an excerpt of this book!
Title: Security in Computing / Edition 5, Author: Charles P. Pfleeger
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter Read an excerpt of this book!
Title: Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies, Author: Craig P. Bauer
Title: Guide to Firewalls and VPNs / Edition 3, Author: Michael E. Whitman
Title: CISA: Certified Information Systems Auditor Study Guide / Edition 4, Author: David L. Cannon Read an excerpt of this book!
Title: The Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta Read an excerpt of this book!
Title: Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Author: Xiaoyu Ruan Read an excerpt of this book!

Pagination Links