Title: Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications, Author: Murray R. Bremner
Title: The Browser Hacker's Handbook, Author: Wade Alcorn
Title: Role-Based Access Control 2nd edition, Author: David F. Ferraiolo
Title: Snort Cookbook: Solutions and Examples for Snort Administrators, Author: Angela Orebaugh
Title: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, Author: Nicole Perlroth
Title: No-Body Homicide Cases: A Practical Guide to Investigating, Prosecuting, and Winning Cases When the Victim Is Missing, Author: Thomas A.(Tad) DiBiase
Title: Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage, Author: Timo Steffens
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: Secret History: The Story of Cryptology, Author: Craig P. Bauer
Title: Principles of Information Security, Author: Michael E. Whitman
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Police Use of Force: Important Issues Facing the Police and the Communities They Serve, Author: Michael J. Palmiotto
Title: CompTIA Security+ Guide to Network Security Fundamentals, Author: Mark Ciampa
Title: CompTIA Security+ Certification Study Guide: Network Security Essentials, Author: Ahmed F. Sheikh
Title: CompTIA Security+ Guide to Network Security Fundamentals, Lab Manual, Author: Andrew Hurd
Title: Guide to Network Security, Author: Michael E. Whitman
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Virtuous Policing: Bridging America's Gulf Between Police and Populace, Author: David G. Bolgiano
Title: Mastering Blockchain - Fourth Edition: Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3, Author: Imran Bashir

Pagination Links