Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Secret History: The Story of Cryptology, Author: Craig Bauer
Title: Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems, Author: Y.-W. Peter Hong
Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: CompTIA Security+ Certification Bundle, Third Edition (Exam SY0-501), Author: Glen E. Clarke
Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Author: Ryan Trost
Title: Building an Effective Information Security Policy Architecture, Author: Sandy Bacik
Title: Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP, Author: Eric Quinton
Title: Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators, Author: Johnny Long
Title: Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools, Author: Abbas Moallem
Title: Securing and Controlling Cisco Routers, Author: Peter T. Davis
Title: Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland, Author: Anthony H. Cordesman
Title: Security in Sensor Networks, Author: Yang Xiao
Title: Building a Practical Information Security Program, Author: Jason Andress
Title: Integrating ISA Server 2006 with Microsoft Exchange 2007, Author: Fergus Strachan
Title: Online Health and Safety: From Cyberbullying to Internet Addiction, Author: Bernadette H. Schell
Title: Disappearing Cryptography: Information Hiding: Steganography and Watermarking, Author: Peter Wayner
Title: Digital Privacy: Theory, Technologies, and Practices, Author: Alessandro Acquisti
Title: Cyberspace and Cybersecurity, Author: George Kostopoulos
Title: Check Point NGX R65 Security Administration, Author: Ralph Bonnell

Pagination Links