Title: Securing Cloud Native Apps, Author: Michael Anderson Pre-Order Now
Title: Digital Forensics and Incident Response: Incident Response tools and techniques for effective cyber threat response, Author: Gerard Johansen Pre-Order Now
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion Pre-Order Now
Title: From Day Zero to Zero Day, Author: Eugene Lim Pre-Order Now
Title: Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and SOC 2), Author: David Clarke Pre-Order Now
Title: Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and SOC 2), Author: David Clarke Pre-Order Now
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics, Author: Deepti Aggrawal
Title: Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics, Author: Deepti Aggrawal
Title: Securing IoT in Industry 4.0 Applications with Blockchain, Author: P Kaliraj
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Secret History: The Story of Cryptology, Author: Craig P. Bauer
Title: Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective, Author: Govind P. Gupta
Title: Security in IoT: The Changing Perspective, Author: Rituparna Chaki
Title: Security Issues for Wireless Sensor Networks, Author: Parag Verma
Title: An Interdisciplinary Approach to Modern Network Security, Author: Sabyasachi Pramanik
Title: Recent Trends in Blockchain for Information Systems Security and Privacy, Author: Amit Kumar Tyagi

Pagination Links