Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Secret History: The Story of Cryptology, Author: Craig Bauer
Title: Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems, Author: Y.-W. Peter Hong
Title: The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development, Author: Eugene Fredriksen
Title: Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities, Author: Mark Dowd
Title: Cyber Threat Intelligence, Author: Martin Lee
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Threat Forecasting: Leveraging Big Data for Predictive Analysis, Author: John Pirc
Title: The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web, Author: Ron Lepofsky
Title: Network Security: Private Communication in a Public World, Author: Charlie Kaufman
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Cyber Threat: The Rise of Information Geopolitics in U.S. National Security: The Rise of Information Geopolitics in U.S. National Security, Author: Chris Bronk
Title: IT Security Governance Guidebook with Security Program Metrics on CD-ROM, Author: Fred Cohen
Explore Series
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Cloud Computing Security: Foundations and Challenges, Author: John R. Vacca
Title: The Death of the Internet, Author: Markus Jakobsson
Title: Enterprise Level Security: Securing Information Systems in an Uncertain World, Author: William R. Simpson
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective, Author: Govind P. Gupta

Pagination Links