Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles, Author: Mark Buckwell
Title: Network Security Through Data Analysis: From Data to Action, Author: Michael Collins
Title: Understanding Cybersecurity: Emerging Governance and Strategy, Author: Gary Schaub
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Ethereal Packet Sniffing, Author: Syngress
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network, Author: Stephen Watkins
Title: Integrating ISA Server 2006 with Microsoft Exchange 2007, Author: Fergus Strachan
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Stealing The Network: How to Own the Box, Author: Syngress
Title: Firewall Policies and VPN Configurations, Author: Syngress
Title: Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control, Author: R. Thandeeswaran
Title: Cyber Strategy: Risk-Driven Security and Resiliency, Author: Carol A. Siegel
Title: Web Services Security, Author: Mark O'Neill
Explore Series
Title: Funktionale Sicherheit nach ISO 26262: Ein Praxisleitfaden zur Umsetzung, Author: Vera Gebhardt
Title: Ajax Security, Author: Billy Hoffman
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Network Security with Netflow and IPFIX: Big Data Analytics for Information Security, Author: Omar Santos

Pagination Links