Title: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, Author: Eugene Spafford
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni
Title: Foundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial Lectures, Author: Riccardo Focardi
Title: Grokking Web Application Security, Author: Malcolm McDonald
Title: Role-Based Access Control 2nd edition, Author: David F. Ferraiolo
Title: CEH v9: Certified Ethical Hacker Version 9 Kit, Author: Robert Shimonski
Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: People-Centric Security: Transforming Your Enterprise Security Culture, Author: Lance Hayden
Title: Network Defense and Countermeasures: Principles and Practices, Author: William Easttom II
Title: Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, Author: Bin Xiao
Title: The Tangled Web: A Guide to Securing Modern Web Applications, Author: Michal Zalewski
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Title: Zero Trust Architecture, Author: Cindy Green-Ortiz
Title: Securing Enterprise Networks with Cisco Meraki, Author: Ryan Chaney
Title: Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network, Author: Tim Crothers
Title: The Insider Threat: Assessment and Mitigation of Risks, Author: Eleanor E. Thompson
Title: Security in IoT: The Changing Perspective, Author: Rituparna Chaki
Title: Security Power Tools, Author: Bryan Burns

Pagination Links