Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Securing Microsoft Azure OpenAI, Author: Karl Ots
Title: Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part I, Author: Ruben Niederhagen
Title: Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part I, Author: Ruben Niederhagen
Title: Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics, Author: Deepti Aggrawal
Title: Operational Perspective of Modeling System Reliability: Research Tools for System Dynamics, Author: Deepti Aggrawal
Title: Open Source Intelligence (OSINT) - A practical Introduction: A Field Manual, Author: Varin Khera
Title: Open Source Intelligence (OSINT) - A practical Introduction: A Field Manual, Author: Varin Khera
Title: Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis, Author: Shivi Garg
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: Cybersecurity Education and Training, Author: Razvan Beuran
Title: Cybersecurity Education and Training, Author: Razvan Beuran
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Cyber Security: Law and Guidance, Author: Helen Wong MBE
Title: Cyber Security: Law and Guidance, Author: Helen Wong MBE
Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin
Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin
Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin

Pagination Links