Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: The Mobile Application Hacker's Handbook, Author: Dominic Chell
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Managing Privacy: Information Technology and Corporate America, Author: H. Jeff Smith
Title: Legislating Privacy: Technology, Social Values, and Public Policy, Author: Priscilla M. Regan
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Implementing Cryptography Using Python, Author: Shannon W. Bray
Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: Data-Driven Security: Analysis, Visualization and Dashboards / Edition 1, Author: Jay Jacobs
Title: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data, Author: Micah Lee
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: Trust, Privacy and Security in Digital Business: 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings, Author: Simone Fischer-Hübner
Title: Cybersecurity All-in-One For Dummies, Author: Joseph Steinberg
Title: Cybersecurity in Morocco, Author: Yassine Maleh
Title: The Android Malware Handbook: Detection and Analysis by Human and Machine, Author: Qian Han
Title: Cybersecurity Career Guide, Author: Alyssa Miller

Pagination Links