Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Enigma Myth Deciphered: Codebreakers, Commanders and Politicians, Author: Marek Grajek
Title: Applied Information Security: A Hands-on Approach, Author: David Basin
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: Federal Cybersecurity Planning : Human Capital and Research and Development, Author: Kurk C. Moore
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, Author: Kevin D. Mitnick
Title: PoC or GTFO, Volume 3, Author: Manul Laphroaig
Title: Seven Elements of Highly Successful Zero Trust Architecture, Author: Nathan Howe
Title: Privacy's Blueprint: The Battle to Control the Design of New Technologies, Author: Woodrow Hartzog
Title: Secret Messages: Concealment Codes And Other Types Of Ingenious Communication, Author: William S. Butler
Title: A Hacker I Am Vol 2, Author: Craig Ford
Title: Managing Successful IGA Implementation: with Stage-Gate Agile, Author: Joseph F. Miceli Jr
Title: Sudo Mastery, Author: Michael W Lucas
Title: A Hacker, I Am, Author: Craig Ford
Title: The Metrics Manifesto: Confronting Security with Data, Author: Richard Seiersen
Title: Safe Computing is Like Safe Sex: You have to practice it to avoid infection, Author: Richard G Lowe Jr
Title: Ransom War: How Cyber Crime Became a Threat to National Security, Author: Max Smeets

Pagination Links