Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Implementing Cryptography Using Python, Author: Shannon W. Bray
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: Privacy Risk Analysis, Author: Sourya Joyee De
Title: Data-Driven Security: Analysis, Visualization and Dashboards, Author: Jay Jacobs
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: The Mobile Application Hacker's Handbook, Author: Dominic Chell
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17-19, 2022, Revised Selected Papers, Author: Luis Bathen
Title: Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings, Author: G. Alan Wang
Title: Mastering FreeBSD and OpenBSD Security: Building, Securing, and Maintaining BSD Systems, Author: Yanek Korff
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: The Android Malware Handbook: Detection and Analysis by Human and Machine, Author: Qian Han
Title: Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam, Author: Laurie Yiu-Chung Lau
Title: Practical Hadoop Security, Author: Bhushan Lakhe

Pagination Links