Title: Legislating Privacy: Technology, Social Values, and Public Policy, Author: Priscilla M. Regan
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: Data-Driven Security: Analysis, Visualization and Dashboards / Edition 1, Author: Jay Jacobs
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: The Mobile Application Hacker's Handbook, Author: Dominic Chell
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Implementing Cryptography Using Python, Author: Shannon W. Bray
Title: Managing Privacy: Information Technology and Corporate America, Author: H. Jeff Smith
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: The Security Consultant's Handbook, Author: Richard Bingley
Title: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data, Author: Micah Lee
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos Pre-Order Now
Title: Real CIPP/E Prep: An American's Guide to European Data Protection Law And the General Data Protection Regulation (GDPR), Author: Gordon Yu
Title: Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development, Author: Frank J. Furrer
Title: Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within, Author: Julie Mehan
Title: Hadoop Security: Protecting Your Big Data Platform, Author: Ben Spivey

Pagination Links