Title: Zero Trust Journey Across the Digital Estate, Author: Abbas Kudrati
Title: Zero to Hero: Your Guide to a Career in Cybersecurity, Author: Felix Kyei Asare
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Wireless Multimedia Communication Systems: Design, Analysis, and Implementation, Author: K.R. Rao
Title: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century, Author: Shimon Brathwaite
Title: What They Didn't Teach at the Academy: Topics, Stories, and Reality beyond the Classroom, Author: Dale L. June
Title: Web3: Blockchain, the New Economy, and the Self-Sovereign Internet, Author: Ken Huang
Title: Web Security: A WhiteHat Perspective, Author: Hanqing Wu
Title: Vulnerability Management, Author: Park Foreman
Title: Vulnerability Analysis and Defense for the Internet, Author: Abhishek Singh
Title: VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, Author: John R. Goodall
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Virtuous Policing: Bridging America's Gulf Between Police and Populace, Author: David G. Bolgiano
Title: Violence in Nigeria: Patterns and Trends, Author: Patricia Taft
Title: Verification of Infinite-State Systems with Applications to Security: Volume 1 NATO Security through Science Series: Information and Communication Security, Author: Edmund Clarke
Title: Vehicular Cyber Physical Systems: Adaptive Connectivity and Security, Author: Danda B. Rawat
Title: Vehicular Ad Hoc Network Security and Privacy, Author: Xiaodong Lin
Title: Understanding Social Engineering Based Scams, Author: Markus Jakobsson
Title: Understanding Intrusion Detection through Visualization, Author: Stefan Axelsson
Title: Understanding Cryptography, Author: Ethan Scott

Pagination Links