Title: How to Cheat at Securing Linux, Author: James Stanger
Title: Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic, Author: Ravi Das
Title: Security Awareness: Grundlagen, Maßnahmen und Programme für die Informationssicherheit / Edition 1, Author: Stefan Beißel
Title: Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches, Author: Yoram Orzach
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: Hacking Connected Cars: Tactics, Techniques, and Procedures, Author: Alissa Knight
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Malware, Rootkits, & Botnets, A Beginner's Guide / Edition 1, Author: Christopher C. Elisan
Title: Practical Cryptography / Edition 1, Author: Niels Ferguson
Title: Snort Intrusion Detection and Prevention Toolkit, Author: Brian Caswell
Title: A Guide to Kernel Exploitation: Attacking the Core, Author: Enrico Perla B.Sc.
Title: BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic, Author: Tom St Denis
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, Author: Christopher J Hodson
Title: Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat, Author: Paul Piccard
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Cyber Adversary Characterization: Auditing the Hacker Mind, Author: Tom Parker
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long

Pagination Links