Title: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data, Author: Micah Lee
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, Author: Nicole Perlroth
Title: IAPP CIPM Certified Information Privacy Manager Study Guide, Author: Mike Chapple
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, Author: Slava Gomzin
Title: Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders, Author: Renee Tarun
Title: Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, Author: Roger A. Grimes
Title: Cyber Within, Author: Marcos Christodonte II
Title: Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World, Author: Joel Brenner
Title: Hacking For Dummies, Author: Kevin Beaver
Title: The Wires of War: Technology and the Global Struggle for Power, Author: Jacob Helberg
Title: Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism, Author: Progressive Management
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Cybersecurity Blue Team Toolkit, Author: Nadean H. Tanner
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, Author: Kevin D. Mitnick
Title: e-Discovery For Dummies, Author: Carol Pollard
Title: Privacy: What Everyone Needs to Know®, Author: Leslie P. Francis
Title: Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, Author: Jesse Varsalone

Pagination Links