Title: IT-Security und Botnetze. Aktuelle Angriffs- und Abwehrmethoden: Botnetze, Author: Dominik Wagner
Title: Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices, Author: Andrew Hay
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring, Author: Harlan Carvey
Title: How to Cheat at Securing Linux, Author: James Stanger
Title: CD and DVD Forensics, Author: Paul Crowley
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: How to Cheat at IIS 7 Server Administration, Author: Chris Adams
Title: An Introduction to Crime and Crime Causation, Author: Robert C. Winters
Title: Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic, Author: Ravi Das
Title: Managing Cybersecurity Risk: Cases Studies and Solutions, Author: Jonathan Reuvid
Title: Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition, Author: Kevin Cardwell
Title: Threat Modeling: Designing for Security, Author: Adam Shostack
Title: Mainframe Basics for Security Professionals: Getting Started with RACF, Author: Ori Pomerantz
Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Author: Ryan Trost
Title: The Joy of Cryptography: An Undergraduate Course in Provable Security, Author: Mike Rosulek Pre-Order Now
Title: Ajax Security, Author: Billy Hoffman
Title: The CERT Oracle Secure Coding Standard for Java, Author: Fred Long
Title: Hacking the Code: Auditor's Guide to Writing Secure Code for the Web, Author: Mark Burnett

Pagination Links