Title: Massive MIMO in Practice: From 5G to 6G, Author: Henrik Asplund
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks, Author: Russ White
Title: Microsoft Office 365 - Exchange Online Implementation and Migration - Second Edition, Author: Ian Waters
Title: Network Automation Made Easy, Author: Ivo Pinto
Explore Series
Title: The Essential Guide to Telecommunications, Author: Annabel Dodd
Explore Series
Title: Cisco Data Center Fundamentals, Author: Somit Maloo
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Building the Agile Enterprise: With SOA, BPM and MBM, Author: Fred A. Cummins
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Dictionary of Health Information Technology and Security, Author: David E. Marcinko MBA
Title: Hacking Exposed Web Applications, Third Edition, Author: Joel Scambray
Title: Cisco Meraki Fundamentals: Cloud-Managed Operations, Author: Arun Paul
Title: Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab, Author: ISSMP Wilhelm MSc
Title: Guide to Voice and Video over IP: For Fixed and Mobile Networks, Author: Lingfen Sun

Pagination Links