Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann

Pagination Links