Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, Author: Tony UcedaVelez
Title: Securing SCADA Systems, Author: Ronald L. Krutz
Title: Securing SQL Server: Protecting Your Database from Attackers, Author: Denny Cherry
Title: Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, Author: David Lyon
Title: The CISO Handbook: A Practical Guide to Securing Your Company, Author: Michael Gentile
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind, Author: James Bone
Explore Series
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Privacy and Capitalism in the Age of Social Media, Author: Sebastian Sevignani
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Computer Security: 20 Things Every Employee Should Know, Author: Ben Rothke
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Digital Preservation, Author: Marilyn Deegan
Title: How to Cheat at Securing SQL Server 2005, Author: Mark Horninger
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Author: Edward Skoudis
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns

Pagination Links