Title: PTFM, Author: Tim Bryant
Title: How to Cheat at Managing Information Security, Author: Mark Osborne
Title: Cybercon: Protecting Ourselves from Big Tech & Bigger Lies, Author: Dr. James L. Norrie
Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: Integrated Security Systems Design: Concepts, Specifications, and Implementation, Author: Thomas L. Norman
Title: Securities AI - Programs Conceptual: Investigative Sanctuary Communications, Author: Julien Coallier
Title: Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement, Author: W. Krag Brotby
Title: Safeguarding the Digital Fortress: A Guide to Cyber Security, Author: Christopher Ford
Title: Information Security Management Handbook, Volume 3, Author: Harold F. Tipton
Title: The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation, Author: Josh Luberisse
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: How to Deploy One Password for Online Securities, Author: Abby Lotts
Title: CompTIA Security+ SY0-601 Exam Practice Tests: 5 Practice Tests with 400+ realistic questions and explanations, Author: Certsquad Professional Trainers
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: Cyber Security Haikus and Essays, Author: Emily Lee
Title: Cracking the Fortress: Bypassing Modern Authentication Mechanism, Author: Josh Luberisse
Title: The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment, Author: Josh Luberisse
Title: Security Metrics, Author: Andrew Jaquith
Title: Army Techniques Publication ATP 6-02.75 Techniques for Communication Security May 2020, Author: United States Government Us Army

Pagination Links