Title: The Case for ISO27001, Author: Alan Calder
Title: How to Achieve 27001 Certification: An Example of Applied Compliance Management, Author: Sigurjon Thor Arnason
Title: Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website, Author: Daniel Domscheit-Berg
Title: Army Regulation AR 380-5 Army Information Security Program March 2022, Author: United States Government Us Army
Title: How to Manage Cybersecurity Risk, Author: Christopher T. Carlson
Title: Information Risk and Security: Preventing and Investigating Workplace Computer Crime, Author: Edward Wilding
Title: Nine Steps to Success: An ISO27001 Implementation Overview, Author: Alan Calder
Title: Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits, Author: Josh Luberisse
Title: Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering, Author: Josh Luberisse
Title: Army Techniques Publication ATP 6-02.71 Techniques for Department of Defense Information Network Operations April 2019, Author: United States Government Us Army
Title: The SBA on PCP protocol: The SBA on PCP protocol, The Push - Check - Pull, Author: Ray Hermann Angossio Liwa
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work, Author: Scott Gordon

Pagination Links