Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: Integrated Security Systems Design: Concepts, Specifications, and Implementation, Author: Thomas L. Norman
Title: The SBA on PCP protocol: The SBA on PCP protocol, The Push - Check - Pull, Author: Ray Hermann Angossio Liwa
Title: How to Cheat at Managing Information Security, Author: Mark Osborne
Title: Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering, Author: Josh Luberisse
Title: Cracking the Fortress: Bypassing Modern Authentication Mechanism, Author: Josh Luberisse
Title: The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment, Author: Josh Luberisse
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website, Author: Daniel Domscheit-Berg
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits, Author: Josh Luberisse
Title: The Case for ISO27001, Author: Alan Calder
Title: Securities AI - Programs Conceptual: Investigative Sanctuary Communications, Author: Julien Coallier
Title: Nine Steps to Success: An ISO27001 Implementation Overview, Author: Alan Calder
Title: Sistemas seguros de acceso y transmisión de datos. MF0489., Author: Beatriz Coronado García

Pagination Links