Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: Wireless Reconnaissance in Penetration Testing, Author: Matthew Neely
Title: Cyber Guerilla, Author: Jelle Van Haaster
Title: Designing and Building Security Operations Center, Author: David Nathans
Title: Mastering IBM i Security: A Modern Step-by-Step Guide, Author: Carol Woodbury
Title: Network Security and Cryptography, Author: Sarhan M. Musa
Title: Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts, Author: Derrick Rountree
Title: Configuring Juniper Networks NetScreen and SSG Firewalls, Author: Rob Cameron
Title: Hacking Web Apps: Detecting and Preventing Web Application Security Problems, Author: Mike Shema
Title: Applied Network Security Monitoring: Collection, Detection, and Analysis, Author: Chris Sanders
Title: Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control, Author: Paul Cerrato
Title: Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques, Author: ISSMP Wilhelm MSc
Title: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, Author: TJ O'Connor
Title: Google Hacking for Penetration Testers, Author: Bill Gardner
Title: Securing the Smart Grid: Next Generation Power Grid Security, Author: Tony Flick
Title: PKI Implementation and Infrastructures, Author: Julian Ashbourn
Title: Understanding Cybersecurity: Emerging Governance and Strategy, Author: Gary Schaub
Title: The Official (ISC)2 SSCP CBK Reference, Author: Mike Wills
Title: Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, Author: Michael Ligh
Title: Cybersecurity 2021, Author: Carl L. Freeman

Pagination Links