Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: IPSec VPN Design, Author: Vijay Bollapragada
Title: AI and Machine Learning for Network and Security Management, Author: Yulei Wu
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part IV, Author: Saed Alrabaee
Title: Information Security Risk Analysis, Author: Thomas R. Peltier
Title: Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security, Author: Omar Santos
Title: Wireless Crime and Forensic Investigation, Author: Gregory Kipper
Title: Security of Mobile Communications, Author: Noureddine Boudriga
Title: Attribute-Based Encryption and Access Control, Author: Dijiang Huang
Title: Hackers and Hacking: A Reference Handbook, Author: Thomas J. Holt
Title: Humans and Machines at Work: Monitoring, Surveillance and Automation in Contemporary Capitalism, Author: Phoebe V. Moore
Title: New Telecom Networks: Enterprises and Security, Author: Daniel Battu

Pagination Links