Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Securing IoT in Industry 4.0 Applications with Blockchain, Author: P Kaliraj
Title: Mechanics of User Identification and Authentication: Fundamentals of Identity Management, Author: Dobromir Todorov
Title: Security in an IPv6 Environment, Author: Daniel Minoli
Title: The Psychology of Insider Risk: Detection, Investigation and Case Management, Author: Eric Shaw
Title: Constructing cybersecurity: Power, expertise and the internet security industry, Author: Andrew Whiting
Title: Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition, Author: Mark Collier
Title: Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation, Author: Ernesto F. Rojas
Title: Access Control Models and Architectures For IoT and Cyber Physical Systems, Author: Maanak Gupta
Title: CyberMedics: Navigating AI and Security in the Medical Field, Author: Varun Sapra
Title: Internet Security: A Jumpstart for Systems Administrators and IT Managers, Author: Tim Speed

Pagination Links