Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Intelligent Continuous Security: AI-Enabled Transformation for Seamless Protection, Author: Marc Hornbeek
Title: Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence, Author: Hemang Doshi
Title: CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001), Author: Fernando Maymi
Title: Recent Trends in Blockchain for Information Systems Security and Privacy, Author: Amit Kumar Tyagi
Title: WiMAX Security and Quality of Service: An End-to-End Perspective, Author: Seok-Yee Tang
Title: Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings, Author: Ding Wang
Title: Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems, Author: Jorge Miguel
Title: The Cybersecurity Guide to Governance, Risk, and Compliance, Author: Jason Edwards
Title: Zero Trust Architecture, Author: Cindy Green-Ortiz
Title: The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity, Author: M. A. Jabbar
Title: Advances in Cyber Security and Intelligent Analytics, Author: Abhishek Verma

Pagination Links