Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: Synchronizing E-Security, Author: Godfried B. Williams
Title: Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I, Author: Haixin Duan
Title: PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Author: Branden Williams
Title: Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers, Author: Sukumar Nandi
Title: Network Security Technologies, Author: Kwok T. Fung
Title: Network Security Auditing, Author: Chris Jackson
Explore Series
Title: Digital Twin Technology, Author: Gopal Chaudhary
Title: Mastering Palo Alto Networks: Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS, Author: Tom Piens aka 'reaper
Title: Hacking Exposed Web Applications, Third Edition, Author: Joel Scambray
Title: Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland, Author: Anthony H. Cordesman
Title: Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I, Author: Sokratis Katsikas
Title: Artificial Intelligence & Blockchain in Cyber Physical Systems: Technologies & Applications, Author: Muhammad Arif
Title: Counterintelligence in a Cyber World, Author: Paul A. Watters

Pagination Links