Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Business Continuity and Disaster Recovery Planning for IT Professionals, Author: Susan Snedaker
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Securing Citrix XenApp Server in the Enterprise, Author: Tariq Azad
Title: Developing Cybersecurity Programs and Policies in an AI-Driven World, Author: Omar Santos
Explore Series
Title: Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools, Author: Chris Chapman
Title: The Psychology of Insider Risk: Detection, Investigation and Case Management, Author: Eric Shaw
Title: Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II, Author: Haixin Duan
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment, Author: Stefan Strauß
Title: Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime, Author: Aamo Iorliam
Title: Security and Privacy Trends in Cloud Computing and Big Data, Author: Muhammad Imran Tariq
Title: Cybersecurity for Commercial Vehicles, Author: Gloria D'Anna

Pagination Links