Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles, Author: Mark Buckwell
Title: Network Security Through Data Analysis: From Data to Action, Author: Michael Collins
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: WarDriving and Wireless Penetration Testing, Author: Chris Hurley
Title: Ethereal Packet Sniffing, Author: Syngress
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: Firewall Policies and VPN Configurations, Author: Syngress
Title: Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix setup, Author: Nathan Liefting
Title: Cyber Strategy: Risk-Driven Security and Resiliency, Author: Carol A. Siegel
Title: Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control, Author: R. Thandeeswaran
Title: Secure Computers and Networks: Analysis, Design, and Implementation, Author: Eric A. Fisch
Title: Security Awareness: Grundlagen, Maßnahmen und Programme für die Informationssicherheit, Author: Stefan Beißel
Title: Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control, Author: R. Thandeeswaran
Title: Reverse Deception Organized Cyber Threat Counter-Exploitation, Author: Sean M. Bodmer
Title: Web Application Security, A Beginner's Guide, Author: Bryan Sullivan
Title: Malware, Rootkits, & Botnets, A Beginner's Guide, Author: Christopher C. Elisan
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp

Pagination Links