Title: AWS Security Cookbook: Practical solutions for securing AWS cloud infrastructure with essential services and best practices, Author: Heartin Kanikathottu
Title: The Complete CCNP Wireless: IAUWS Guide, Author: Stuart Carapola
Title: Técnicas de invasão de sistemas pentest: práticas detalhadas de hacker ético para os novos profissionais do mercado, Author: César Felipe Gonçalves da Silva
Title: Security Issues in Communication Devices, Networks and Computing Models: Volume 1, Author: Budati Anil Kumar
Title: Forense computacional e de redes, Author: Lígia Danta
Title: Wireless Communications Security: Solutions for the Internet of Things, Author: Jyrki T. J. Penttinen
Title: Secure Edge Computing: Applications, Techniques and Challenges, Author: Mohiuddin Ahmed
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams, Author: Wil Allsopp
Title: Threats: What Every Engineer Should Learn From Star Wars, Author: Adam Shostack
Title: LEARN MPLS FROM SCRATCH PART-B: A Beginners guide to next level of networking, Author: POONAM DEVI
Title: Cybersecurity in Healthcare Applications, Author: S Poonkuntran
Title: Nmap Network Exploration and Security Auditing Cookbook: Network discovery and security scanning at your fingertips, Author: Paulino Calderon
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Il rumore dell'hacking, Author: Michal Zalewski
#10 in Series
Title: Guide To Antivirus 101 - Here are the tips that you need to know aBout Antivirus, Author: Healthy Tips
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family, Author: Theresa Payton
Title: Network Anomaly Detection: A Machine Learning Perspective, Author: Dhruba Kumar Bhattacharyya
Title: Bullseye Breach, Author: Greg Scott
Title: Ultimate Hacking Challenge (Hacking the Planet, #3), Author: sparc Flow
#3 in Series

Pagination Links