Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Cyber Enigma: Unravelling the Terror in the Cyber World, Author: E. Dilipraj
Title: Python Passive Network Mapping: P2NMAP, Author: Chet Hosmer
Title: Information Hiding in Speech Signals for Secure Communication, Author: Zhijun Wu
Title: Communication System Security, Author: Lidong Chen
Title: Security and Privacy in Social Networks and Big Data: 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings, Author: Mousa Al-kfairy
Title: Safe, Secure, Ethical, Responsible Technologies and Emerging Applications: First EAI International Conference, SAFER-TEA 2023, YaoundƩ, Cameroon, October 25-27, 2023, Proceedings, Author: Franklin Tchakounte
Title: Security in Computing, Author: Charles Pfleeger
Title: Technologies and African Societies in Pandemic Times: Using Technology to Survive and Thrive During the Covid-19 Era, Author: Saikou Diallo
Title: Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing, Author: Willie L. Pritchett
Title: Artificial Intelligence & Blockchain in Cyber Physical Systems: Technologies & Applications, Author: Muhammad Arif
Title: Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals, Author: Constantine Photopoulos
Title: Cyber Resilience System Engineering Empowered by Endogenous Security and Safety, Author: Jiangxing Wu

Pagination Links