Title: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Author: Jennifer Minella
Title: Penetration Testing Essentials, Author: Sean-Philip Oriyano
Title: Fundamentals of Information Systems Security, Author: David Kim
Title: The Network Security Test Lab: A Step-by-Step Guide, Author: Michael Gregg
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: Windows Security Monitoring: Scenarios and Patterns, Author: Andrei Miroshnikov
Title: CEH v10 Certified Ethical Hacker Study Guide, Author: Ric Messier
Title: A Beginner's Guide To Web Application Penetration Testing, Author: Ali Abdollahi
Title: Linux Server Security: Hack and Defend, Author: Chris Binnie
Title: Mastering Palo Alto Networks - Third Edition: The complete journey to firewall mastery from setup to advanced security, Author: Tom Piens Aka 'Reaper
Title: The Art of Network Penetration Testing: How to take over any company in the world, Author: Royce Davis
Title: Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures, Author: Alessandro Aldini
Title: Serious Cryptography: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career, Author: Gerald Auger
Title: The Android Malware Handbook: Detection and Analysis by Human and Machine, Author: Qian Han
Title: CC Certified in Cybersecurity Cert Guide, Author: Mari Galloway

Pagination Links