Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Secure Edge Computing: Applications, Techniques and Challenges, Author: Mohiuddin Ahmed
Title: Internet and Wireless Security, Author: J. Regnault
Title: Security in IoT: The Changing Perspective, Author: Rituparna Chaki
Title: CONCURRENCY CONTROL AND RECOVERY IN OLTP SYSTEMS: High Scalability and Availability, Author: Peng Cai
Title: Walling Out the Insiders: Controlling Access to Improve Organizational Security, Author: Michael Erbschloe
Title: Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions, Author: David Pollino
Title: Security in an IPv6 Environment, Author: Daniel Minoli
Title: IT Audit, Control, and Security, Author: Robert R. Moeller
Title: CYBERSECURITY AND LEGAL-REGULATORY ASPECTS, Author: Gabi Siboni
Title: Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing, Author: Willie L. Pritchett
Title: Penetration Testing and Network Defense, Author: Andrew Whitaker
Title: Computer and Information Security Handbook, Author: John R. Vacca
Title: Privacy, Security And Forensics in The Internet of Things (IoT), Author: Reza Montasari
Title: Security Chaos Engineering: Sustaining Resilience in Software and Systems, Author: Kelly Shortridge

Pagination Links