Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: DevSecOps in Oracle Cloud: Securing and Automating Oracle Cloud Infrastructure, Author: Erik Benner
Title: Cybersecurity for Commercial Vehicles, Author: Gloria D'Anna
Title: Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy, Author: Kevin Lynn McLaughlin
Title: Cyber Defense: Best Practices for Digital Safety, Author: Jason Edwards
Title: Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence, Author: Hemang Doshi
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: VCP6-NV Official Cert Guide (Exam #2V0-641), Author: Elver Sena Sosa
Title: Securing and Controlling Cisco Routers, Author: Peter T. Davis
Title: Information Hiding in Speech Signals for Secure Communication, Author: Zhijun Wu
Title: People-Centric Security: Transforming Your Enterprise Security Culture, Author: Lance Hayden
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part I, Author: Saed Alrabaee
Title: Developing Cybersecurity Programs and Policies in an AI-Driven World, Author: Omar Santos
Explore Series
Title: Firewall Policies and VPN Configurations, Author: Syngress

Pagination Links