Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Certificate of Cloud Security Knowledge (CCSK v5) Study Guide: In-Depth Guidance and Practice, Author: Graham Thompson
Title: Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets, Author: Ron Eddings
Title: Everyday Cryptography: Fundamental Principles and Applications, Author: Keith M. Martin
Title: Building a Cyber Risk Management Program: Evolving Security for the Digital Age, Author: Brian Allen
Title: IT-Security und Botnetze. Aktuelle Angriffs- und Abwehrmethoden: Botnetze, Author: Dominik Wagner
Title: CD and DVD Forensics, Author: Paul Crowley
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: How to Cheat at IIS 7 Server Administration, Author: Chris Adams
Title: How to Cheat at Securing Linux, Author: James Stanger
Title: Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices, Author: Andrew Hay
Title: Botnets: The Killer Web Applications, Author: Craig Schiller
Title: Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring, Author: Harlan Carvey
Title: Practical Oracle Security: Your Unauthorized Guide to Relational Database Security, Author: Josh Shaul
Title: Crime Prevention: Theory and Practice, Second Edition, Author: Stephen Schneider
Title: Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape, Author: Akashdeep Bhardwaj
Title: Introduction to Certificateless Cryptography, Author: Hu Xiong
Title: Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition, Author: Kevin Cardwell
Title: Fraud Investigation and Forensic Accounting in the Real World, Author: William L. Jennings
Title: Combating Cyberattacks Targeting the AI Ecosystem: Assessing Threats, Risks, and Vulnerabilities, Author: Aditya Sood

Pagination Links