Title: PTFM, Author: Tim Bryant
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: Information Security Governance Simplified: From the Boardroom to the Keyboard, Author: Todd Fitzgerald
Title: Security and Control in Information Systems: A Guide for Business and Accounting, Author: Andrew Hawker
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Information Security Governance: A Practical Development and Implementation Approach, Author: Krag Brotby
#92 in Series
Title: Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits, Author: Josh Luberisse
Title: Security Metrics, Author: Andrew Jaquith
Title: The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation, Author: Josh Luberisse
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering, Author: Josh Luberisse
Title: Facing Cyber Threats Head On: Protecting Yourself and Your Business, Author: Brian Minick
Title: Strategic Security Management: A Risk Assessment Guide for Decision Makers, Author: Karim Vellani
Title: SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices, Author: Joey Hirao
Title: Defending the Digital Perimeter Network Security Audit Readiness Strategies, Author: J. L. Parham
Title: Asset Protection through Security Awareness, Author: Tyler Justin Speed
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives, Author: Ron Collette
Title: How to Deploy One Password for Online Securities, Author: Abby Lotts
Title: How to Cheat at Managing Information Security, Author: Mark Osborne

Pagination Links