Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: The DES : An Extensive Documentation and Evaluation of the Data Encryption Standard, Author: Mikael J. Simovits
Title: The Hacker Playbook 3: Practical Guide to Penetration Testing, Author: Peter Kim
Title: The Hacker's Guide to OS X, Author: Alijohn Ghassemlouei
Title: The Language of Cyber Attacks: A Rhetoric of Deception, Author: Aaron Mauro
Title: The Language of Deception: Weaponizing Next Generation AI, Author: Justin Hutchens
Title: The Myths of Security: What the Computer Security Industry Doesn't Want You to Know, Author: John Viega
Title: The Notion of Relevance in Information Science: Everybody knows what relevance is. But, what is it really?, Author: Tefko Saracevic
Title: The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, Author: David Senecal
Title: The Tao Of Open Source Intelligence, Author: IT Governance Publishing
Title: The Zero Trust Framework and Privileged Access Management (PAM), Author: Ravindra Das
Title: They Broke the Internet: Inside the Cyber Attacks That Changed Our World, Author: Dj Fracking Pre-Order Now
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures, Author: National Research Council
Title: Tokenomics, Author: Sean Au
Title: Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop, Author: National Research Council
Title: Trends in Data Protection and Encryption Technologies, Author: Valentin Mulder
Title: Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five, Author: Bruce F. Baker
Title: Trust and Trustworthy Computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings, Author: Michael Huth
Title: Trust in Social Media, Author: Jiliang Tang

Pagination Links