Title: Security Controls Evaluation, Testing, and Assessment Handbook / Edition 2, Author: Leighton Johnson
Title: Incident Response and Computer Forensics, Third Edition / Edition 3, Author: Jason T. Luttgens
Title: System Assurance: Beyond Detecting Vulnerabilities, Author: Nikolai Mansourov
Title: Computer Forensics and Digital Investigation with EnCase Forensic v7 / Edition 1, Author: Suzanne Widup
Title: Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization, Author: Tyler Wrightson
Title: Web Archiving, Author: Julien Masanès
Title: Security Metrics, A Beginners Guide / Edition 1, Author: Caroline Wong
Title: SAP Business ONE Implementation, Author: Wolfgang Niefert
Title: Model-Driven Testing: Using the UML Testing Profile, Author: Paul Baker
Title: Cloud Enterprise Architecture / Edition 1, Author: Pethuru Raj
Title: Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions, Author: Thomas W Shinder
Title: Internet-based Control Systems: Design and Applications, Author: Shuang-Hua Yang
Title: Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, Author: Heru Susanto
Title: Review Comment Analysis For E-commerce, Author: Rong Zhang
Title: Introduction to Social Media Investigation: A Hands-on Approach, Author: Jennifer Golbeck
Title: Building an Intelligence-Led Security Program, Author: Allan Liska
Title: Analytical Evaluation of Nonlinear Distortion Effects on Multicarrier Signals / Edition 1, Author: Theresa Araújo
Title: Valuing Data: An Open Framework, Author: Dewey Ray
Title: Social Media Shaping e-Publishing and Academia, Author: Nashrawan Taha
Title: Contracts, Scenarios and Prototypes: An Integrated Approach to High Quality Software, Author: Reinhold Ploesch

Pagination Links