Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: Linux Server Security: Hack and Defend, Author: Chris Binnie
Title: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Author: Jennifer Minella
Title: A Beginner's Guide To Web Application Penetration Testing, Author: Ali Abdollahi
Title: Windows Security Monitoring: Scenarios and Patterns, Author: Andrei Miroshnikov
Title: Penetration Testing Essentials, Author: Sean-Philip Oriyano
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: The Network Security Test Lab: A Step-by-Step Guide, Author: Michael Gregg
Title: CEH v10 Certified Ethical Hacker Study Guide, Author: Ric Messier
Title: Fundamentals of Information Systems Security, Author: David Kim
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: Managing the Human Factor in Information Security: How to win over staff and influence business managers, Author: David Lacey
Title: Hadoop Security: Protecting Your Big Data Platform, Author: Ben Spivey
Title: Python for Security and Networking - Third Edition: Leverage Python modules and tools in securing your network and applications, Author: Josï Manuel Ortega
Title: Ethical Hacking: A Hands-on Introduction to Breaking In, Author: Daniel G. Graham
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Kerberos: The Definitive Guide: The Definitive Guide, Author: Jason Garman
Title: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts, Author: Nitesh Dhanjani
Title: Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career, Author: Gerald Auger

Pagination Links