Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, Author: David LeBlanc
Title: 5G Cyber Risks and Mitigation, Author: Sabhyata Soni
Title: A Pathology of Computer Viruses, Author: David Ferbrache
Title: A Practical Guide to Digital Forensics Investigations, Author: Darren Hayes
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: A Technical Guide to IPSec Virtual Private Networks, Author: James S. Tiller
Title: Access Control Models and Architectures For IoT and Cyber Physical Systems, Author: Maanak Gupta
Title: Advanced Malware Analysis, Author: Christopher C. Elisan
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, Author: Mitsu Okada
Title: Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings, Author: Anupam Datta
Title: Advances in Cryptology - CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings, Author: Don Coppersmith
Title: Advances in Cryptology - CRYPTO '99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings, Author: Michael Wiener
Title: Advances in Cryptology - EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, Author: Lars Knudsen
Title: Advances in Cyber Security and Intelligent Analytics, Author: Abhishek Verma
Title: Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium, Author: Bart De Decker
Title: Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams, Author: Drinor Selmanaj
Title: AI for Big Data-Based Engineering Applications from Security Perspectives, Author: Balwinder Raj
Title: AI-Enabled Threat Detection and Security Analysis for Industrial IoT, Author: Hadis Karimipour

Pagination Links