Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry / Edition 2, Author: Harlan Carvey
Title: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation / Edition 1, Author: Bruce Dang
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory / Edition 1, Author: Michael Hale Ligh
Title: Cryptography Engineering: Design Principles and Practical Applications / Edition 1, Author: Niels Ferguson
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: Group Policy: Fundamentals, Security, and the Managed Desktop / Edition 3, Author: Jeremy Moskowitz
Title: Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Machine Learning and Security: Protecting Systems with Data and Algorithms / Edition 1, Author: Clarence Chio
Title: Foundations of Security: What Every Programmer Needs to Know / Edition 1, Author: Christoph Kern
Title: Gangs and Organized Crime / Edition 1, Author: Gregg W. Etter
Paperback from $77.78 $100.00 Current price is $77.78, Original price is $100.00.
Title: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them / Edition 1, Author: David LeBlanc
Paperback from $39.13 $68.00 Current price is $39.13, Original price is $68.00.
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management / Edition 1, Author: Thomas R. Peltier
Title: A Guide to Kernel Exploitation: Attacking the Core, Author: Enrico Perla B.Sc.
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework / Edition 1, Author: Jessey Bullock
Title: Research Methods for Cyber Security, Author: Thomas W. Edgar
Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition / Edition 2, Author: Aaron LeMasters
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: CISSP Boxed Set 2015 Common Body of Knowledge Edition / Edition 3, Author: Shon Harris

Pagination Links