Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Aggressive Network Self-Defense / Edition 1, Author: Neil R. Wyler
Title: Cyber Strategy: Risk-Driven Security and Resiliency / Edition 1, Author: Carol A. Siegel
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory / Edition 1, Author: Michael Hale Ligh
Title: Security Metrics: Replacing Fear, Uncertainty, and Doubt / Edition 1, Author: Andrew Jaquith
Title: Secrets and Lies: Digital Security in a Networked World / Edition 1, Author: Bruce Schneier
Title: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, Author: TJ O'Connor
Title: A Practical Guide to Digital Forensics Investigations / Edition 2, Author: Darren Hayes
Title: Applied Network Security Monitoring: Collection, Detection, and Analysis, Author: Chris Sanders
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them / Edition 1, Author: David LeBlanc
Paperback from $39.13 $68.00 Current price is $39.13, Original price is $68.00.
Title: Network Security Essentials: Applications and Standards / Edition 6, Author: William Stallings
Title: The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Author: Jason Andress
Title: Security Information and Event Management (SIEM) Implementation / Edition 1, Author: Chris Blask
Title: Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices / Edition 1, Author: William Stallings
Title: Crafting the InfoSec Playbook / Edition 1, Author: Jeff Bollinger
Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition / Edition 2, Author: Aaron LeMasters
Title: Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments, Author: Andy Richter
Title: Security Operations Center: Building, Operating, and Maintaining your SOC / Edition 1, Author: Joseph Muniz
Title: Computer Forensics Infosec Pro Guide / Edition 1, Author: David Cowen

Pagination Links