1- 20 of 78 results
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Network Attacks and Exploitation: A Framework / Edition 1, Author: Matthew Monte
Title: The Network Security Test Lab: A Step-by-Step Guide / Edition 1, Author: Michael Gregg
Title: Network Security, Firewalls, and VPNs: . / Edition 3, Author: J. Michael Stewart
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: The Death of the Internet / Edition 1, Author: Markus Jakobsson
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Network Control and Engineering for QoS, Security and Mobility II: IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13-15, 2003, Muscat, Oman / Edition 1, Author: Dominique Gaïti
Title: Disaster Recovery Planning for Communic, Author: Leo A Wrobel
Title: Practical Cloud Security: A Cross-Industry View / Edition 1, Author: Jr. Greer
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Secure Communicating Systems: Design, Analysis, and Implementation, Author: Michael R. A. Huth
Title: Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004. / Edition 1, Author: Janusz S. Kowalik
Title: Secure Computer and Network Systems: Modeling, Analysis and Design / Edition 1, Author: Nong Ye
Title: Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code / Edition 1, Author: Michael Ligh
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring
Title: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis / Edition 1, Author: Tony UcedaVelez
Title: Conquest in Cyberspace: National Security and Information Warfare / Edition 1, Author: Martin C. Libicki

Pagination Links