Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Hacking Exposed 7 Network Security Secrets & Solutions: Network Security Secrets and Solutions, Seventh Edition / Edition 7, Author: Joel Scambray
Title: The Network Security Test Lab: A Step-by-Step Guide / Edition 1, Author: Michael Gregg
Title: Stealing the Network: How to Own a Continent, Author: Ryan Russell
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices / Edition 1, Author: William Stallings
Title: A Practical Guide to Digital Forensics Investigations / Edition 2, Author: Darren Hayes
Title: Practical Internet Security / Edition 1, Author: John R. Vacca
Title: Malware, Rootkits, & Botnets, A Beginner's Guide / Edition 1, Author: Christopher C. Elisan
Title: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, Author: TJ O'Connor
Title: Network Security Bible / Edition 2, Author: Eric Cole
Title: CISSP All-in-One Exam Guide, Seventh Edition / Edition 7, Author: Fernando Maymi
Title: Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology, Author: Chet Hosmer
Title: Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft, Author: Eric Cole
Title: Audit and Trace Log Management: Consolidation and Analysis / Edition 1, Author: Phillip Q. Maier
Title: Security, ID Systems and Locks: The Book on Electronic Access Control / Edition 1, Author: Joel Konicek
Title: Chaotic Secure Communication: Principles and Technologies / Edition 1, Author: Kehui Sun
Title: Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings / Edition 1, Author: Frank Stajano
Title: Seven Deadliest Web Application Attacks, Author: Mike Shema
Title: Business Continuity and Disaster Recovery for InfoSec Managers, Author: John Rittinghouse

Pagination Links