Title: Pacifying the Homeland: Intelligence Fusion and Mass Supervision, Author: Brendan McQuade
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson Pre-Order Now
Title: Evasive Malware: Understanding Deceptive and Self-Defending Threats, Author: Kyle Cucci Pre-Order Now
Title: Hacking Exposed 7 Network Security Secrets & Solutions: Network Security Secrets and Solutions, Seventh Edition / Edition 7, Author: Joel Scambray
Title: Application Security Program Guide: Building a Comprehensive Application and Product Security Program, Author: Ahmed Abdul-Rahman
Title: Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking, Author: Jos Weyers
Title: Certified CMMC Assessor Handbook: Developed by CyberDI, Author: J. Gregory Mcverry
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: CompTIA Security+ Certification Study Guide: Network Security Essentials, Author: Ahmed F. Sheikh
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: A Pathology of Computer Viruses, Author: David Ferbrache
Title: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Author: Arvind Narayanan
Title: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing, Author: Ahmed Sheikh
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Author: Rebecca Slayton
Title: The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley

Pagination Links