Title: Looking Back to the Future of Cyberspace Warfare: Case Studies of Military Operations, Russian Attack on Georgia, U.S. Surge in Iraq, Attack on Iran Nuclear Facility, Land, Maritime, Air Theories, Author: Progressive Management
Title: Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Author: Aviel Rubin Ph.D.
Title: Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition), Author: Samir Kumar Rakshit
Title: 2600 Magazine: The Hacker Quarterly - Autumn 2015, Author: 2600 Magazine
Title: Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security, Author: Bhushan Trivedi
Title: Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work, Author: Scott Gordon
Title: No Domain: The John McAfee Tapes, Author: Mark Eglinton
Title: Implementing DevSecOps with Docker and Kubernetes: An Experiential Guide to Operate in the DevOps Environment for Securing and Monitoring Container Applications, Author: José Manuel Ortega Candel
Title: Making Passwords Secure, Author: Dovell Bonnett
Title: 2019 Cybersecurity Readiness Review: Secretary of the Navy: After Significant Naval Data Losses, Five Critical Pillars - Culture, People, Structure, Processes, and Resources Battling Cyber Threats, Author: Progressive Management
Title: Part 2. On the Creation of the Satoshi Nakamoto and Bitcoin Group., Author: Ayrat Minikhuzin
Title: The Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers, Author: Josh Luberisse
Title: Bitcoin e Criptovalute: Come investire e guadagnare tramite Bitcoin Trading, Ethereum, Blockchain e Digital Assets. Manuale Facile, con Teoria e Pratica, adatto a Principianti (Business by Stefano Maini, #1), Author: Stefano Maini
Title: Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army's Cyber Operations Officer - Recommendations for This Fast-Paced Operational Environment, Author: Progressive Management
Title: OWNED: Why hacking continues to be a problem, Author: Mister Reiner
Title: 2600: The Hacker Digest - Volume 38, Author: 2600 Magazine
Title: Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching, Author: Progressive Management
Title: Addressing Urgent Cyber Threats to Critical Infrastructure: Report of the President's National Infrastructure Advisory Council - Innovative Recommendations Including Creation of Dark Fiber Network, Author: Progressive Management
Title: Navigating the Digital Landscape: Fundamentals, Cybersecurity, Emerging Technologies, and Applications, Author: Eli Kol
Title: Best Dedicated Servers: The Revolutionary Formula For Creating Free Web Hosting, How To Find A Dedicated Server, Safe Servers, Types of Web Hosting, Windows Dedicated Server and Budgeting For Dedicated Servers, Author: Leonardo Bailey

Pagination Links