Title: Smart Grid Security: Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers, Author: Jorge Cuellar
Title: Trustworthy Global Computing: 10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 Revised Selected Papers, Author: Pierre Ganty
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Network Attacks and Exploitation: A Framework / Edition 1, Author: Matthew Monte
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Training Law Enforcement Officers / Edition 1, Author: Rick D. Giovengo
Title: Network Security A Beginner's Guide 3/E / Edition 3, Author: Eric Maiwald
Title: Practical Lock Picking: A Physical Penetration Tester's Training Guide / Edition 2, Author: Deviant Ollam
Title: Digital Forensics: Threatscape and Best Practices, Author: John Sammons
Title: Securing VoIP: Keeping Your VoIP Network Safe, Author: Regis J. Jr (Bud) Bates
Title: Cyber-Physical Attacks: A Growing Invisible Threat, Author: George Loukas PhD
Title: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking, Author: Jennifer Kurtz
Title: Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, Author: Nihad Ahmad Hassan
Title: Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, Author: Eric Cole
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring
Title: Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency, Author: John Sullivant
Title: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Author: Johnny Long
Title: Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols, Author: Michael T. Raggo
Title: Cyber Guerilla, Author: Jelle Van Haaster

Pagination Links