Title: Hacking with Kali: Practical Penetration Testing Techniques, Author: James Broad
Title: Data-Driven Security: Analysis, Visualization and Dashboards / Edition 1, Author: Jay Jacobs
Title: Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense, Author: Gavin Watson
Title: Smart Grid Security: Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers, Author: Jorge Cuellar
Title: Detecting and Combating Malicious Email, Author: Julie JCH Ryan
Title: Securing VoIP: Keeping Your VoIP Network Safe, Author: Regis J. Jr (Bud) Bates
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security / Edition 1, Author: Will Arthur
Title: Lightweight Cryptography for Security and Privacy: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, Author: Thomas Eisenbarth
Title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails / Edition 1, Author: Christopher Hadnagy
Title: Transactions on Data Hiding and Multimedia Security X, Author: Yun Q. Shi
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Crafting the InfoSec Playbook / Edition 1, Author: Jeff Bollinger
Title: Cyber-Physical Attacks: A Growing Invisible Threat, Author: George Loukas PhD
Title: Dissecting the Hack: The V3rb0t3n Network, Author: Jayson E Street
Title: Network Attacks and Exploitation: A Framework / Edition 1, Author: Matthew Monte
Title: Securing Social Media in the Enterprise, Author: Henry Dalziel
Title: Infosec Management Fundamentals, Author: Henry Dalziel
Title: Next Generation Red Teaming, Author: Henry Dalziel
Title: PCI DSS 3.1: The Standard That Killed SSL, Author: Branden R. Williams

Pagination Links