Title: Crafting the InfoSec Playbook / Edition 1, Author: Jeff Bollinger
Title: PDA Security, Author: David Melnick
Title: Meeting People via WiFi and Bluetooth, Author: Henry Dalziel
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Cryptography InfoSec Pro Guide / Edition 1, Author: Sean-Philip Oriyano
Title: Police Use of Force: Important Issues Facing the Police and the Communities They Serve / Edition 1, Author: Michael J. Palmiotto
Title: Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers, Author: Sjouke Mauw
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks, Author: Deviant Ollam
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Cyber Guerilla, Author: Jelle Van Haaster
Title: Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense, Author: Gavin Watson
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring
Title: Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures / Edition 1, Author: Alessandro Aldini
Title: Transactions on Data Hiding and Multimedia Security X, Author: Yun Q. Shi
Title: Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security, Author: T. Bradley
Title: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking, Author: Jennifer Kurtz
Title: Profiling Cop-Killers / Edition 1, Author: Ann R. Bumbak
Title: Trust, Privacy and Security in Digital Business: 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings, Author: Sokratis Katsikas
Title: Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control, Author: Paul Cerrato

Pagination Links