Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Practical Lock Picking: A Physical Penetration Tester's Training Guide / Edition 2, Author: Deviant Ollam
Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: Hacking Exposed 7 Network Security Secrets & Solutions: Network Security Secrets and Solutions, Seventh Edition / Edition 7, Author: Joel Scambray
Title: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Author: Johnny Long
Title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails / Edition 1, Author: Christopher Hadnagy
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions / Edition 2, Author: David Cowen
Title: Malware, Rootkits, & Botnets, A Beginner's Guide / Edition 1, Author: Christopher C. Elisan
Title: Machine Learning and Security: Protecting Systems with Data and Algorithms / Edition 1, Author: Clarence Chio
Title: Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1, Author: Dan Farmer
Title: Abstract Algebra: Applications to Galois Theory, Algebraic Geometry, Representation Theory and Cryptography / Edition 2, Author: Celine Carstensen-Opitz
Title: Quantum Information Theory / Edition 2, Author: Mark M. Wilde
Title: Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry / Edition 2, Author: Harlan Carvey
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: Building Blockchain Apps / Edition 1, Author: Michael Yuan
Title: Hacking with Kali: Practical Penetration Testing Techniques, Author: James Broad
Title: Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies, Author: Ira Winkler

Pagination Links