Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Hacking Exposed 7 Network Security Secrets & Solutions: Network Security Secrets and Solutions, Seventh Edition / Edition 7, Author: Joel Scambray
Title: The Network Security Test Lab: A Step-by-Step Guide / Edition 1, Author: Michael Gregg
Title: Stealing the Network: How to Own a Continent, Author: Ryan Russell
Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices / Edition 1, Author: William Stallings
Title: A Practical Guide to Digital Forensics Investigations / Edition 2, Author: Darren Hayes
Title: Practical Internet Security / Edition 1, Author: John R. Vacca
Title: Malware, Rootkits, & Botnets, A Beginner's Guide / Edition 1, Author: Christopher C. Elisan
Title: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, Author: TJ O'Connor
Title: Network Security Bible / Edition 2, Author: Eric Cole
Title: CISSP All-in-One Exam Guide, Seventh Edition / Edition 7, Author: Fernando Maymi
Title: Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology, Author: Chet Hosmer
Title: Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft, Author: Eric Cole
Title: Fundamentals of Network Security / Edition 1, Author: Eric Maiwald
Title: Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions / Edition 3, Author: Tony Bradley
Title: Hacking Exposed Web Applications / Edition 3, Author: Caleb Sima
Title: Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers / Edition 1, Author: Andrew S. Patrick
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Trustworthy Global Computing: International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005. Revised Selected Papers / Edition 1, Author: Rocco De Nicola

Pagination Links