Authentication and Access Control: Practical Cryptography Methods and Tools
- Length: 247 pages
- Publication Date: 2021-01-01
Digital Forensic Investigation of Internet of Things (IoT) Devices
- Length: 293 pages
- Publication Date: 2021-01-10
Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
- Length: 192 pages
- Publication Date: 2020-12-10
Pro Google Cloud Automation: With Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins
- Length: 321 pages
- Publication Date: 2020-12-23
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
- Length: 260 pages
- Publication Date: 2020-08-07
Securing Cloud Services – A pragmatic guide, 2nd Edition
- Length: 472 pages
- Publication Date: 2020-04-09
Linux for Hackers: Learn Cybersecurity Principles With Shell,python,bash Programming Using Kali Linux Tools. A Complete Guide
- Length: 281 pages
- Publication Date: 2020-12-03
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH), 2nd Edition
- Length: 300 pages
- Publication Date: 2016-02-18
Transdisciplinary Perspectives on Risk Management and Cyber Intelligence
- Length: 304 pages
- Publication Date: 2020-08-08