ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / Network Security category

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Keep up to date with ethical hacking trends and hone your skills with hands-on activities

Christopher Rees , Dale Meredith

Computers / Security / Network Security

🥺 Not rated yet

A Practical Introduction to Enterprise Network and Security Management

Bongsik Shin

Computers / Security / Network Security

🥺 Not rated yet

Fundamentals of Information Systems Security

David Kim , Michael G. Solomon

Computers / Security / Network Security

🥺 Not rated yet

Practical Cloud Security

Chris Dotson

Computers / Security / Network Security

🥺 Not rated yet

Secrecy, Covertness and Authentication in Wireless Communications

Physical Layer Security Approach

Xiaohong Jiang , Yuanyu Zhang , Yulong Shen

Computers / Security / Network Security

🥺 Not rated yet

Kali Linux Web Penetration Testing Cookbook

Gilberto Nájera-Gutiérrez

Computers / Security / Network Security

🥺 Not rated yet

Designing Secure Systems

Michael Melone

Computers / Security / Network Security

🥺 Not rated yet

Cryptography and Network Security: Principles and Practice, International Edition

Principles and Practice

William Stallings

Computers / Security / Network Security

🥺 Not rated yet

Learning Network Forensics

Samir Datt

Computers / Security / Network Security

🥺 Not rated yet

PCI Compliance

Understand and Implement Effective PCI Data Security Standard Compliance

Branden R Williams , James Adamson

Computers / Security / Network Security

🥺 Not rated yet

Designing and Developing Secure Azure Solutions

Heinrich Gantenbein , Michael Howard , Simone Curzi

Computers / Security / Network Security

🥺 Not rated yet

Kali Linux Cookbook

David De Smet , Willie L. Pritchett

Computers / Security / Network Security

🥺 Not rated yet

Hacking: The Art of Exploitation, 2nd Edition

Jon Erickson

Computers / Security / Network Security

🥺 Not rated yet

Okta Administration: Up and Running

Implement enterprise-grade identity and access management for on-premises and cloud apps

HenkJan de Vries , Lovisa Stenbacken Stjernlof

Computers / Security / Network Security

🥺 Not rated yet

Cyber Crime Investigator's Field Guide

Bruce Middleton

Computers / Security / Network Security

🥺 Not rated yet