Apple I Replica Creation

Tom Owad Author
(2005)

Antivirus Engines

Paul A. Gagniuc Author
(2024)

Aggressive Network Self-Defense

Neil R. Wyler Author
(2005)

Asterisk Hacking

Joshua Brashars Author
(2007)

BigNum Math

Tom St Denis Author
(2006)

Botnets

Craig Schiller Author
James R. Binkley Author
(2011)

Buffer Overflow Attacks

Jason Deckard Author
(2005)

Cisco PIX Firewalls

Umer Khan Author
(2005)

Configuring Check Point NGX...

Barry J Stiefel Author
Simon Desmeules Author
(2005)

Configuring Juniper Networks...

Rob Cameron Author
Chris Cantrell Author
(2006)

Securing SQL Server

Denny Cherry Author
(2012)

SQL Injection Attacks and...

Justin Clarke-Salt Author
(2009)

Keys to the Kingdom

Deviant Ollam Author
(2012)

Client-Side Attacks and Defense

Sean-Philip Oriyano Author
Robert Shimonski Author
(2012)

UTM Security with Fortinet

Kenneth Tam Author
Ken McAlpine Author
(2012)

FISMA and the Risk Management...

Daniel R. Philpott Author
Stephen D. Gantz Author
(2012)

The Hacker's Guide to OS X

Alijohn Ghassemlouei Author
Robert Bathurst Author
(2012)

Cybercrime Case Presentation

Brett Shavers Author
(2013)

Cybercrime Investigation Case...

Brett Shavers Author
(2012)

Cybercrime Investigative Case...

Brett Shavers Author
(2013)

X-Ways Forensics Practitioner...

Brett Shavers Author
Eric Zimmerman Author
(2013)

Business Continuity and...

Susan Snedaker Author
(2013)

Digital Forensics Processing...

David Lilburn Watson Author
Andrew Jones Author
(2013)

Eleventh Hour CISSP

Joshua Feldman Author
Seth Misenar Author
(2013)

Unified Communications Forensics

Nicholas Mr. Grant Author
Joseph II Shaw Author
(2013)

Malware Forensics Field Guide...

Eoghan Casey Author
Cameron H. Malin Author
(2013)

Social Engineering...

Gavin Watson Author
Andrew Mason Author
(2014)

Windows Performance Analysis...

Clint Huffman Author
(2014)

Information Hiding in Speech...

Zhijun Wu Author
(2014)

PCI Compliance

Branden R. Williams Author
Anton Chuvakin Author
(2014)

HCISPP Study Guide

Timothy Virtue Author
Justin Rainey Author
(2014)

Introduction to US...

Henry Dalziel Author
(2014)

The Cloud Security Ecosystem

Raymond Choo Author
Ryan Ko Author
(2015)

Infosec Management Fundamentals

Henry Dalziel Author
(2015)

Smart Grid Security

Florian Skopik Editor
Paul Dr. Smith Editor
(2015)

Industrial Network Security

Eric D. Knapp Author
(2024)

Synthetic Media, Deepfakes,...

Cameron H. Malin Author
Matthew Canham Author
(2025)

Professional Penetration Testing

Thomas Wilhelm Author
(2025)

Edge Intelligence

Jawad Ahmad Editor
Shahid Latif Editor
(2026)

Quantum Cryptography and...

Seifedine Kadry Editor
Balamurugan Balasamy Editor
(2026)

The Basics of Digital Forensics

John Sammons Author
(2026)