Applied Cyber Security and...

Eric D. Knapp Author
Raj Samani Author
(2013)

Applied Network Security...

Chris Sanders Author
Jason Smith Author
(2013)

Advanced Persistent Threat

Eric Cole Author
(2012)

Stealing the Network

Cyber-Fiction (Series)

Ryan Russell Author
Joe Grand Author
(2004)

Stealing the Network

Ryan Russell Author
Peter A Riley Author
(2005)

Microsoft Windows Server 2008...

Dustin Hannifin Author
(2010)

Designing a Wireless Network

Syngress Author
(2001)

Google Hacking for...

Bill Gardner Author
Johnny Long Author
(2011)

VB.Net Web Developer's Guide

Syngress Author
(2001)

Microsoft Windows 7...

Jorge Orchilles Author
(2010)

Security Risk Management

Evan Wheeler Author
(2011)

Managing Information Security

John R. Vacca Editor
(2010)

The Official CHFI Study Guide...

Dave Kleiman Author
(2011)

Coding for Penetration Testers

Jason Andress Author
Ryan Linn Author
(2011)

Seven Deadliest Network Attacks

Stacy Prowell Author
Rob Kraus Author
(2010)

Seven Deadliest Wireless...

Brad Haines Author
(2010)

Violent Python

TJ O'Connor Author
(2012)

Windows 2012 Server Network...

Derrick Rountree Author
(2013)

The Wireshark Field Guide

Robert Shimonski Author
(2013)

Introduction to Cyber-Warfare

Paulo Shakarian Author
Jana Shakarian Author
(2013)

Practical Anonymity

Peter Loshin Author
(2013)

FISMA Compliance Handbook

Laura P. Taylor Author
(2013)

Network and System Security

John R. Vacca Editor
(2013)

Cyber Warfare

Jason Andress Author
Steve Winterfeld Author
(2013)

Computer Incident Response...

Leighton Johnson Author
(2013)

Social Media Security

Michael Cross Author
(2013)

The Basics of IT Audit

Stephen D. Gantz Author
(2013)

Investigating Internet Crimes

Todd G. Shipley Author
Art Bowker Author
(2013)

The Basics of Digital Privacy

Denny Cherry Author
(2013)

Windows Forensic Analysis...

Harlan Carvey Author
(2014)

Python Forensics

Chet Hosmer Author
(2014)

Hacking and Penetration...

Philip Polstra Author
(2014)

CSA Guide to Cloud Computing

Raj Samani Author
Brian Honan Author
(2014)

Cyber Reconnaissance,...

Robert Shimonski Author
(2014)

Designing and Building...

David Nathans Author
(2014)

Building an Intelligence-Led...

Allan Liska Author
(2014)

Google Earth Forensics

Michael Harrington Author
Michael Cross Author
(2014)

How to Defeat Advanced Malware

Henry Dalziel Author
Simon Crosby Editor
(2014)

Industrial Network Security

Eric D. Knapp Author
Joel Thomas Langill Author
(2014)

The Basics of Digital Forensics

John Sammons Author
(2014)

Introduction to Social Media...

Jennifer Golbeck Author
(2015)

Python Passive Network Mapping

Chet Hosmer Author
(2015)

Dissecting the Hack

Jayson E Street Author
(2015)

Next Generation Red Teaming

Henry Dalziel Author
(2015)

PCI DSS 3.1

Branden R. Williams Author
(2015)

Operating System Forensics

Ric Messier Author
(2015)

Practical Deployment of Cisco...

Andy Richter Author
Jeremy Wood Author
(2015)

Breaking into Information...

Josh More Author
Anthony J. Stieber Author
(2015)

Theoretical and Experimental...

Iraj Sadegh Amiri Author
Mohammad Reza Khalifeh Soltanian Author
(2015)

Digital Forensics

John Sammons Editor
(2015)