Cyber Spying Tracking Your...

Eric Cole Author
Michael Nordfelt Author
(2005)

Microsoft Log Parser Toolkit

Gabriele Giuseppini Author
Mark Burnett Author
(2005)

Next Generation SSH2...

Dale Liu Author
(2011)

Skype Me! From Single User to...

Markus Daehne Author
(2005)

Stealing the Network

Johnny Long Author
Timothy Mullen Author
(2011)

Game Console Hacking

Joe Grand Author
Albert Yarusso Author
(2004)

Hacking the Code

Mark Burnett Author
(2004)

Richard Thieme's Islands in...

Richard Thieme Author
(2004)

Perfect Password

Mark Burnett Author
(2006)

Seven Deadliest Microsoft...

Rob Kraus Author
Naomi Alpern Author
(2010)

C# For Java Programmers

Harold Cabrera Author
(2002)

Citrix XenDesktop Implementation

Gareth R. James Author
(2010)

Security for Microsoft...

Derrick Rountree Author
(2011)

Web Application Obfuscation

Mario Heiderich Author
Eduardo Alberto Vela Nava Author
(2011)

Securing SQL Server

Denny Cherry Author
(2010)

Cryptography for Developers

Tom St Denis Author
(2006)

E-discovery

Karen A. Schuler Author
(2011)

Hack Proofing Your Identity...

Syngress Author
(2002)

iPhone and iOS Forensics

Andrew Hoog Author
Katie Strzempka Author
(2011)

Juniper(r) Networks Secure...

Rob Cameron Author
Neil R. Wyler Author
(2011)

Microsoft Virtualization

Thomas Olzak Author
James Sabovik Author
(2010)

Mobile Malware Attacks and...

Ken Dunham Author
(2008)

Ruby Developers Guide

Syngress Author
(2002)

SQL Injection Attacks and...

Justin Clarke-Salt Author
(2009)

XSS Attacks

Seth Fogie Author
Jeremiah Grossman Author
(2011)

Nagios 3 Enterprise Network...

Andrew Hay Author
Max Schubert Author
(2008)

Industrial Network Security

Eric D. Knapp Author
Joel Thomas Langill Author
(2011)

Seven Deadliest Social...

Carl Timm Author
Richard Perez Author
(2010)

Seven Deadliest USB Attacks

Brian Anderson Author
Barbara Anderson Author
(2010)

CISSP Study Guide

Eric Conrad Author
Seth Misenar Author
(2012)

Information Security Risk...

Mark Talabis Author
Jason Martin Author
(2012)

Augmented Reality

Joseph Rampolla Author
Greg Kipper Author
(2012)

Logging and Log Management

Kevin Schmidt Author
Chris Phillips Author
(2012)

Placing the Suspect Behind...

Brett Shavers Author
(2013)

Assessing Vendors

Josh More Author
(2013)

Risk Management Framework

James Broad Author
(2013)

Cloud Storage Forensics

Darren Quick Author
Ben Martini Author
(2013)

Cyber Crime and Cyber...

Babak Akhgar Editor
Andrew Staniforth Editor
(2014)

Building an Information...

Bill Gardner Author
Valerie Thomas Author
(2014)

Detecting and Combating...

Julie JCH Ryan Author
Cade Kamachi Author
(2014)

Information Security Analytics

Mark Talabis Author
Jason Martin Author
(2014)

How to Define and Build an...

Henry Dalziel Author
Eric Olson Editor
(2014)

Hacking Web Intelligence

Sudhanshu Chauhan Author
Nutan Kumar Panda Author
(2015)

Securing SQL Server

Denny Cherry Author
(2015)

Securing Social Media in the...

Henry Dalziel Author
(2015)

Automated Security Analysis...

Henry Dalziel Author
Ajin Abraham Author
(2015)

Threat Forecasting

John Pirc Author
David DeSanto Author
(2016)

Handbook of System Safety and...

Edward Griffor Editor
(2016)

Hacking Wireless Access Points

Jennifer Kurtz Author
(2016)

Federal Cloud Computing

Matthew Metheny Author
(2017)