Foundations of Cryptography: Volume 2, Basic Applications
Oded Goldreich
Download - Immediately Available
Format: eBook (PDF)
Art of Software Security Assessment, The : Identifying and Preventing Software Vulnerabilities
Mark Dowd
Download - Immediately Available
Format: eBook (PDF)
Java Security : Writing and Deploying Secure Applications
Scott Oaks
Download - Immediately Available
Format: eBook (EPUB)
The Cybersecurity Maturity Model Certification (CMMC) - A pocket guide
William Gamble
Download - Immediately Available
Format: eBook (PDF)
Embedded Security in Cars : Securing Current and Future Automotive IT Applications
Kerstin Lemke
Download - Immediately Available
Format: eBook (PDF)
Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence
Nick Furneaux
Download - Immediately Available
Format: eBook (EPUB)
Transformational Security Awareness : What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Perry Carpenter
Download - Immediately Available
Format: eBook (PDF)
Tribe of Hackers Red Team : Tribal Knowledge from the Best in Offensive Cybersecurity
Marcus J. Carey
Download - Immediately Available
Format: eBook (EPUB)
Tribe of Hackers Blue Team : Tribal Knowledge from the Best in Defensive Cybersecurity
Marcus J. Carey
Download - Immediately Available
Format: eBook (EPUB)
Threat Hunting in the Cloud : Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
Chris Peiris
Download - Immediately Available
Format: eBook (PDF)
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
Download - Immediately Available
Format: eBook (EPUB)
Identity Theft : Everything You Need to Know to Protect Yourself
Gavin Mills
Download - Immediately Available
Format: eBook (PDF)
Windows(R) XP Professional Security
C. J. Weber
Download - Immediately Available
Format: eBook (PDF)
CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting
Syngress
Download - Immediately Available
Format: eBook (PDF)
Hack Proofing Your Identity In The Information Age
Syngress
Download - Immediately Available
Format: eBook (PDF)
Perfect Password : Selection, Protection, Authentication
Mark Burnett
Download - Immediately Available
Format: eBook (PDF)
Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2
Jan De Clercq
Download - Immediately Available
Format: eBook (PDF)
Digital Watermarking and Steganography
Ingemar Cox
Download - Immediately Available
Format: eBook (PDF)
Information Security Architecture : An Integrated Approach to Security in the Organization, Second Edition
Jan Killmeyer
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2(R) Guide to the CISSP(R)-ISSEP(R) CBK(R)
Susan Hansche
Download - Immediately Available
Format: eBook (PDF)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Henri Cohen
Download - Immediately Available
Format: eBook (PDF)
Power Analysis Attacks : Revealing the Secrets of Smart Cards
Stefan Mangard
Download - Immediately Available
Format: eBook (PDF)
Practical Cryptography : Algorithms and Implementations Using C++
Saiful Azad
Download - Immediately Available
Format: eBook (PDF)