Foundations of Cryptography: Volume 2, Basic Applications
Oded Goldreich
Download - Immediately Available
Format: eBook (PDF)
The Cybersecurity Maturity Model Certification (CMMC) - A pocket guide
William Gamble
Download - Immediately Available
Format: eBook (PDF)
Embedded Security in Cars : Securing Current and Future Automotive IT Applications
Kerstin Lemke
Download - Immediately Available
Format: eBook (PDF)
Windows(R) XP Professional Security
C. J. Weber
Download - Immediately Available
Format: eBook (PDF)
CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting
Syngress
Download - Immediately Available
Format: eBook (PDF)
Hack Proofing Your Identity In The Information Age
Syngress
Download - Immediately Available
Format: eBook (PDF)
Perfect Password : Selection, Protection, Authentication
Mark Burnett
Download - Immediately Available
Format: eBook (PDF)
Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2
Jan De Clercq
Download - Immediately Available
Format: eBook (PDF)
Digital Watermarking and Steganography
Ingemar Cox
Download - Immediately Available
Format: eBook (PDF)
Investigating Cryptocurrencies : Understanding, Extracting, and Analyzing Blockchain Evidence
Nick Furneaux
Download - Immediately Available
Format: eBook (EPUB)
Transformational Security Awareness : What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Perry Carpenter
Download - Immediately Available
Format: eBook (PDF)
Tribe of Hackers Red Team : Tribal Knowledge from the Best in Offensive Cybersecurity
Marcus J. Carey
Download - Immediately Available
Format: eBook (EPUB)
Tribe of Hackers Blue Team : Tribal Knowledge from the Best in Defensive Cybersecurity
Marcus J. Carey
Download - Immediately Available
Format: eBook (EPUB)
Threat Hunting in the Cloud : Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
Chris Peiris
Download - Immediately Available
Format: eBook (PDF)
Information Security Architecture : An Integrated Approach to Security in the Organization, Second Edition
Jan Killmeyer
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2(R) Guide to the CISSP(R)-ISSEP(R) CBK(R)
Susan Hansche
Download - Immediately Available
Format: eBook (PDF)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Practical Cryptography : Algorithms and Implementations Using C++
Saiful Azad
Download - Immediately Available
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
Practical UNIX and Internet Security : Securing Solaris, Mac OS X, Linux & Free BSD
Simson Garfinkel
Download - Immediately Available
Format: eBook (PDF)
Decentralized Applications : Harnessing Bitcoin's Blockchain Technology
Siraj Raval
Download - Immediately Available
Format: eBook (EPUB)
Decentralized Applications : Harnessing Bitcoin's Blockchain Technology
Siraj Raval
Download - Immediately Available
Format: eBook (PDF)