Books
- The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals
- Securing SQL Server: Protecting Your Database from Attackers
- Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
- Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
- IT Auditing Using Controls to Protect Information Assets, 2nd Edition
- Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
- Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
- Social Engineering: The Art of Human Hacking
- Central Intelligence Agency
- Cyber Attacks: Protecting National Infrastructure
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
- SAP Security and Risk Management (2nd Edition)
- Hacking Exposed Web Applications, 3rd Edition
- Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
- A Guide to Kernel Exploitation: Attacking the Core
- Hacking: The Art of Exploitation: The Art of Exploitation
- Insider Threats in Cyber Security (Advances in Information Security)
- Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
- The Code Book: The Secret History of Codes and Code-breaking
- Surviving Cyberwar
- Understanding Cryptography: A Textbook for Students and Practitioners
- Network Flow Analysis
- McMafia Brain Shot
- Handbook of Financial Cryptography and Security
- Network Security and DDoS: Cooperative Defense against DDoS attack Using GOSSIP protocol
First Previous 3 4 5 6 7 Next Last