ePrivacy and GPDR Cookie Consent by Cookie Consent

If you can't find an already rated book, you can rate a new one here.

Explore all books in Computers / Security / Network Security category

Cybersecurity for Executives

Advancing leaders to practical Cyber Risk Management

J. S. Sandhu

Computers / Security / Network Security
🥺 Not rated yet

Kubernetes Security and Observability

Amit Gupta, Brendan Creane

Computers / Security / Network Security
🥺 Not rated yet

Google Cloud Certified Professional Cloud Network Engineer Guide

Design, implement, manage, and secure a network architecture in Google Cloud

Maurizio Ipsale, Mirko Gilioli

Computers / Security / Network Security
🥺 Not rated yet

Security and Privacy in Social Networks and Big Data

7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings

Chia-Wei Lee, Limei Lin, Yuhong Liu

Computers / Security / Network Security
🥺 Not rated yet

AI-Enabled Threat Detection and Security Analysis for Industrial IoT

Farnaz Derakhshan, Hadis Karimipour

Computers / Security / Network Security
🥺 Not rated yet

Take Control of Your Apple ID, 3rd Edition

Glenn Fleishman

Computers / Security / Network Security
🥺 Not rated yet

The CISO’s Transformation

Security Leadership in a High Threat Landscape

Raj Badhwar

Computers / Security / Network Security
🥺 Not rated yet

Ethical Hacking

A Hands-On Introduction to Breaking In

Daniel Graham

Computers / Security / Network Security
🥺 Not rated yet

Fundamentals of Information Systems Security

David Kim, Michael G. Solomon

Computers / Security / Network Security
🥺 Not rated yet

Recent Trends in Blockchain for Information Systems Security and Privacy

Ajith Abraham, Amit Kumar Tyagi

Computers / Security / Network Security
🥺 Not rated yet

Improving your Penetration Testing Skills

Strengthen your defense against web attacks with Kali Linux and Metasploit

Abhinav Singh, Daniel Teixeira, Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Computers / Security / Network Security
🥺 Not rated yet

Hunting Cyber Criminals

A Hacker's Guide to Online Intelligence Gathering Tools and Techniques

Vinny Troia

Computers / Security / Network Security
🥺 Not rated yet

Python Network Programming Techniques

50 real-world recipes to automate infrastructure networks and overcome networking challenges with Python

Marcel Neidinger

Computers / Security / Network Security
🥺 Not rated yet

Securing IoT in Industry 4.0 Applications with Blockchain

P Kaliraj, T. Devi

Computers / Security / Network Security
🥺 Not rated yet

Bug Bounty Bootcamp

The Guide to Finding and Reporting Web Vulnerabilities

Vickie Li

Computers / Security / Network Security
🥺 Not rated yet