Computer security

Practical Iot Hacking: The Definitive Guide to Attacking the...

Fotios Chantzis, Evangel Deirme, et al.


Zero Trust Networks

Evan Gilman and Doug Barth


Tribe of Hackers: Cybersecurity Advice from the Best Hackers...

Marcus J. Carey and Jennifer Jin


Developer's Guide to Web Application Security

MD (Hospital for Special Surgery) Cross Michael


Computer Terrorism

Ph D Douglas E Campbell


Distributed Denial of Service Attacks: Real-world Detection...

Richard Brooks and Ilker OEzcelik


Cryptography: The Key to Digital Security, How It Works, and...

Keith (Royal Holloway University of London) Martin


Mastering Microsoft Forefront UAG 2010 Customization

Erez Ben-Ari and Rainier Amara


Diameter: New Generation AAA Protocol - Design, Practice, and...

Hannes Tschofenig, Sebastien Decugis, et al.


Building an Effective Cybersecurity Program

Tari Schreider


Effective Monitoring and Alerting

Slawek Ligus