Penetration tester's open source toolkit /
Managing Cisco network security /
Ethereal : packet sniffing /
Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Network and system security /
Information security risk management for ISO27001/ISO27002 /
Network security evaluation : using the NSA IEM /
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Once More Unto the Breach : Mangaging Information Security in an Uncertain World.
Firewall design and analysis /
Web application security is a stack : how to CYA (Cover Your Apps) completely /
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /
CyberWar, CyberTerror, CyberCrime.
Advances in cyber security : technology, operations, and experiences /
Hack proofing your wireless network /
Google hacking for penetration testers.
Information security best practices : 200 basic rules /
Nokia network security : solutions handbook /
Spring Security.
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Securing the cloud : cloud computer security techniques and tactics /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Who goes there? : authentication through the lens of privacy /
Designing and building enterprise DMZs /
Nessus network auditing /
Alfresco CMIS.
Firm commitment : why the corporation is failing us and how to restore trust in it /
Guanxi and business /
Business Valuation Update Yearbook 2017 /
Challenges for China's development : an enterprise perspective /
Europäisches Unternehmens- und Kapitalmarktrecht : Grundlagen, Stand Und Entwicklung Nebst Texten Und Materialien.
Regulating business for peace : the United Nations, the private sector, and post-conflict recovery /
TUPE : law and practice : a guide to the TUPE regulations /
A Comprehensive Tax History of Nigeria.
Asian business networks /
Theory of the firm for strategic management : economic value analysis /
From head shops to Whole Foods : the rise and fall of activist entrepreneurs /
If I were boss : the early business stories of Sinclair Lewis /
Building dashboards with Microsoft dynamics GP 2013 and Excel 2013 /
Mrs. Tsenhor : a female entrepreneur in ancient Egypt /
The ITSM Iron Triangle : Incidents, Changes and Problems.
The big end of town : big business and corporate leadership in twentieth-century Australia /
Green business : an A-to-Z guide /
Historical encyclopedia of American business /