Penetration tester's open source toolkit /
Advances in cyber security : technology, operations, and experiences /
CyberWar, CyberTerror, CyberCrime.
Security testing handbook for banking applications /
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Securing cloud services : a pragmatic approach to security architecture in the cloud /
Misbehavior in Cyber Places : the Regulation of Online Conduct in Virtual Communities on the Internet.
Hack proofing your wireless network /
Trust in cyberspace /
Hack proofing Sun Solaris 8 /
An introduction to hacking and crimeware : a pocket guide /
Network and system security /
Information security risk management for ISO27001/ISO27002 /
Designing and building enterprise DMZs /
VoIP security /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /
Information security best practices : 200 basic rules /
Internet of things : emergence, perspectives, privacy and security issues /
Firewall design and analysis /
Securing the cloud : cloud computer security techniques and tactics /
Behind the search box : Google and the global internet industry /
Google's PageRank and Beyond - the Science of Search Engine Rankings.
CHERCHER ET ENQUETER AVEC INTERNET.
Google hacking for penetration testers.
Entrepreneur magazine's ultimate guide to Google Ads /
Google and the culture of search /
Cybersecurity governance in Latin America states, threats, and alliances /
Internet privacy rights : rights to protect autonomy /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Hack proofing XML /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Techniques and applications of digital watermarking and content protection /
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Nokia network security : solutions handbook /
Cyber crime, security and digital intelligence /
Technology and privacy : the new landscape /
Who goes there? : authentication through the lens of privacy /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /