Hands-on red team tactics : a practical guide to mastering red team operations /
Windows forensics cookbook : 61 recipes to help you analyze Windows systems /
Computer forensics : a pocket guide /
Cyber crime, security and digital intelligence /
The insider threat : combatting the enemy within /
Incident response in the age of Cloud : Techniques and best practices to effectively respond to cybersecurity incidents /
Practical cyber intelligence : how action-based intelligence can be an effective response to incidents /
Network security evaluation : using the NSA IEM /
Information security best practices : 200 basic rules /
Information security breaches : avoidance treatment based on ISO27001 /
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Web application security is a stack : how to CYA (Cover Your Apps) completely /
Securing the cloud : cloud computer security techniques and tactics /
Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x /
Constructing cybersecurity : power, expertise and the internet security industry
Cryptography and network security.
Firewall design and analysis /
Cybersecurity governance in Latin America states, threats, and alliances /
Internet privacy rights : rights to protect autonomy /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Hack proofing XML /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Techniques and applications of digital watermarking and content protection /
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Nokia network security : solutions handbook /
Technology and privacy : the new landscape /
Who goes there? : authentication through the lens of privacy /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Managing Cisco network security /
PCI compliance : implementing effective PCI data security standards /
Designing and building enterprise DMZs /
Nessus network auditing /
Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics /