1-24 of 43 Books
Security Risk Models for Cyber Insurance
Security Risk Models for Cyber Insurance
By David Rios Insua,Caroline Baylon,Jose Vila

Routledge Companion to Global Cyber-Security Strategy
By Scott N. Romaniuk,Mary Manjikian
Internet of Things
Internet of Things
By S. Velliangiri,Sathish A. P. Kumar,P. Karthikeyan

Mainframe basics for security professionals
By Ori Pomerantz,Barbara Vander Weele,Mark Nelson,Tim Hahn
Mobile Technology and Social Transformations
Mobile Technology and Social Transformations
By Stefanie Felsberger,Ramesh Subramanian

Cisco Asa
By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

Securing VoIP networks
By Peter Thermos,Ari Takanen

China and Cybersecurity
By Jon R. Lindsay,Tai Ming Cheung,Derek S. Reveron

Cisco Network Admission Control
By Jazib Frahim,Denise Helfrich,Lou Ronnau,Jason Frazier,Paul Forbes

Cisco NAC appliance
By Jamey Heary,Chad Sullivan,Alok Agrawal,Jerry Lin

SSL and Remote Access VPNs
By Jazib Frahim,Quiang Huang,Aamir Waheed

Understanding PKI
By Carlisle Adams,Carlisle Adams,Steve Lloyd

Mapping security
By Tom Patterson,Scott Gleeson Blue

CCSP self-study
By Grey, Paul CCIE.,Ido Dubrawsky,Paul Grey
Internet of Things
Internet of Things
By Scott J. Shackelford

Intrusion signatures and analysis
By Stephen Northcutt,Mark Cooper,Matt Fearnow,Karen Frederick

Inside network perimeter security
By Stephen Northcutt,Mark T. Edmead,Lenny Zeltser,Scott Winters,Karen Fredrick,Ronald W. Ritchey

Challenges in Cybersecurity and Privacy
By Jorge Bernal Bernabe,Antonio Skarmeta