Privacy Engineering By: Bhajaria Nishant
Managing Catastrophic.. By: Constantine Photopoulos
Counter Terrorism Iss.. By: Castagnera James Ottavio
CompTIA CySA+ Study G.. By: Seidl David
Agile Application Sec.. By: Bell Laura
Art of Mac Malware, V.. By: Wardle Patrick
Hacking By: Jon Erickson
Penetration Testing By: Georgia Weidman
Python Tools for Scie.. By: Vaughan Lee
Serious Cryptography By: Aumasson Jean-Philippe
Building an Effective.. By: Siegel Stanley
CISM Certified Inform.. By: Gregory Peter
loading more results .....