Search
Now showing items 1-10 of 28
CEH : certified ethical hacker study guide
(Wiley Publishing, Inc., 2010)
Security in computing
(Pearson, 2015)
CISSP: certified information systems security professional : study guide
(Wiley Publishing, Inc., 2011)
Official certified ethical hacker review guide
(Course Technology, Cengage Learning, 2010)
Information security management handbook
(CRC Press, 2009)
Hacking exposed Windows : Microsoft Windows security secrets and solutions
(McGraw-Hill, 2008)
Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations ...
Cryptography and network security : principles and practice
(Pearson, 2017)
This book introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is ...
Cryptography and network security : principles and practice
(Prentice Hall, 2011)
The business-minded chief information security officer : how to organize, evangelize, and operate an enterprise-wide IT risk management program
(Business Expert Press, 2020)
This book describes the thought process and specific activities a leader should consider as they interview for the IT risk/information security leader role, what they should do within their first 90 days, and how to organize, ...
Web commerce security : design and development
(Wiley Publishing, Inc., 2011)