Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines 20 USD
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence 20 USD
Securing Social Identity in Mobile Platforms: Technologies for Security, Privacy and Identity Management 20 USD
Cybersecurity Attacks - Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage 20 USD
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud 20 USD