![book Cyber security and IT infrastructure protection](/covers/files_170/2777000/cb75c6dcec9d17fbf5f9af774fed80d7-g.jpg)
- Author: Vacca John R
- Language: English
- Year: 2014
![book The art of deception: controlling the human element of security](/covers/files_170/2763000/63b8ffebd8d02c58a38c57520f3bfc44-g.jpg)
- Author: Simon William L., Mitnick Kevin D
- Language: English
- Year: 2002
![book The art of deception: controlling the human element of security](/covers/files_170/2763000/822d3ea61c98c2d7bb5c9358a16fe60a-g.jpg)
- Author: Simon William L., Mitnick Kevin D
- Language: English
- Year: 2002
![book Business continuity management system: a complete framework for implementing ISO 22301](/covers/files_170/2763000/1bbb823557acd67dcfd55398372143cf-g.jpg)
- Author: Shi Jianping, Wong Wei Ning Zechariah
- Language: English
- Year: 2015
![book Carry On: Sound Advice from Schneier on Security](/covers/files_170/2761000/5c541c17c981aae2bc247bfce7dd2f0b-g.jpg)
- Author: Schneier Bruce
- Language: English
- Year: 2013
![book Privacy and big data: [the players, regulators, and stakeholders]](/covers/files_170/2751000/b6bbf5b9412abaa38c84b5c49108a90a-g.jpg)
- Author: Terence Craig and Mary E. Ludloff
- Language: English
- Year: 2011
![book The basics of web hacking tools and techniques to attack the Web](/covers/files_170/2740000/1b11e516996763ef57a53aec059130cf-g.jpg)
- Author: Pauli Josh, White Scott
- Language: English
- Year: 2013
![book The art of memory forensics: detecting malware and threats in Windows, Linux, and Mac Memory](/covers/files_170/2715000/b70dfc730a68d0feb66f3185fccc0a45-g.jpg)
- Author: Ligh Michael Hale
- Language: English
- Year: 2014
![book ANDROID SECURITY: attacks and defenses](/covers/files_170/2703000/a3b3489ffa136b70a4d1557a1ece65e3-g.jpg)
- Author: Misra Anmol. Dubey Abhishek
- Language: English
- Year: 2019
![book Seven Deadliest Wireless Technologies Attacks](/covers/files_170/2678000/f5e19930e9f8d56085a3f754364e3808-g.jpg)
- Author: Haines Brad
- Language: English
- Year: 2010