Showing 157 - 164 of 164 results

Search For

Below Are Your Selected Attending Tradeshow


The Art of Intrusion: The Real Stories Behind theExploits of Hackers, Intruders, and Deceivers

The Art of Intrusion:...

by William L. Simon, William L. Simon
  • Published in 2005
  • 288
The CISM Prep Guide: Mastering the Five Domainsof Information Security Management

The CISM Prep Guide: M...

by Ronald L. Krutz, Russell Dean Vines
  • Published in 2003
  • 456
Social Engineering: The Art of Human Hacking

Social Engineering: Th...

by Christopher Hadnagy
  • Published in 2010
  • 416
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Second Edition

The Shellcoder's Handb...

by Gerardo Richarte, John Heasman, Felix Lindner, Gerardo Richarte
  • Published in 2007
  • 744
Modern Cryptanalysis: Techniques for Advanced Code Breaking

Modern Cryptanalysis:...

by Christopher Swenson
  • Published in 2008
  • 264
Security Standards in a Web + 2.0 World - AStandards-Based Approach

Security Standards in...

by Carlos Curtis Solari
  • Published in 2009
  • 296
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Hacking Point of Sale:...

by Slava Gomzin
  • Published in 2014
  • 312
The Realities of Securing Big Data

The Realities of Secur...

  • Published in 2014
  • 304

Showing 157 - 164 of 164 results

loading