Showing 49 - 60 of 263 results

Search Titles

Below Are Your Selected Attending Tradeshow


Red Fox: Vulnerability Analysis and Exploit Mitigation Internals for Mobile and IoT

Red Fox: Vulnerability...

by Maria Markstedter
Blue Fox: Arm Assembly Internals and Binary Analysis of Mobile and IoT Devices

Blue Fox: Arm Assembly...

by Maria Markstedter
Kali Linux Penetration Testing Bible

Kali Linux Penetration...

by Gus Khawaja
  • Published in 2021
  • 400
Cyber Operations: A Case Study Approach

Cyber Operations: A Ca...

by Jerry M. Couretas
Cybersecurity and Decision Makers - Data Securityand Digital Trust

Cybersecurity and Deci...

by Marie De Fréminville
  • Published in 2020
  • 220
Politics of Religious Accommodation

Politics of Religious...

by Dr. Dan Mou , Seseer P. Mou
  • Published in 2019
  • 196
Cybersecurity For Dummies

Cybersecurity For Dumm...

by Joseph Steinberg
  • Published in 2019
  • 368
Security Fundamentals

Security Fundamentals

by Crystal Panek
  • Published in 2019
  • 275
Privacy, Regulations, and Cybersecurity: The Essential Business Guide

Privacy, Regulations,...

by Chris Moschovitis
Securing of an African Giant

Securing of an African...

by Dr. Dan Mou
  • Published in 2019
  • 1217
Securing of an African Giant

Securing of an African...

by Dr. Dan Mou
  • Published in 2019
  • 1261

Showing 49 - 60 of 263 results

loading