Malware Reverse Engineering: Cracking The Code
Malware Reverse Engineering: Cracking The Codeby: Rob Botwright (Author)Publisher:Pastor Publishing LtdPublication Date:...
Malware Reverse Engineering: Cracking The Codeby: Rob Botwright (Author)Publisher:Pastor Publishing LtdPublication Date:...
Zero Trust Networks: Building Secure Systems in Untrusted Networksby: Razi Rais (Author),Christina Morillo(Author),Evan ...
ICT Systems Security and Privacy Protection: 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14...
Progress in Cryptology – AFRICACRYPT 2023: 14th International Conference on Cryptology in Africa, Sousse, Tunisia,...
Using Science In Cybersecurityby: Metcalf Leigh (Author),Barnes(Author),Spring(Author),Jonathan(Author)&1morePublis...
Grokking Web Application Securityby: Malcolm McDonald (Author)Publisher:Manning Publications Edition:1stPublication Date...
Information Security and Privacy: 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023, Pr...
Mastering AWS Security – Second Edition: Strengthen your cloud environment using AWS security features coupled wit...
Privacy and Identity Management. Sharing in a Digital World: 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer Schoo...
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutionsby:...