[IMG] Author: Mohammed M. Alani Full Title: Guide To OSI And TCP/IP Models Publisher: Springer; 2014 edition (March 31, 2014) Year: 2014 ISBN-13:...
[IMG] Author: Doug Lowe Full Title: Networking For Dummies, 11th Edition Publisher: For Dummies; 11 edition (May 23, 2016) Year: 2016 ISBN-13:...
[IMG] Author: Frank M. Groom, Kevin Groom, Stephan S. Jones Full Title: Network And Data Security For Non-Engineers Publisher: Auerbach...
[IMG] Author: Leonardo De Marchi, Laura Mitchell Full Title: Hands-On Neural Networks Publisher: Packt Publishing (May 30, 2019) Year: 2019...
[IMG] Author: Nipun Jaswal Full Title: Metasploit Bootcamp Publisher: Packt Publishing (May 25, 2017) Year: 2017 ISBN-13: 9781788297134...
[IMG] Author: Kevin Beaver Full Title: Hacking For Dummies, 5th Edition Publisher: For Dummies; 5 edition (December 21, 2015) Year: 2016 ISBN-13:...
[IMG] Author: Preston de Guise Full Title: Data Protection: Ensuring Data Availability Publisher: Auerbach Publications; 1 edition (February 22,...
[IMG] Author: Hossam Mahmoud Ahmad Fahmy Full Title: Wireless Sensor Networks: Concepts, Applications, Experimentation And Analysis Publisher:...
[IMG] Author: Stuart Fordham Full Title: Cisco ACI Cookbook Publisher: Packt Publishing; 1 edition (May 25, 2017) Year: 2017 ISBN-13:...
[IMG] Author: Vasantha Lakshmi Full Title: Beginning Security With Microsoft Technologies: Protecting Office 365, Devices, And Data Publisher:...
[IMG] Author: Jordan Schroeder Full Title: Advanced Persistent Training: Take Your Security Awareness Program To The Next Level Publisher:...
[IMG] Author: Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam Full Title: Enterprise Cybersecurity Study Guide: How To...
[IMG] Author: Carey Parker Full Title: Firewalls Don't Stop Dragons: A Step-by-Step Guide To Computer Security For Non-Techies, 3rd Edition...
[IMG] Author: Morey J. Haber, Brad Hibbert Full Title: Privileged Attack Vectors: Building Effective Cyber-Defense Strategies To Protect...
[IMG] Author: Marshall Copeland Full Title: Cyber Security On Azure: An IT Professional's Guide To Microsoft Azure Security Center Publisher:...
[IMG] Author: Eric Butow Full Title: Pro iOS Security And Forensics: Enterprise iPhone And iPad Safety Publisher: Apress; 1st ed. edition (July...
[IMG] Author: Agus Kurniawan Full Title: Practical Contiki-NG: Programming For Wireless Sensor Networks Publisher: Apress; 1st ed. edition (June...
[IMG] Author: Aditya Gupta Full Title: The IoT Hacker's Handbook: A Practical Guide To Hacking The Internet Of Things Publisher: Apress; 1st ed....
[IMG] Author: Mike O'Leary Full Title: Cyber Operations: Building, Defending, And Attacking Modern Computer Networks, 2nd Edition Publisher:...
[IMG] Author: Eberhard von Faber, Wolfgang Behnsen Full Title: Secure ICT Service Provisioning For Cloud, Mobile And Beyond. ESARIS: The Answer...
[IMG] Author: Nagendra Kumar Nainar, Yogesh Ramdoss, Yoram Orzach Full Title: Network Analysis Using Wireshark 2 Cookbook, 2nd Edition Publisher:...
[IMG] Author: David Zientara Full Title: Mastering pfSense: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd...
[IMG] Author: TONY CAMPBELL Full Title: Practical Information Security Management: A Complete Guide To Planning And Implementation Publisher:...
[IMG] Author: Ian Neil Full Title: CompTIA Security+ Certification Guide: Master IT security essentials and exam topics for CompTIA Security+...
[IMG] Author: Lee Allen, Kevin Cardwell Full Title: Advanced Penetration Testing For Highly-Secured Environments, 2nd Edition Publisher: Packt...
[IMG] Author: Rowan Udell, Lucas Chan Full Title: AWS Administration Cookbook Publisher: Packt Publishing; 1 edition (April 24, 2017) Year: 2017...
[IMG] Author: Konstantin Ivanov Full Title: KVM Virtualization Cookbook Publisher: Packt Publishing - ebooks Account (July 6, 2017) Year: 2017...
[IMG] Author: Prachi Deshpande, Subhash Sharma, Sateesh K. Peddoju Full Title: Security And Data Storage Aspect In Cloud Computing Publisher:...
[IMG] Author: Lee Atchison Full Title: Architecting For Scale: High Availability For Your Growing Applications Publisher: O'Reilly Media; 1...
[IMG] Author: Hui-Ming Wang, Tong-Xing Zheng Full Title: Physical Layer Security In Random Cellular Networks (SpringerBriefs In Computer Science)...
Separate names with a comma.