Most Popular Books
- Ransomware Life Cycle and How to Combat It
- How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
- Managing Projects in Information Technology
- Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
- Cloud computing. A security analysis





