Computer Security in 2016
The Way of the White Hat: Cyber Security Through Penetration Testing
by
Sanchez, Dennis Paul Nino S.
Bring Your Own Device - Ein Praxisratgeber: Hmd Best Paper Award 2014
by
Walter, Thorsten
Security Controls Evaluation, Testing, and Assessment Handbook
by
Johnson, Leighton
Quantum Computational Number Theory
by
Yan, Song Y.
Cybersecurity 101: What You Absolutely Must Know! - Volume 1: Learn How Not to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Clo
by
Scott, James
Cybersecurity 101: What You Absolutely Must Know! - Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecu
by
Scott, James
Learning iOS Penetration Testing
by
Yermalkar, Swaroop
Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare
by
Ferrari, John H.
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-Based Inter-Model Connections
by
Soria-Comas, Jordi, Domingo-Ferrer, Josep, Sánchez, David
Absolute Security: Theory and Principles of Socially Secure Communication
by
Radley, Alan Stuart
Cryptography & Hacking
by
Tech, Solis
Cryptography & Malware
by
Tech, Solis
Circuit Engineering & Cryptography
by
Tech, Solis
Cryptography & CompTIA A+
by
Tech, Solis
Circuit Engineering & Malware
by
Tech, Solis
Hacking & Quality Assurance
by
Tech, Solis
Hacking & Raspberry Pi 2
by
Tech, Solis
Hacking & Comptia A+
by
Tech, Solis
Hacking & Malware
by
Tech, Solis
Cryptography & Raspberry Pi 2
by
Tech, Solis
Cryptography & Human-Computer Interaction
by
Tech, Solis
Cryptography & Robotics
by
Tech, Solis
Securing an It Organization Through Governance, Risk Management, and Audit
by
Sigler, Ken E., Rainey III, James L.
Cryptography & Open Source
by
Tech, Solis
Cryptography & CompTIA A+
by
Tech, Solis
Malware: Malware Detection & Threats Made Easy!
by
Tech, Solis
Social Engineering: Advanced Topics in Computer Security
by
Pechar, Virgil
Scareware: Advanced Topics in Computer Security
by
Halgas, Zachary
The Psychology of Information Security
by
Zinatullin, Leron
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
by
Dykstra, Josiah
Small Business Cyber Security: Your Customers Can Trust You...Right?
by
Anderson, Adam, Gilkeson, Tom
Digitale Fernseh- Und Hörfunktechnik in Theorie Und PRAXIS: Mpeg-Quellcodierung Und Multiplexbildung, Analoge Und Digitale Hörfunk- Und Fernsehstandar
by
Fischer, Walter
IOS Forensics Cookbook
by
Birani, Bhanu, Birani, Mayank
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program
by
Kovacich, Gerald L.
Malware Diffusion Models for Modern Complex Networks: Theory and Applications
by
Karyotis, Vasileios, Khouzani, M. H. R.
Sharing Big Data Safely: Managing Data Security
by
Dunning, Ted, Friedman, Ellen
Computer Access Control: Federated Identity
by
Urlanza, Marcellus
Cryptography: Cryptography Theory & Practice Made Easy!
by
Tech, Solis
Hacking: Hacking For Beginners and Basic Security: How To Hack
by
Hatcher, Jacob
Malware & Raspberry Pi 2
by
Tech, Solis
Malware & Quality Assurance
by
Tech, Solis
Circuit Engineering & Cryptography & Hacking
by
Tech, Solis
Malware & Open Source
by
Tech, Solis
Malware & Robotics
by
Tech, Solis
My Personal Computer Database
by
Nelson, Sandra
Apoc@lypse: O Fim do Antivirus
by
Park, Kil, Amatte, Fernando, Winter, Rogerio
Complete Password Manager
by
Blank Books, Lazaros'
MPLS in the Sdn Era: Interoperable Scenarios to Make Networks Scale to New Services
by
Monge, Antonio Sanchez, Szarkowicz, Krzysztof Grzegorz
Cryptographic Attacks: Computer Security Exploits
by
Krzewinski, Basil
D/DoS: Denial of Service Attacks
by
Aquilina, Antonio
Injection Exploits: Computer Security Exploits
by
Barill, Rueben
scam.con
by
Law, Tom
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
by
Zeigler, Ann D., Rojas, Ernesto F.
Industrial Espionage and Technical Surveillance Counter Measurers
by
Androulidakis, I. I., Kioupakis
Wearable Computing. Datenschutz und Datensicherheit
by
Möller, Mario
Malware + Robotics + Cryptography
by
Tech, Solis
Malware + Robotics + Human-Computer Interaction
by
Tech, Solis
Hacking + Malware + Comptia A+
by
Tech, Solis
Quality Assurance + Cryptography + Raspberry Pi 2
by
Tech, Solis
Robotics + Human-Computer Interaction + Cryptography
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Hacking
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Open Source
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Raspberry Pi 2
by
Fraser, Kenneth
Hacking + Malware + Quality Assurance
by
Tech, Solis
Hacking + Malware + Raspberry Pi 2
by
Tech, Solis
Circuit Engineering + Cryptography + Raspberry Pi 2
by
Tech, Solis
Android Application Pentesting Handbook
by
Huntley, Samuel
Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
by
Marion, Nancy
Introduction to Secure Outsourcing Computation
by
Chen, Xiaofeng
Robotics + Human-Computer Interaction + Malware
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Quality Assurance
by
Fraser, Kenneth
Online Health and Safety: From Cyberbullying to Internet Addiction
by
Schell, Bernadette
Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
by
Marion, Nancy E., Hill, Joshua B.
Mastering Kali Linux Wireless Pentesting
by
Sak, Brian, Reddy, Raghu
Bitcoin Essentials
by
Szmigielski, Albert
Cryptography and Network Security: Principles and Practice
by
Stallings, William
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters
by
Weston J. D., Stephen W., Calhoun, Frederick S.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process
by
Sachowski, Jason
Security of Block Ciphers: From Algorithm Design to Hardware Implementation
by
Sasaki, Yu, Li, Yang, Sakiyama, Kazuo
Kali Linux Web Penetration Testing Cookbook
by
Najera-Gutierrez, Gilberto
Learning Network Forensics
by
Datt, Samir
The Car Hacker's Handbook: A Guide for the Penetration Tester
by
Smith, Craig
Federal Cybersecurity Research and Development Strategic Plan: 2016
by
National Science and Technology Council
Boolean Functions and Their Applications in Cryptography
by
Wu, Chuan-Kun, Feng, Dengguo
Information Security Auditor: Careers in Information Security
by
Goucher, Wendy
Access Control: Understanding Information Sensitivity
by
Greening, Marcus R.
Cybersecurity Investments: Decision Support Under Economic Aspects
by
Beissel, Stefan
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
by
Chapman, Chris
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
by
Bair, John, Shavers, Brett
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen
by
Fleischer, Dirk
Beobachtungsmöglichkeiten Im Domain Name System: Angriffe Auf Die Privatsphäre Und Techniken Zum Selbstdatenschutz
by
Herrmann, Dominik
Cisa Certified Information Systems Auditor Study Guide
by
Cannon, David L.
Hacking: Basic Hacking Fundamental Secrets
by
Dunlop, Steven
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
by
Smith, James
Making Passwords Secure: Fixing the Weakest Link in Cybersecurity
by
Bonnett, Dovell
A Decade of Lattice Cryptography
by
Peikert, Chris
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
by
Carvey, Harlan
Is the OPM Data Breach the Tip of the Iceberg?
by
Subcommittee on Oversight &. Subcommittee
Mastering Wireshark
by
Mishra, Charit
Tradecraft Primer: A Framework for Aspiring Interrogators
by
Topalian, Paul Charles
They Will Do Anything: Identity Theft and Internet Fraud
by
Staley, Wayne L.
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
by
Cardwell, Kevin, Allen, Terry Lee
Selling Information Security to the Board, second edtion
by
Calder, Alan
Mobile Phone Security and Forensics: A Practical Approach
by
Androulidakis, Iosif I.
The Complete Guide to Cybersecurity Risks and Controls
by
Shoemaker, Dan, Sigler, Ken E., Kohnke, Anne
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control
by
Cerrato, Paul
Fundamentals of Information Risk Management Auditing
by
Wright, Christopher
Hacking
by
Spivak, Walter
Social Media Investigation for Law Enforcement
by
Brunty, Joshua, Helenek, Katherine
Decision to Attack: Military and Intelligence Cyber Decision-Making
by
Brantly, Aaron Franklin
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?
by
Subcommittee on Crime and Terrorism of T.
Password Log
by
Log, My Password
Oracle Database 12c Security cookbook
by
Pavlovic, Zoran, Veselica, Maja
Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python
by
Bryce, Chapin, Miller, Preston
Information Security: Policy, Processes, and Practices
by
Goodman, Seymour, Straub, Detmar W., Baskerville, Richard
Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century
by
University, Hacking, Robot
Einführung in Die Kryptographie
by
Buchmann, Johannes
Software Quality Assurance: Integrating Testing, Security, and Audit
by
Mahfuz, Abu Sayed
SUSE Linux Enterprise Server 12 - Security Guide
by
Contributors, Sec Guide
SUSE Linux Enterprise Desktop 12 - Security Guide
by
Contributors, Sec Guide
Hacked!: A warning for small business
by
Lee, Mike, Hitchen, Brian
Pond of Scams
by
Ayoade, Tolu
Hacking SCADA/Industrial Control Systems: The Pentest Guide
by
Atkins, Christopher
Moving Target Defense for Distributed Systems
by
Shetty, Sachin, Song, Min, Yuchi, Xuebiao
Practical Linux Security Cookbook
by
Kalsi, Tajinder
Physical-Layer Security for Cooperative Relay Networks
by
Zou, Yulong, Zhu, Jia
OS X Incident Response: Scripting and Analysis
by
Bradley, Jaron
Securing the Future: TBA
by
Ott, David
Voip and Pbx Security and Forensics: A Practical Approach
by
Androulidakis, Iosif I.
Handbook of SCADA/Control Systems Security
by
Look, Burt G.
IBM i Security Administration and Compliance
by
Woodbury, Carol
Computer Security for The Every Day User: Every day computer security
by
Magara, Michael E.
Linux Server Security: Hack and Defend
by
Binnie, Chris
Threat Forecasting: Leveraging Big Data for Predictive Analysis
by
Pirc, John, Desanto, David, Davison, Iain