Computer Security in 2018
Cybertwists: Hacking and Cyberattacks Explained
by
Hudson, Richard Paul
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far
by
Demopoulos, Ted
Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (Ibac)
by
Almehmadi Phd, Abdulaziz M.
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
by
Tevault, Donald a.
Dokumentationsmanagement - Basis Für It-Governance: 11 Schritte Zur It-Dokumentation
by
Reiss, Manuela
Advanced Penetration Testing: Red Team
by
Knowell, Richard
Ethical Hacking For Beginners: #hack_ethically #hack_smartly
by
Rai, Deepanshu
CCNA Security Study Guide: Exam 210-260
by
McMillan, Troy
Security Content Automation Protocol (SCAP) V 1.3 Validation Program: NiSTIR 7511 R5
by
National Institute of Standards and Tech
Hacking: Guía Completa Del Principiante a la Piratería Informática y Pruebas De Penetración
by
Price, Miles
Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities
by
Tripathy, B. K., Baktha, Kiran
Phishing Attacks: Advanced Attack Techniques
by
Atkins, Christopher
La sicurezza delle informazioni nel contesto evolutivo del binomio comunicazione-informatica
by
Amato, Nicola
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
by
Mahalik, Heather, Tamma, Rohit, Skulkin, Oleg
Lessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure
by
Viira, Toomas
Remove Malware, Spyware and Viruses From Your PC: Guide to increase your computer's security and speed by removing malicious viruses, malware, and spy
by
Mendoza, Hugh
Anomaly Detection Principles and Algorithms
by
Mehrotra, Kishan G., Mohan, Chilukuri K., Huang, Huaming
Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
by
Ng, Alex Chi Keung
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
by
Diogenes, Yuri, Ozkaya, Erdal
String Analysis for Software Verification and Security
by
Bultan, Tevfik, Yu, Fang, Alkhalaf, Muath
An Introduction to Number Theory with Cryptography
by
Kraft, James, Washington, Lawrence
Security with Go
by
Leon, John Daniel
Surveillance Valley: The Secret Military History of the Internet
by
Levine, Yasha
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
by
Lucas, Michael W.
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys
by
Lucas, Michael W.
Practical Information Security: A Competency-Based Education Course
by
Alsmadi, Izzat, Burdwell, Robert, Aleroud, Ahmed
Neutralización del ransomware criptográfico mediante un sistema de almacenamiento sincrónico versionado
by
Martínez García, Holzen Atocha
The Cyber Conundrum: How Do We Fix Cybersecurity?
by
Chronis, Peter K.
The Beast: a.k.a. IT Security
by
Cakir, Murat
The GnuTLS 3.6.1 Manual
by
Mavrogiannopoulos, Nikos, Josefsson, Simon
GNU SASL 1.8 Reference Manual
by
Josefsson, Simon
Romance Scam Survivor: The Whole Sordid Story
by
Marshall, Jan
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet
by
Cole, Eric
Methoden der Hacker erkennen. Schritt für Schritt erklärt: ... erkennen, abwehren sich schützen
by
Franke, Swen
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy
by
White, Kevin
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
by
Mukhopadhyay, Mayukh
Metasploit Penetration Testing Cookbook - Third Edition
by
Teixeira, Daniel, Singh, Abhinav, Agarwal, Monika
Advanced Infrastructure Penetration Testing
by
Chebbi, Chiheb
Blockchain: The Beginners Guide To Understanding The Technology Behind Bitcoin & Cryptocurrency
by
Caro, Artemis
Passwords: Philology, Security, Authentication
by
Lennon, Brian
Artificial Intelligence Tools for Cyber Attribution
by
Simari, Gerardo I., Nunes, Eric, Shakarian, Paulo
Web Penetration Testing with Kali Linux - Third Edition
by
Najera-Gutierrez, Gilberto
Tor And The Deep Web: The Complete Guide To Stay Anonymous In The Dark Net
by
Eddison, Leonard
Dynamic Games for Network Security
by
Dai, Huaiyu, He, Xiaofan
Hands-On Networking with Azure
by
Waly, Mohamed
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide
by
Russo, Cissp-Issap Mark a.
System Security Plan (SSP) Template & Workbook - NIST-based: A Supplement to Blueprint: Understanding Your Responsibilities to Meet NIST 800-171
by
Cissp-Issap, Mark a. Russo
Machine Learning and Security: Protecting Systems with Data and Algorithms
by
Chio, Clarence, Freeman, David
Adversary Detection for Cognitive Radio Networks
by
He, Xiaofan, Dai, Huaiyu
The Secure CIO: How to Hire and retain Great Cyber Security Talent to Protect Your Organisation
by
Pales, Claire
The Decision to Attack: Military and Intelligence Cyber Decision-Making
by
Brantly, Aaron Franklin
Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server
by
Alassouli, Hidaia Mahmooa
Cism Certified Information Security Manager All-In-One Exam Guide [With CD (Audio)]
by
Gregory, Peter H.
Joint Security Management: Organisationsübergreifend Handeln: Mehr Sicherheit Im Zeitalter Von Cloud-Computing, It-Dienstleistungen Und Industrialisie
by
Behnsen, Wolfgang, Von Faber, Eberhard
Animal Biometrics: Techniques and Applications
by
Singh, Sanjay Kumar, Singh, Rishav, Kumar, Santosh
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
by
Donaldson, Scott E., Siegel, Stanley G., Williams, Chris K.
Inside Radio: An Attack and Defense Guide
by
Huang, Lin, Yang, Qing
Learn Social Engineering
by
Ozkaya, Erdal
VMware NSX Cookbook
by
Wibowo, Bayu, Sangha, Tony
Facebook and Other Looming Privacy Scandals
by
Uwaya, John
Industrial Espionage and Technical Surveillance Counter Measurers
by
Androulidakis, I. I., Kioupakis
Quantum Computational Number Theory
by
Yan, Song Y.
Cloud Security Automation
by
Priyam, Prashant
Network Analysis Using Wireshark 2 Cookbook - Second Edition: Practical recipes to analyze and secure your network using Wireshark 2
by
Ramdoss, Yogesh, Orzach, Yoram, Nainar, Nagendra Kumar
Security, Privacy and Trust in the Internet of Things
by
Xiao, Hannan
ABCD of Hacking: The Beginner's Guide
by
K, Shashank Pai
Information Security For The Rest Of Us
by
Concepts LLC, Cr3
Security and Data Reliability in Cooperative Wireless Networks
by
Hassan, Emad
Automation Support for Security Control Assessments: NISTIR 8011 Vol 3
by
National Institute of Standards and Tech
Comprehensive Security for Data Centers and Mission Critical Facilities: (Including EMP Protection)
by
Ayala, Luis
Sicherheit Von Webanwendungen in Der Praxis: Wie Sich Unternehmen Schützen Können - Hintergründe, Maßnahmen, Prüfverfahren Und Prozesse
by
Rohr, Matthias
Boolean Functions and Their Applications in Cryptography
by
Feng, Dengguo, Wu, Chuan-Kun
Privacy's Blueprint: The Battle to Control the Design of New Technologies
by
Hartzog, Woodrow
Lattices Applied to Coding for Reliable and Secure Communications
by
Costa, Sueli I. R., Oggier, Frédérique, Campello, Antonio
Salasanamuistikirja: Muistikirja internetosoitteille ja salasanoille
by
Mainiot Muistikirjat
Information Technology - New Generations: 15th International Conference on Information Technology
by
Random Numbers and Computers
by
Kneusel, Ronald T.
Hacking Healthcare: Understanding Real World Threats
by
Konschak, Colin
Windows Security Monitoring: Scenarios and Patterns
by
Miroshnikov, Andrei
CPTED and Traditional Security Countermeasures: 150 Things You Should Know
by
Perry, Marianna, Fennelly, Lawrence
Information Operations Army, Navy, Air Force, Marines: FM 3-13, NWP 3-13 and JP 3-13
by
Department of Defense
Solidity Programming Essentials: A beginner's guide to build smart contracts for Ethereum and blockchain
by
Modi, Ritesh
CPTED and Traditional Security Countermeasures: 150 Things You Should Know
by
Fennelly, Lawrence, Perry, Marianna
Virtual Private Networks in Theory and Practice
by
Ashraf, Zeeshan
Guide to Computer Forensics and Investigations, Loose-Leaf Version
by
Steuart, Christopher, Nelson, Bill, Phillips, Amelia
The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies
by
Kshetri, Nir
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications
by
Wang, Lingyu, Liu, Wen Ming
Wireless Sensor Networks: Security, Coverage, and Localization
by
Selmic, Rastko R., Phoha, Vir V., Serwadda, Abdul
Moving Target Defense for Distributed Systems
by
Song, Min, Shetty, Sachin, Yuchi, Xuebiao
Algebra for Cryptologists
by
Meijer, Alko R.
Flexible Network Architectures Security: Principles and Issues
by
Rudra, Bhawana
Managing Threats of Cyber-Attacks on Mobile Devices
by
Kithome, Anthony
Mobile Phone Security and Forensics: A Practical Approach
by
Androulidakis, Iosif I.
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
by
Khrais, Hussam
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection
by
Salmani, Hassan
Administrator Firewall Solutions: Admin instruction for security engineer
by
Sangwan, Narender
Windows Server 2016 Security, Certificates, and Remote Access Cookbook
by
Krause, Jordan
Fundamentals of Network Forensics: A Research Perspective
by
Joshi, R. C., Pilli, Emmanuel S.
Ten Laws for Security
by
Diehl, Eric
Cloud Computing Service Metrics Descriptions: NiST SP 500-307
by
National Institute of Standards and Tech
Guide to Industrial Wireless Systems Deployments: NiST AMS 300-4
by
National Institute of Standards and Tech
Introduction to Cyberdeception
by
Rrushi, Julian, Rowe, Neil C.
Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach
by
Lin, Chung-Wei, Sangiovanni-Vincentelli, Alberto
Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
by
Peters, Mark T.
Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging
by
Quick, Darren, Choo, Kim-Kwang Raymond
Wireless Network Security: Second Edition
by
Osterhage, Wolfgang
Cybersecurity Program Development for Business: The Essential Planning Guide
by
Moschovitis, Chris
Mastering pfSense - Second Edition: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4
by
Zientara, David
Management of Information Security, Loose-Leaf Version
by
Mattord, Herbert, Whitman, Michael
Nist 800-171: "beyond Dod: Helfen Bei Der Neuen Bundesweiten Cyber Security Requirements
by
Russo Cissp-Issap, Mark a.
Hacking: 2 Livres En 1: Le Guide Complet Du Débutant Pour Apprendre Le Hacking Éthique Avec Python Avec Des Exemples Pratiques
by
Price, Miles
Hacking: 2 Bücher in 1: Der Vollständige Anfängerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen
by
Price, Miles
Hacking: 2 Libros En 1: La Guía Completa Para Principiantes De Aprendizaje De Hacking Ético Con Python Junto Con Ejemplos Práct
by
Price, Miles
Hacking: 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete Beginner's Guid
by
Price, Miles
Der Grundsatz Der Verfügbarkeit: Ziel, Rechtsstand Und Perspektiven Des Strafrechtlichen Informationsaustauschs in Der Europäischen Union
by
Schmidt, Magdalena
Honeypot Frameworks and Their Applications: A New Framework
by
Xiang, Yang, Ng, Chee Keong, Pan, Lei
Designing Usable and Secure Software with Iris and Cairis
by
Faily, Shamal
Learn Red - Fundamentals of Red
by
Balbaert, Ivo
Practical Network Scanning
by
Singh, Ajay
CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs: Exam: 312-50
by
Specialist, Ip
Physical-Layer Security for Cooperative Relay Networks
by
Zhu, Jia, Zou, Yulong