Computer Security in 2019
Information Technology - New Generations: 15th International Conference on Information Technology
by
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
by
Reiber, Lee
Hands-On IoT Solutions with Blockchain
by
Moura, Enio, Santos, Maximiliano
Protect Your Online Identity Like Your Virginity
by
Abhishek Singh Rajpurohit
Auditando Tus Sistemas de Información e Infraestructura de TI: Programas de Auditoría Práctica / Listas de verificación para Auditores Internos
by
Ohia, Nwabueze
Situational Privacy and Self-Disclosure: Communication Processes in Online Environments
by
Masur, Philipp K.
Fire Doesn't Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
by
Boyle, Kip
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace
by
Fang, Binxing
How to Talk to Your Kids About Pornography
by
Educate and Empower Kids, Alexander, Dina
Passwort Logbuch: ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren für Schließfach, Testament, Anwalt...
by
Sültz, Uwe H., Sültz, Renate
Sacmat '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
by
Sacmat
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
by
Graber, Diana
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2018, Volume 1
by
Password Keeper: Save Passwords - Wi-Fi Log-Ins - Software Licenses
by
Simple Start Guides
Passwort Manager - Logbuch - Safe - Internet & Passwort Organizer: ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren für Schließfach, Testament,
by
Wardenga, R. G.
Multi-Photon Quantum Secure Communication
by
Verma, Pramode K., El Rifai, Mayssaa, Chan, Kam Wai Clifford
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
by
Petrenko, Sergei
Mastering Ethereum: Building Smart Contracts and DApps
by
Antonopoulos, Andreas, Wood, Gavin
Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
by
Evans, Lester
Securing Office 365: Masterminding MDM and Compliance in the Cloud
by
Katzer, Matthew
Foundations of Blockchain
by
Raj, Koshik
Implementing Azure: Putting Modern DevOps to Use
by
Klein, Markus, Michalski, Oliver, Klaffenbach, Florian
Computer Vision - Eccv 2018 Workshops: Munich, Germany, September 8-14, 2018, Proceedings, Part II
by
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
by
Augenbaum, Scott
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection
by
Salmani, Hassan
Introduction to Security Reduction
by
Mu, Yi, Susilo, Willy, Guo, Fuchun
Python Network Programming
by
Kathiravelu, Pradeeban, Chou, Eric, Ratan, Abhishek
Mastering Kali Linux for Advanced Penetration Testing - Third Edition: Secure your network with Kali Linux 2019.1 - the ultimate white hat hackers' to
by
Velu, Vijay Kumar, Beggs, Robert
Hands-On Cybersecurity for Finance
by
Aslaner, Milad, Ozkaya, Erdal
Blockchain for Business 2019
by
Lipovyanov, Peter
Hands-On Penetration Testing with Python
by
Khan, Furqan
Practical Security Automation
by
Hsu, Tony
Hash Crack: Password Cracking Manual
by
Picolet, Joshua
Learning Python for Forensics -Second Edition
by
Miller, Preston, Bryce, Chapin
Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications
by
Sethii, Sourabhh, Shivakumar, Shailesh Kumar
Secure Networked Inference with Unreliable Data Sources
by
Vempaty, Aditya, Kailkhura, Bhavya, Varshney, Pramod K.
Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies
by
Qiu, Meikang, Li, Chong
Training Law Enforcement Officers
by
Giovengo, Rick D.
Protecting Your Assets: A Cybersecurity Guide for Small Businesses
by
Schaefer, John a.
Happy 37th Birthday Shithead: Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Happy 51st Birthday Shithead: Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Secure Cloud Transformation: The CIO's Journey
by
Stiennon, Richard
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003
by
Gregg, Michael, Parker, Jeff T.
Hands-On Blockchain for Python Developers
by
Kok, Arjuna Sky
Applied Cryptography in .Net and Azure Key Vault: A Practical Guide to Encryption in .Net and .Net Core
by
Haunts, Stephen
PCI DSS, Breve Guía para el Cumplimiento
by
Ferrini Fonseca, Dante
Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, W
by
Bradley, Peter
The Identity Trade: Selling Privacy and Reputation Online
by
Draper, Nora A.
Security and Data Storage Aspect in Cloud Computing
by
Deshpande, Prachi S., Sharma, Subhash C., Peddoju, Sateesh K.
It-Sicherheit Und Datenschutz Im Gesundheitswesen: Leitfaden Für Ärzte, Apotheker, Informatiker Und Geschäftsführer in Klinik Und Praxis
by
Haßfeld, Stefan, Fedtke, Stephen, Darms, Martin
Adversarial Machine Learning
by
Rubinstein, Benjamin I. P., Joseph, Anthony D., Nelson, Blaine
Cyber Security: Threats and Responses for Government and Business
by
Caravelli, Jack, Jones, Nigel
Data Security in Cloud Computing, Volume I
by
D'Agostino, Giulio
Data Security in Cloud Computing, Volume II
by
D'Agostino, Giulio
Conversations in Cyberspace
by
D'Agostino, Giulio
The California Consumer Privacy Act (CCPA) & NIST 800-171: The 2019 Guide for Business Owners SECOND EDITION
by
Russo Cissp-Issap Ciso, Mark a.
Digital Forensics Basics: A Practical Guide Using Windows OS
by
Hassan, Nihad A.
Mastering Identity and Access Management with Microsoft Azure - Second Edition: Empower users by managing and protecting identities and data, 2nd Edit
by
Nickel, Jochen
Datenschutzrechtliche Aspekte Und Der Einsatz Biometrischer Systeme in Unternehmen: Eine Exemplarische Betrachtung Von Systemen Auf Der Grundlage Des
by
Dotzler, Florian
Adaptive Middleware for the Internet of Things: The GAMBAS Approach
by
Handte, Marcus, Schiele, Gregor, Marrón, Pedro José
Hands-On Application Penetration Testing with Burp Suite
by
Shah, Dhruv, Walikar, Riyaz, Lozano, Carlos a.
Hands-On Penetration Testing with Kali NetHunter
by
Oriyano, Sean-Philip, Singh, Glen D.
Trustworthy Email: NIST Special Publication 800-177
by
National Institute of Standards and Tech
Internet Password Vault: Store all your websites, usernames and passwords, as well as a wealth of other computer-related information in one con
by
Magraw, Alley
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics
by
Yan, Wei Qi
The Truth Machine: The Blockchain and the Future of Everything
by
Vigna, Paul, Casey, Michael J.
EU Personal Data Protection in Policy and Practice
by
Custers, Bart, Sears, Alan M., Dechesne, Francien
Auditing Vostri Sistemi Informativi e dell'Infrastruttura IT: Programmi di Audit Pratici / Liste di Controllo per i Revisori Interni
by
Ohia, Nwabueze
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
by
Oakley, Jacob G.
Im Spannungsfeld zwischen informationeller Selbstbestimmung und öffentlicher Sicherheit: Die Quellen-Telekommunikationsüberwachung und Online-Durchsuc
by
Müller, Julian
Happy 21st Birthday: Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better Than a Birthday Card! (Large Print Edition)
by
Douglas, Karlon, Designs, Level Up
Digital Defense: A Cybersecurity Primer
by
Singh, Indu B., Pelton, Joseph
The Global Cyber-Vulnerability Report
by
Subrahmanian, V. S., Ovelgonne, Michael, Dumitras, Tudor
Architecture for Blockchain Applications
by
Weber, Ingo, Staples, Mark, Xu, Xiwei
2016 Annual Report of Top Cyber Security Incidents
by
Hyslip, Thomas
E-Citizens: Toward a New Model of (Inter)Active Citizenry
by
Ronchi, Alfredo M.
Ransomware life cycle and how to combat it
by
Ismail, Haitham
Drone de seguridad para pymes
by
Rodríguez Hernández, Ramón Alexis
Auditing Uw Windows-Infrastructuur, Intranet En Internetbeveiliging: Een Praktisch Auditprogramma Voor It Assurance-Professionals
by
Ohia, Nwabueze
Auditing van uw BetaalkaartBrocessen, Systemen en Applicaties: Een Stap voor Stap PCIDSS-conform Auditprogramma: Een Praktische Gids voor Betaalkaartm
by
Ohia, Nwabueze
Spot-On Encryption Suite: Democratization of Multiple & Exponential Encryption: - Handbook and User Manual as practical software guide with intr
by
Edwards, Scott, Project, Spot-On Sf Net
A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology
by
Dizon, Michael Anthony C.
NIST 800-171 rev. 1: Post-Secondary Education Cyber-Guidebook
by
Russo Cissp-Issap Ceh, Mark a.
Securing Network Infrastructure
by
Jetty, Sairam, Rahalkar, Sagar
Blockchain Development with Hyperledger
by
Baset, Salman a., Desrosiers, Luc, Gaur, Nitin
Listening in: Cybersecurity in an Insecure Age
by
Landau, Susan
Practical Security: Simple Practices for Defending Your Systems
by
Zabicki, Roman
Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime
by
Iorliam, Aamo
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration tes
by
Sharma, Himanshu
Powershell and Python Together: Targeting Digital Investigations
by
Hosmer, Chet
Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools
by
Jaswal, Nipun
Current Trends in Cyber Security
by
Kent and Du Quenoy, Neil And Irina
Securing the Cloud: Security Strategies for the Ubiquitous Data Center
by
Franklin Jr, Curtis, Chee, Brian
The Cyber Path: The Infrastructure Supporting the Internet Data Flow
by
Giannelli, Lou
Cissp: A Comprehensive Beginners Guide on the Information Systems Security
by
Schmidt, Walker
Big Data Privacy Preservation for Cyber-Physical Systems
by
Pan, Miao, Wang, Jingyi, Errapotu, Sai Mounika
Principi Della Sicurezza Informatica: Become an Ethical Hacker
by
Compare, Giuseppe
Fully Homomorphic Encryption in Real World Applications
by
Chatterjee, Ayantika, Aung, Khin Mi Mi
Deviance in Social Media and Social Cyber Forensics: Uncovering Hidden Relations Using Open Source Information (Osinf)
by
Al-Khateeb, Samer, Agarwal, Nitin
Report of The Attorney General's Cyber Digital Task Force: 2018
by
Department of Justice
Domain Specific High-Level Synthesis for Cryptographic Workloads
by
Chattopadhyay, Anupam, Khalid, Ayesha, Paul, Goutam
Electronic Crime Scene Investigation: A Guide for First Responders
by
Department of Justice
Concurrency Control and Recovery in Oltp Systems: High Scalability and Availability
by
Zhou, Aoying, Cai, Peng, Guo, Jinwei
Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications
by
Möller, Dietmar P. F., Haas, Roland E.
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
by
Swain, Gandharba
Scrm 2.0: 21st Century Supply Chain Risk Management Solutions
by
Russo Cissp-Issap Itilv3, Mark a.
Anonymize Yourself: The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation
by
Instafo, Drake, Derek
Core Data Analysis: Summarization, Correlation, and Visualization
by
Mirkin, Boris
Strategic Security: Forward Thinking for Successful Executives
by
Perois, Jean