Computer Security in 2019
Casp+ Comptia Advanced Security Practitioner Certification All-In-One Exam Guide, Second Edition (Exam Cas-003)
by
White, Gregory B., Lane, Nicholas, Conklin, Wm Arthur
It-Revision, It-Audit Und It-Compliance: Neue Ansätze Für Die It-Prüfung
by
Sowa, Aleksandra, Duscha, Peter, Schreiber, Sebastian
Mastering Ethereum
by
Grincalaitis, Merunas
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
by
Gilbert, Karl, Caudill, Benjamin
5G Explained
by
Penttinen, Jyrki T. J.
Security Tokens and Stablecoins Quick Start Guide
by
Kwok, Angela, Sun, Weimin, Wu, Xun (Brian)
Hyperledger Cookbook
by
Zhang, Andrew, Wu, Xun (Brian), Zhang, Chuanfeng
Cybersecurity Blue Team Toolkit
by
Tanner, Nadean H.
Computer Security: A Hands-on Approach
by
Du, Wenliang
Computer & Internet Security: A Hands-on Approach
by
Du, Wenliang
Computer & Internet Security: A Hands-on Approach
by
Du, Wenliang
Internet Security: A Hands-on Approach
by
Du, Wenliang
Cryptology and Error Correction: An Algebraic Introduction and Real-World Applications
by
Childs, Lindsay N.
Active Directory Administration Cookbook
by
Berkouwer, Sander
Essential Firepower: Your best practice guide to configuring Cisco's Next Generation Firewall
by
Tatistcheff, Alex
Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud
by
Aghili, Shaun
Children and Mobile Phones: Adoption, Use, Impact, and Control
by
Gunter, Barrie
A Reference or Randomness Beacons: NiSTIR 8213
by
National Institute of Standards and Tech
Grundlagen Und Anwendung Von Information Security Awareness: Mitarbeiter Zielgerichtet Für Informationssicherheit Sensibilisieren
by
Fertig, Tobias, Weber, Kristin, Schütz, Andreas E.
Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line
by
Troncone, Paul, Albing, Carl
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
by
Sanger, David E.
Securing Telehealth Remote Patient Monitoring Ecosystem: Cybersecurity for the Healthcare Sector
by
National Institute of Standards and Tech
How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
by
Ismail, Haitham
Information Technology Protection and Homeland Security
by
Spellman, Frank R.
Datenschutz beim vernetzten und autonomen Fahren. Welche Rahmenbedingungen können sensible Daten schützen?
by
Kotter, Philip
Advanced Blockchain Development
by
Prusty, Narayan, Bashir, Imran
Cyberdanger: Understanding and Guarding Against Cybercrime
by
Willems, Eddy
Understanding Cyberrisks in IoT: When Smart Things Turn Against You
by
Adaros Boye, Carolina A.
Cyberattaque: Plongez au coeur du blackout @Global Work collection
by
Vagabulle, Angeline, Renard, Jean-Marie
Fundamentals of Smart Contract Security
by
Ma, Richard, Gorzny, Jan, Zulkoski, Edward
The Business of Cybersecurity: Foundations and Ideologies
by
Sathnur, Ashwini
Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide: Volume 1 - General Implementation Guidance
by
National Institute of Standards and Tech
Cyberattaque: Plongez au coeur du blackout !
by
Vagabulle, Angeline, Renard, Jean-Marie
Nichts ist sicher: Tricks und Techniken von Cyberkriminellen verstehen und sich schützen
by
Noors, Alicia, B, Mark
Learn Penetration Testing
by
Pillay, Rishalin
Practice Makes Perfect. Creation of a Penetration Testing Laboratory, Procedures and Tools, Start to Finish
by
Butler, Thomas
The Evolving Israel-China Relationship
by
Chan, Arthur, Shatz, Howard J., Efron, Shira
Practical Information Security: A Competency-Based Education Course
by
Aleroud, Ahmed, Alsmadi, Izzat, Burdwell, Robert
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition
by
Sachowski, Jason
Mastering Malware Analysis
by
Kleymenov, Alexey, Thabet, Amr
String Analysis for Software Verification and Security
by
Alkhalaf, Muath, Bultan, Tevfik, Yu, Fang
Modern Data Strategy
by
Fellows, Lorraine, Fleckenstein, Mike
Anomaly Detection Principles and Algorithms
by
Mohan, Chilukuri K., Huang, Huaming, Mehrotra, Kishan G.
Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists
by
Baer, Tobias
Certified Network Forensic Analysis Manager: Exam Prep Guide
by
Kaplan, Michael I.
Internet Password Organizer: Golden Retriever Dog (Password Log Book)
by
P. K., Peter Paker
Cyber Law in Hong Kong
by
Zhao, Yun
Software Deployment, Updating, and Patching
by
Hanrion, Patrick, Stackpole, Bill
Algebraic Curves in Cryptography
by
Ling, San, Wang, Huaxiong, Xing, Chaoping
Cyberbullying and the Wild, Wild Web: What You Need to Know
by
Hitchcock, J. a.
Internet Password Organizer: Flowers (Password Log Book)
by
P. K., Peter Paker
Hacking Cyberspace
by
Gunkel, David J.
Internet Password Logbook: Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for Quick Easy Access
by
Journals, Practical Blank
Happy 60th Birthday: 60 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Happy 67th Birthday: 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition)
by
Douglas, Karlon, Designs, Level Up
Happy 81st Birthday: 81 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Happy 85th Birthday: 85 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
by
Bauer, Craig P.
Improving your Penetration Testing Skills
by
Teixeira, Daniel, Najera-Gutierrez, Gilberto, Ahmed Ansari, Juned
Attribute Considerations for Access Control Systems: NIST Special Publication 800-205
by
National Institute of Standards and Tech
Securing Cloud and Mobility: A Practitioner's Guide
by
Hourani, Paul, Lim, Ian, Coolidge, E. Coleen
Critical Incident Management
by
Sterneckert, Alan B.
Enhancing Computer Security with Smart Technology
by
Vemuri, V. Rao
Security Management: A Critical Thinking Approach
by
Ricks, Bobby E., Land, Michael, Ricks, Truett
Ethical Hacking: Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking
by
Walker, Brian
Pro Azure Governance and Security: A Comprehensive Guide to Azure Policy, Blueprints, Security Center, and Sentinel
by
De Tender, Peter, Rendon, David, Erskine, Samuel
Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
by
Walker, Brian
(ISC)2 CISSP Certified Information Systems Security Professional Workbook: With 150+ Practice Questions
by
Specialist, Ip
Practical OPNsense: Enterprise firewalls build on open source
by
Stubbig, Markus
Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, W
by
Bradley, Peter
Improving Image Quality in Visual Cryptography
by
Xiang, Yong, Yan, Bin, Hua, Guang
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls
by
Hodson, Christopher J.
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Nist Sp 800-171
by
National Institute of Standards and Tech
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Nist Sp 800-171b
by
National Institute of Standards and Tech
The Ultimate Guide to Anonymity
by
Davis, Vincent
You Are The #1 Target
by
Experts, The World's Leading
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls
by
Hodson, Christopher J.
Blockchain Technology for Global Social Change
by
Bernhardt, Sonja, Thomason, Jane, Kansara, Tia
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
by
Swain, Gandharba
Casino and Gaming Resort Investigations
by
Boss, Derk J., Zajic, Alan W.
SSCP Systems Security Certified Practitioner Practice Exams
by
Mitropoulos, Nick
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security!
by
Dodson, Adam
Casino and Gaming Resort Investigations
by
Zajic, Alan W., Boss, Derk J.
The Face of Online Security and Tips to Help Protect You and Your Family: A guide for protecting the ones you love.
by
Garcia, Katrina R.
Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C
by
National Institute of Standards and Tech
Inside the Dark Web
by
Islam, Rafiqul, Ozkaya, Erdal
Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms: NIST SP 800-175B Rev. 1
by
National Institute of Standards and Tech
CCNA Cyber Ops: SECOPS - Certification Guide 210-255
by
Chu, Andrew
Keeping Track of: Passwords
by
Alison, Susan
Hands-On Microservices with Kubernetes
by
Sayfan, Gigi
Keeping Track of: Passwords
by
Alison, Susan
Battlefield Forensics for Persian Gulf States: Regional and U.S. Military Weapons, Ammunition, and Headstamp Markings
by
Mikko, Don, Bailey, William
DIY VPN: Control Your Own VPN Server
by
Harvey, J.
Real-World Bug Hunting: A Field Guide to Web Hacking
by
Yaworski, Peter
Cyber Law in Mexico
by
Velasco, Cristos
pfSense Essentials: The Complete Reference to the pfSense Internet Gateway and Firewall
by
Reed, Jeremy C.
I Need to Remember: Password Logbook Floral Password Book Organizer to Keep Usernames, Passwords, Web Addresses
by
N. Design, Kelly
Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy
by
Warner, Richard, Sloan, Robert H.
All the Shit I Can't Remember: Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design Gift
by
Brush, The Yellow
How to Achieve Network Security: Using Risk Assessment and Game Theory to Protect Your Systems
by
Halton, Wolf
V: Monogram Letter Initial Internet Password Logbook: Keep track of usernames, passwords, web addresses in one easy and organized location
by
Bonus, 5star
Penetration Testing
by
Karamagi, Robert
White Hat Hacking
by
Karamagi, Robert
Cybersecurity Framework Smart Grid Profile: NIST Technical Note 2051
by
National Institute of Standards and Tech
Die Rechtsstellung des betrieblichen Datenschutzbeauftragten
by
Schindela, André
Passwort Buch: Übersichtliches Passwortbuch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
Opas Passwort Buch: Handliches Passwortbuch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
Mein persönliches Passwort-Buch: Zum Schutz von Zugangsdaten, Passwörtern, Lizenzschlüsseln und persönlichen Codes
by
Lindo, Wilfred
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten von Internet Zugangsdaten
by
Zettelwirtschaft, Nie Wieder
Internet Passwort Manager: Handliches Passwortbuch mit Register zum Verwalten von Passwörtern und Zugangsdaten
by
Zettelwirtschaft, Nie Wieder
Sch**** ich erinnere mich nicht: Handliches Passwort Buch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
100 Top Tips - Stay Safe Online and Protect Your Privacy
by
Vandome, Nick
7 Rules to Influence Behaviour and Win at Cyber Security Awareness
by
Chirag, Joshi D.
Blockchain, Cryptocurrencies & The Future
by
McNicol, Brian, Pannirselvam, Muthu
Don't You Dare Forget Me!: Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift Kitten/Cat Lovers
by
Organizers, Cat &. Dog
CompTIA Security+ Technology Workbook: Second Edition
by
Specialist, Ip
It's Just Your Password Dumb Ass
by
House, Robert
Pentest+ A Practitioners Study Guide
by
Evenden, David
Cissp: Una guía completa para principiantes sobre la seguridad de los sistemas de información (Libro En Español / CISSP Spanish Book Version)
by
Schmidt, Walker
Kali Linux: Kali Linux Made Easy For Beginners And Intermediates; Step By Step With Hands On Projects (Including Hacking and Cyber
by
Craig, Berg
Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications
by
Dooble, Gunther Van, Bertram, Linda a.