Computer Security in 2019
Internet Account And Password: A Book For All Your Passwords 6x9 120 Pages (Large Print Edition)
by
Publishing, Papyrus Harmony
Hands-On Artificial Intelligence for Cybersecurity
by
Parisi, Alessandro
I Definitely Don't Forget My Passwords: Basic Internet Password Keeper Book
by
Press, Fletcher
Pacifying the Homeland: Intelligence Fusion and Mass Supervision
by
McQuade, Brendan
Pacifying the Homeland: Intelligence Fusion and Mass Supervision
by
McQuade, Brendan
Bug Bounty Hunting mit Kali-Linux oder Parrot Security OS: Hacking als Hautberuf oder Nebenjob
by
Noors, Alicia, B, Mark
Blockchain Technology in Internet of Things
by
Zhu, Liehuang, Li, Meng, Gai, Keke
Cybersecurity for Beginners: What You Must Know about Cybersecurity
by
Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity
by
Kovacs, Attila
Cybersecurity for Beginners: How to Get a Job in Cybersecurity
by
Kovacs, Attila
Cybersecurity for Beginners: How to Get a Job in Cybersecurity
by
Kovacs, Attila
Cybersecurity for Beginners: How to Defend Against Hackers & Malware
by
Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
by
Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity
by
Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity, How to Get a Job in Cybersecurity, How to Defend Against Hackers & Malware
by
Kovacs, Attila
Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity
by
Kovacs, Attila
Cybersecurity for Beginners: How to Defend Against Hackers & Malware
by
Kovacs, Attila
Informationssicherheit Und Datenschutz Systematisch Und Nachhaltig Gestalten: Eine Kompakte Einführung in Die Praxis
by
Hanschke, Inge
Ich werde dich niemals vergessen: Einhorn Passwort Buch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by
Jin, Jennifer, Carey, Marcus J.
Ethical Hacking for Beginners: Pre-Engagement Process Execution
by
Kovacs, Attila
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
by
Kovacs, Attila
Ethical Hacking for Beginners: How to Build Your Pen Test Lab Fast
by
Kovacs, Attila
Demystifying Internet of Things Security: Successful Iot Device/Edge and Platform Security Deployment
by
Smith, Ned, Cheruvu, Sunil, Kumar, Anil
Waging Cyber War: Technical Challenges and Operational Constraints
by
Oakley, Jacob G.
The Audit Value Factor
by
Samson, Daniel
Hacking: Wireless Hacking
by
Wagner, Alex
Hacking: 10 Most Dangerous Cyber Gangs
by
Wagner, Alex
Hacking: Beginners Guide, 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks
by
Wagner, Alex
Hacking: Social Engineering Attacks, Techniques & Prevention
by
Wagner, Alex
Hacking: Beginners Guide
by
Wagner, Alex
Hacking: 17 Must Tools Every Hacker Should Have
by
Wagner, Alex
Hacking: 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks
by
Wagner, Alex
Linux for Beginners: How to Install the Linux OS
by
Kovacs, Attila
Linux for Beginners: 37 Linux Commands you Must Know
by
Kovacs, Attila
Linux for Beginners: 3 Books in 1
by
Kovacs, Attila
Hacking with Kali Linux: Penetration Testing Hacking Bible
by
Wagner, Alex
Hacking: Social Engineering Attacks, Techniques & Prevention
by
Wagner, Alex
Hacking: 3 Books in 1
by
Wagner, Alex
Hacking: Hacking Firewalls & Bypassing Honeypots
by
Wagner, Alex
Hacking: 17 Most Dangerous Hacking Attacks
by
Wagner, Alex
Hacking with Kali Linux: Penetration Testing Hacking Bible
by
Wagner, Alex
Hacking: 17 Most Dangerous Hacking Attacks
by
Wagner, Alex
Hacking: Beginners Guide, 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks
by
Wagner, Alex
Linux for Beginners: How to Perform Linux Admin Tasks
by
Kovacs, Attila
Linux for Beginners: 3 Books in 1
by
Kovacs, Attila
Hacking: 17 Must Tools every Hacker should have, Wireless Hacking & 17 Most Dangerous Hacking Attacks
by
Wagner, Alex
Hacking: 10 Most Dangerous Cyber Gangs
by
Wagner, Alex
Hacking: 3 Books in 1
by
Wagner, Alex
Hacking: Hacking Firewalls & Bypassing Honeypots
by
Wagner, Alex
Bitcoin: Invest In Digital Gold
by
Juhasz, Szabolcs
Cryptocurrencies and Blockchain Technology: Cryptocurrencies and Blockchain: 4 Books in 1
by
Söze, Keizer
Cryptocurrencies and Blockchain Technology: Cryptocurrencies and Blockchain: 4 Books in 1
by
Söze, Keizer
Bitcoin: Invest In Digital Gold
by
Juhasz, Szabolcs
Cross Site Scripting: XSS Defense Made Easy
by
Berman, Harvey
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location Gray And White Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Black And White Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Green Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location -Red Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Olive Green Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Gray Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover
by
Pray, Norman M.
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - navy blue Cover
by
Pray, Norman M.
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, & IT Standards
by
Rauschendorfer, David
The Fraud Prevention (FP)101 Handbook: An Illustrated Guide to Consumer Fraud Awareness
by
Tracey, David
Acquiring Card Payments
by
Dubinsky, Ilya
The 2020 California Consumer Privacy Act (CCPA) Definitive Guide: An Applied Solution using NIST 800-171
by
Russo Cissp-Issap Ceh, Mark a.
Smart Card Security: Applications, Attacks, and Countermeasures
by
Gupta, Brij B., Quamara, Megha
Scam Me If You Can: Simple Strategies to Outsmart Today's Rip-off Artists
by
Abagnale, Frank
Commercial Facilities Protection and Homeland Security
by
Spellman, Frank R.
Kali Linux: Kali Linux Made Easy For Beginners And Intermediates Step By Step With Hands On Projects (Including Hacking and Cybers
by
Berg, Craig
Shit I can't remember: Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great gift for for kids,
by
Life, Boss Girl
Securecsocial: Secure Cloud-Based Social Network
by
Senevirathna, Kasun, Atrey, Pradeep
Karma-Based API on Apple Platforms: Building Privacy Into IOS and macOS Apps
by
Carrasco Molina, Manuel
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
by
Lakshmi, Vasantha
Instagram User Guide: The Complete Secrets, Tips, Step by Step Reference to Using Instagram Like a Pro
by
Jones, David
Security Awareness: Grundlagen, Maßnahmen Und Programme Für Die Informationssicherheit
by
Beißel, Stefan
Blockchain and the Law: The Rule of Code
by
de Filippi, Primavera, Wright, Aaron
Sudo Mastery
by
Lucas, Michael W.
I Can't Remember My Password: Password and Username Keeper
by
Publishing, Smw
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud
by
Siepmann, Frank
How to Complete a Risk Assessment in 5 Days or Less
by
Peltier, Thomas R.
Securing Converged IP Networks
by
Macaulay, Tyson
Authentication Codes and Combinatorial Designs
by
Pei, Dingyi
Strategic Information Security
by
Wylder, John
Volunteer Police, Choosing to Serve: Exploring, Comparing, and Assessing Volunteer Policing in the United States and the United Kingdom
by
Jones, Carol Borland, Wolf, Ross
Casting Light on the Dark Web: A Guide for Safe Exploration
by
Beckstrom, Matthew, Lund, Brady
Rsa and Public-Key Cryptography
by
Mollin, Richard A.
Information Security Risk Management for ISO 27001 / ISO 27002
by
Watkins, Steve G., Calder, Alan
Security Software Development: Assessing and Managing Security Risks
by
Ashbaugh, Cissp
Developing Cyber Resilient Systems: A Systems Security Engineering Approach: NIST SP 800-160 Volume 2
by
National Institute of Standards and Tech
Cloud Security Auditing
by
Wang, Yushun, Majumdar, Suryadipta, Madi, Taous
A Hacker, I Am
by
Ford, Craig
A Hacker, I Am
by
Ford, Craig
The Weaponization of AI and the Internet: How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives
by
Bell, Larry
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
by
Carlin, John P., Graff, Garrett M.
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
by
Mitnick, Kevin
Quadratics
by
Mollin, Richard A.
A Practical Guide to Security Engineering and Information Assurance
by
Herrmann, Debra S.
Cybersecurity in the Electricity Sector: Managing Critical Infrastructure
by
Leszczyna, Rafal
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
by
Quade, Phil
Penetration Testing: A guide for business and IT managers
by
Furneaux, Nick, Marchang, Jims
CompTIA Pentest+ Technology Workbook
by
Specialist, Ip
Adopter SharePoint sans développer: SharePoint, Ms Teams: Une gouvernance efficace
by
Poireau, Frank
Gaining Competitive Advantage in the Gray Zon: Response Options for Coercive Aggression Below the Threshold of Major War
by
Hornung, Jeffrey W., Mazarr, Michael J., Morris, Lyle J.
Attracting, Recruiting, and Retaining Successful Cyberspace Operations Officers: Cyber Workforce Interview Findings
by
Payne, Leslie Adrienne, Hardison, Chaitra M., Hamm, John A.
Certified Disaster Response and Recovery Manager: Exam Prep Guide
by
Kaplan, Michael I.
Blockchain: The Insights You Need from Harvard Business Review
by
Tapscott, Don, Review, Harvard Business
Comptia A+ Certification All-In-One for Dummies
by
Tetz, Edward, Clarke, Glen E., Warner, Timothy L.
Ethical Hacking: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment
by
Codings, Zach
Android Security: Attacks and Defenses
by
Misra, Anmol, Dubey, Abhishek
Network Perimeter Security: Building Defense In-Depth
by
Riggs, Cliff
Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques
by
Fung, Benjamin C. M., Wang, Ke, Fu, Ada Wai-Chee
Asset Protection through Security Awareness
by
Speed, Tyler Justin
RC4 Stream Cipher and Its Variants
by
Paul, Goutam, Maitra, Subhamoy
Security Patch Management
by
Nicastro, Felicia
The Art of War for Computer Security
by
Madsen, Tom
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
by
Dunham, Ken, Melnick, Jim
Building an Effective Information Security Policy Architecture
by
Bacik, Sandy
Data-driven Block Ciphers for Fast Telecommunication Systems
by
Moldovyan, Nikolai, Moldovyan, Alexander A.
How to Achieve 27001 Certification: An Example of Applied Compliance Management
by
Willett, Keith D., Arnason, Sigurjon Thor
Computer Forensics: Evidence Collection and Management
by
Newman, Robert C.
Wireless Crime and Forensic Investigation
by
Kipper, Gregory
Data Protection: Governance, Risk Management, and Compliance
by
Hill, David G.
Your Safety and Privacy Online: The CIA and NSA
by
Bjarnason, Siggi
Your Safety and Privacy Online: The CIA and NSA
by
Bjarnason, Siggi
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks
by
Brancik, Kenneth
Binary Analysis Cookbook
by
Born, Michael
Shit I Can't Remember: Password I Can't Remember, Home network information, Software license keys and Credit card information
by
Practices, Best
Learn Ethereum
by
Wu, Xun (Brian), Zou, Zhihong, Song, Dongying
Passwords: A password keeper to secure usernames, internet websites, and passwords, alphabetically organized.
by
Publishing, Cottage Garden
Defeating Communism One More Time: Using the Good of Cyberspace to Stop Chinese Global Aggression
by
Russo Cissp-Issap, Mark a.
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods
by
Raghavan, Lakshmikanth, Merkow, Mark S.
Security of Mobile Communications
by
Boudriga, Noureddine
Architecting Secure Software Systems
by
Talukder, Asoke K., Chaitanya, Manish
Discrete Dynamical Systems and Chaotic Machines: Theory and Applications
by
Bahi, Jacques, Guyeux, Christophe
The I-Coin Explained: The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions
by
Drouin, Maxime
Surviving Security: How to Integrate People, Process, and Technology
by
Andress, Amanda
Sicurezza Informatica - Manuale Principianti: Un ottimo manuale per avvicinarsi al mondo della sicurezza informatica personale
by
Placido, Ruggero
Practical Security Properties on Commodity Computing Platforms: The Uber Extensible Micro-Hypervisor Framework
by
Vasudevan, Amit
The Cognitive Early Warning Predictive System Using the Smart Vaccine: The New Digital Immunity Paradigm for Smart Cities and Critical Infrastructure
by
Termanini, Rocky
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition
by
Yang, Yi Xian, Niu, Xin Xin, Xu, Cheng Qing
FISMA Principles and Best Practices: Beyond Compliance
by
Howard, Patrick D.
Practical PowerShell Security and Compliance Center
by
Scoles, Damian
Blockchain for Decision Makers
by
Tormen, Romain