Computer Security in 2019
Practical Cryptography in Python: Learning Correct Cryptography by Example
by
Monson, Christopher K., Nielson, Seth James
Kali Linux: Guía completa para principiantes aprende Kali Linux paso a paso (Libro En Español/Kali Linux Spanish Book Version)
by
Thorpe, Ethan
Developing Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers
by
Garg, Mohit, Mayank, Manas
Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector NIST SP 1800-24
by
National Institute of Standards and Tech
The Data Protection Officer: IDSolves.com
by
Williams, Adams Choubey
When Autonomous Vehicles Are Hacked, Who Is Liable?
by
Winkelman, Zev, Buenaventura, Maya, Anderson, James M.
It Auditing Using Controls to Protect Information Assets, Third Edition
by
Kegerreis, Mike, Schiller, Mike, Davis, Chris
Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home
by
Schober, Craig W., Schober, Scott N.
Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home
by
Schober, Scott N., Schober, Craig W.
Cyber Resilience
by
Petrenko, Sergei
The IoT Architect's Guide to Attainable Security and Privacy
by
Fagbemi, Damilare D., Wheeler, Jc, Wheeler, David M.
Codes: The Guide to Secrecy From Ancient to Modern Times
by
Mollin, Richard A.
Foundations of Information Security: A Straightforward Introduction
by
Andress, Jason
Secure Programming of Web Applications: Web Application Security for Software Developers and Project Managers
by
Hissen, Frank
Hacking: The Secret Behind iCloud
by
Youness, Serghini
The Giant Black Book of Computer Viruses
by
Ludwig, Mark
Oops! I Forgot Password
by
Hall, Dorothy J.
Don't forget! password: Keep your usernames, social info, passwords, web addresses and security question in one. So easy & organized
by
Hall, Dorothy J.
Password manager: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized
by
Hall, Dorothy J.
Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks
by
Genics, Trust
Learning CoreDNS: Configuring DNS for Cloud Native Environments
by
Belamaric, John, Liu, Cricket
Hack Proof Your Business
by
Morgan, Jeri, Daley, Michael, Kistler, John
Apple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments
by
La Counte, Scott
Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
by
Codings, Zach
Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace
by
Marcinek, Krystyna, Hodgson, Quentin E., Ma, Logan
Personal Password Keeper: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized
by
Hall, Dorothy J.
Ethical Hacking: The Complete Beginners Guide to Basic Security and Penetration Testing
by
Stanford, Marc
Omas Passwort Buch: Praktisches Passwortbuch mit Register zum Verwalten von Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
Ich habe das sch*** Passwort schon wieder vergessen: Handliches Passwort Buch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
The Ethical Hack: A Framework for Business Value Penetration Testing
by
Tiller, James S.
Opas Passwort Buch: Übersichtliches Passwortbuch mit Register zum Verwalten von Passwörtern und Zugangsdaten
by
Zettelwirtschaft, Nie Wieder
Ich werde dich niemals vergessen: Diskretes Passwortbuch mit A-Z Register zum Verwalten von Internet Zugangsdaten
by
Zettelwirtschaft, Nie Wieder
Big Seven Study (2016): 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality Review & Audit of
by
Maier, Ann-Kathrin, Adams, David
Passwortbuch für Vergessliche: Praktisches Passwort Buch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten und PINs - Mit Hanfmotiv
by
Zettelwirtschaft, Nie Wieder
Pssst... Top Secret: Handliches Passwort Buch mit Register zum Verwalten von geheimen Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
Ciber Seguridad: Guía completa para principiantes aprende los conceptos básicos y los métodos eficaces de la ciber seguridad (Libro En
by
Walker, Brian
Passwort Buch: Handliches Passwortbuch mit Register zum Verwalten von Passwörtern, Lizenzschlüsseln und PINs - Schweigende Frau Motiv
by
Zettelwirtschaft, Nie Wieder
Sch**** ich erinnere mich nicht: Handliches Passwort Buch mit Register zum Verwalten von Passwörtern und Zugangsdaten - Mit schönen Blumenmuster
by
Zettelwirtschaft, Nie Wieder
Hacking Ético: Guía completa para principiantes para aprender y entender los reinos del hacking ético (Libro En Español/Ethical Hacki
by
Walker, Brian
Mobile Security in Ethical Hacking: by Zahid Wadiwale
by
Wadiwale, Mohammed Zahid
Certified Cyber Incident Response Manager: Exam Prep Guide
by
Kaplan, Michael I.
Ich kenne deine dunkelsten Geheimnisse: Handliches Passwortbuch mit A-Z Register zum Verwalten von Passwörtern, Zugangsdaten, PINs und Puks
by
Zettelwirtschaft, Nie Wieder
Cyber Security: The Lifeline of Information and Communication Technology
by
Rohokale, Vandana, Prasad, Ramjee
Sch**** ich erinnere mich nicht: Hilfreiches Passwortbuch mit A-Z Register zum Verwalten von persönlichen Passwörtern, Zugangsdaten und PINs
by
Zettelwirtschaft, Nie Wieder
Elementary Information Security
by
Smith, Richard E.
It Governance: An International Guide to Data Security and ISO 27001/ISO 27002
by
Watkins, Steve, Calder, Alan
It Governance: An International Guide to Data Security and ISO 27001/ISO 27002
by
Calder, Alan, Watkins, Steve
Blockchain 2035: The Digital DNA of Internet 3.0
by
Tate, Jared C., Knapp, Andrew D.
System Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World
by
Ljubuncic, Igor, Litterer, Tom
I Know Your Dirty Little Secret: Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs
by
Publishing, Secure
I'll Never Forget You: Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design
by
Publishing, Secure
Networking for Beginners: An Easy Guide to Learning Computer Network Basics. Take Your First Step, Master Wireless Technology, the OSI Model, IP
by
Scott, Russell
Building an Effective Cybersecurity Program
by
Schreider, Tari
Oracle Database Application Security: With Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager
by
Mustafa, Osama, Lockard, Robert P.
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology a
by
Walker, Benjamin
Deaver on Cybersecurity: An irreverent and honest exposé of the online security problem, complete with a candid and thorough reveal of its solution
by
Deaver, Frederic Scott
Computer Security Fundamentals
by
Easttom II
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communic
by
Walker, Benjamin
Screen-Obsessed: Parenting in the Digital Age
by
Lwin, May O., Shin, Wonsun
Kali linux: learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools
by
Harris, Adam
Puzzles on Cypercrime and God's Mathematics
by
Ting, John
Das S-Netzwerk Und Sein Wirtschaftliches Potenzial: Die Möglichkeiten Des S-Webs Und Der Jadwirtschaft Mit Der Einweg-Währung Jad
by
Viehmann, Johannes
Deaver on Cybersecurity: An irreverent and honest exposé of the online security problem, complete with a candid and thorough reveal of its solution
by
Deaver, Frederic Scott
Ransomware Revealed: A Beginner's Guide to Protecting and Recovering from Ransomware Attacks
by
Hassan, Nihad A.
The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy
by
Bancroft, Angus
Wireshark Workbook 1: Practice, Challenges, and Solutions
by
Chappell, Laura
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
by
Grimes, Roger A.
Computer Networking Beginners Guide: An Easy Approach to Learning Wireless Technology, Social Engineering, Security and Hacking Network, Communication
by
Scott, Russell
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web Sites and Applications
by
Sinha, Sanjib
Learn Kali Linux 2019
by
D. Singh, Glen
How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR
by
Carlson, Christopher T.
Protocols for Authentication and Key Establishment
by
Stebila, Douglas, Boyd, Colin, Mathuria, Anish
Security Controls Evaluation, Testing, and Assessment Handbook
by
Johnson, Leighton
Machine Learning for Cybersecurity Cookbook
by
Tsukerman, Emmanuel
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments
by
Dall'acqua, Luisa, Gironacci, Irene M.
Cyber Security for Small Business: Protect Your Digital World
by
Paterson, Cat
Stuxnet: The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspers
by
Poroshyn, Roman
Elementary... the Art and Science of Finding Information: Achieving More "Knowledge Advantage" through OSINT - Revised and Expanded Edition
by
Millington, Alan, Monday, Mark, Fernandez, Miguel
Elementary... the Art and Science of Finding Information: Achieving More "Knowledge Advantage" through OSINT - Revised and Expanded Edition
by
Millington, Alan, Monday, Mark, Fernandez, Miguel
Lattice-Based Public-Key Cryptography in Hardware
by
Verbauwhede, Ingrid, Sinha Roy, Sujoy
Multimedia Watermarking Techniques and Applications
by
Kirovski, Darko
Multimedia Encryption and Authentication Techniques and Applications
by
Furht, Borko, Kirovski, Darko
Adaptive Security Management Architecture
by
Tiller, James S.
How Cyber Security Can Protect Your Business: A guide for all stakeholders
by
Wright, Christopher
Fintech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations
by
Dorfleitner, Gregor, Hornuf, Lars
Hacking!: This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX
by
Nowak, Grzegorz
Mon Carnet de Mots de Passe: A5 - 98 Pages - Noir - Petit format, grands caractères - couverture originale
by
Secureo, Ne Rien Oublier Editions
Cybercrime Prevention: Theory and Applications
by
Hutchings, Alice, Brewer, Russell, de Vel-Palumbo, Melissa
Microsoft 365 Mobility and Security - Exam Guide MS-101
by
Chamberlain, Nate
Carnet de mots de passe: conçu pour rassembler toutes vos informations sur internet motif nuit étoilée 142 pages prédéfinies et classées par or
by
Karach, Olivier
Carnet de mots de passe Je déteste l'informatique et par-dessus tout me souvenir des mots de passe: conçu pour rassembler toutes vos informations sur
by
Karach, Olivier
Carnet de Mots de passe: conçu pour rassembler toutes vos informations sur internet motif fleurs colorées 142 pages prédéfinies et classées par
by
Karach, Olivier
Carnet de Mots de passe: conçu pour rassembler toutes vos informations sur internet motif fleurs noires 142 pages prédéfinies et classées par o
by
Karach, Olivier
Carnet de mots de passe Retiens tes Mots de passe: conçu pour rassembler toutes vos informations sur internet 142 pages prédéfinies et classées par or
by
Karach, Olivier
Zero Trust Networks with Vmware Nsx: Build Highly Secure Network Architectures for Your Data Centers
by
Keeriyattil, Sreejith
2017 Annual Report of Top Cyber Security Incidents
by
Hyslip, Thomas
It-Sicherheitsmanagement Nach Der Neuen ISO 27001: Isms, Risiken, Kennziffern, Controls
by
Reuter, Jürgen, Kersten, Heinrich, Klett, Gerhard
Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacki
by
Codings, Zach
Hacking with Kali Linux: Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing.
by
Hack, Anthony
Secrets of a Cyber Security Architect
by
Schoenfield, Brook S. E.
Mathematical Theory of Advanced Computing
by
Osterhage, Wolfgang W.
Cissp: Tips and Tricks to Learn and Study about Information Systems Security from A-Z
by
Schmidt, Walker
Kali Linux: The Complete Guide To Learn Linux For Beginners and Kali Linux, Linux System Administration and Command Line, How To H
by
Hack, Anthony
Practical Handbook for Professional Investigators
by
McMahon CLI Cfe, Rory J.
Policing Organized Crime: Intelligence Strategy Implementation
by
Gottschalk, Petter
Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations
by
Girod, Robert J.
State Fragility Around the World: Fractured Justice and Fierce Reprisal
by
Pate, Matthew, Gould, Laurie A.
Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival
by
Heard, Brian John
Police Investigative Interviews and Interpreting: Context, Challenges, and Strategies
by
Lai, Miranda, Norma, Caroline, Mulayim, Sedat
Criminal Enterprise Investigation
by
Trier, Thomas A.
Delivering Police Services Effectively
by
Den Heyer, Garth
Learning-Based Vanet Communication and Security Techniques
by
Zhuang, Weihua, Zhou, Sheng, Xiao, Liang
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
by
Chopra, Abhishek, Chaudhary, Mukund
Cold Cases: Evaluation Models with Follow-Up Strategies for Investigators, Second Edition
by
Adcock, James M., Stein, Sarah L.
Police Corruption: Preventing Misconduct and Maintaining Integrity
by
Prenzler, Tim
Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes
by
Mining, Ethem
Hacking With Kali Linux: The Step-By-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
by
Carmack, David James
Financial Investigation and Forensic Accounting
by
Manning, George A.