Computer Security in 2020
Machine Learning Approaches in Cyber Security Analytics
by
Thomas, Tony, P. Vijayaraghavan, Athira, Emmanuel, Sabu
Administer and Secure Enterprise Linux: Red Hat and CentOS versions 7 and 8
by
Overton, Russell, Technical Academy, Janus
Security+: A Practitioners Study Guide
by
Proehl, Lauren, Evenden, David
Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
by
Rubinoff, Shira
Darknet Secrets: A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online
by
Bogachev, Yuri a.
Shit I Can't Remember: Keep track of usernames, passwords, web addresses in one easy & organized location
by
Books, Family's
Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social En
by
Evans, Lester
Ethical Hacking: A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking
by
Lewis, Elijah
Cybersecurity: A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z
by
Lewis, Elijah
Unmasking the hacker: demystifying cybercrime
by
Turner, Amanda-Jane
Unmasking the Hacker: Demystifying Cybercrime
by
Turner, Amanda-Jane
Cybersecurity For Beginners: Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism
by
Bogachev, Yuri a.
Hacking For Beginners: Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe
by
Bogachev, Yuri a.
Cyber Law in Japan
by
Yanaga, Masao
Cyber Law in Italy
by
Ziccardi, Giovanni
Protektion 4.0: Das Digitalisierungsdilemma
by
Müller, Günter
Hacking With Kali Linux: The Ultimate Guide For Beginners To Hack With Kali Linux. Learn About Basics Of Hacking, Cybersecurity, Wireless Netwo
by
Solow, Frank
Principles for Cyber Security Operations
by
Hettema, Hinne
Cybersecurity Engineer I'm Not Arguing I'm Just Explaining Why I'm Right
by
Quotes, Cybersecurity
PC Computer Security & Backup Guide: How to Secure & Backup Your PC with Antivirus & Malware Software
by
Albert, Jon
Certified Cyber Security Operations Manager: Exam Prep Guide
by
Kaplan, Michael I.
Red Team Development and Operations: A practical guide
by
Vest, Joe, Tubberville, James
Cybersecurity: Essential Guide for Beginners to Learn Basic Methods of Cybersecurity
by
George, Henry
Black Hat Go: Go Programming for Hackers and Pentesters
by
Patten, Chris, Kottmann, Dan, Steele, Tom
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und P
by
Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Zugangsdaten und PINs
by
Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von persönlichen Zugangsdaten und PINs
by
Schutz, Thorsten
Intrusion Detection: A Data Mining Approach
by
SenGupta, Nandita, Sil, Jaya
Risk and the Theory of Security Risk Assessment
by
Young, Carl S.
Applied Incident Response
by
Anson, Steve
Digital Forensics and Incident Response - Second Edition: Incident response techniques and procedures to respond to modern cyber threats
by
Johansen, Gerard
Hacking: Fundamentals for Absolute Beginners
by
Bell, Alexander
I'm Dead, But My Password Is Not
by
Howard, Josh K.
Informationssicherheit Und Datenschutz Systematisch Und Nachhaltig Gestalten: Eine Kompakte Einführung in Die PRAXIS
by
Hanschke, Inge
I'll Never Forget You: Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif
by
Secure, Sam
Blockchain Development for Finance Projects
by
Roy, Ishan
Information Security Management Principles
by
Alexander, David, Finch, Amanda, Taylor, Andy
Iso/Iec 27701: 2019: An introduction to privacy information management
by
Shipman, Alan, Watkins, Steve
Shield Your Privacy: 15 Ways To Protect Your Personal Information
by
Nickerson, Heather
Cryptography Arithmetic: Algorithms and Hardware Architectures
by
Omondi, Amos R.
Seguridad en Redes y Sistemas de Comunicación. Teoría y Práctica
by
García Teodoro, Pedro, Maciá Fernández, Gabriel
What the Heck Is My Password?
by
Casey, Beth
Das große Buch der Passwörter: Vergessen Sie nie wieder ein Passwort.
by
Journals, Dream Big
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux
by
Vance, William
Linux Command: A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z
by
Vance, William
Linux Command: A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z
by
Vance, William
Linux for Hackers: A Comprehensive Beginners Guide to the World of Hacking Using Linux
by
Vance, William
Protect Your Identity: Step-by-Step Guide and Workbook
by
Kerskie, Carrie
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects
by
Sniatala, Pawel, Amini, M. Hadi, Boroojeni, Kianoosh G.
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
by
Troia, Vinny
J'ai une mémoire de Poisson Rouge carnet de mots de passe pour internautes et informaticiens: Index répertoire - Format pratique - Grande taille de ca
by
Alphabétique, Répertoire
Cryptocurrencies: An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including M
by
Jones, Herbert
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit dekorativen Blum
by
Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Narwal Illus
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Eulen Illust
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs -
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Internet Zugangsdaten und PINs - Mit süßer
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Alpaka Illus
by
Schutz, Thorsten
Ich werde dich niemals vergessen: Diskretes Passwort Buch mit A-Z Register zum Verwalten und Organisieren von Internet Zugangsdaten und PINs - Mit dek
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs -
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Lama Illustr
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs -
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Elefanten Il
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Fuchs Illust
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten - Mit süßer Einhorn Illu
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von persönlichen Internet Zugangsdaten und PINs -
by
Schutz, Thorsten
Unvergesslich: Diskretes Passwort Buch mit Register zum Verwalten und Organisieren von Internet Zugangsdaten Mit süßer Faultier Illus
by
Schutz, Thorsten
Kali Linux: Advanced Methods and Strategies to Learn Kali Linux
by
Thorpe, Ethan
The Essential Guide to Cybersecurity for SMBs
by
Hayslip, Gary
The Networknomicon, or SNMP Mastery
by
Alhazred, Abdul, Lucas, Michael W.
SNMP Mastery
by
Lucas, Michael W.
SNMP Mastery
by
Lucas, Michael W.
Criptomonedas: Cómo lucrar del bitcoin, ethereum para aprendices (Guía para entender el litecoin, bitcoin y más.)
by
Mota, Peer
Criptomoneda: Consejos exitosos sobre el comercio en criptomoneda (Una guía completa para invertir e intercambiar en blockchains)
by
Soliz, Bart
Criptomonedas: Comercio e inversión en bitcoin litecoin y otras más (Métodos de comercio e inversión en bitcoin)
by
Mora, Pablo
Criptomoneda: Un curso completo de intercambio e inversiones digitales (Aprendizaje sistemático acerca de invertir y comerciar en cr
by
Baez, Elido
Criptomoneda: La guía definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas)
by
Luna, Jair
Penetration Testing: Penetration Testing: A Hands-On Guide For Beginners
by
Wallace, Connor
Writing a Cybersecurity Accreditation Package: A 21st Century NIST-based & CMMC Roadmap
by
Russo Cissp-Issap, Mark a.
Spatial Computing
by
Shekhar, Shashi, Vold, Pamela
The World of Hacking: Meet The Digital World
by
Goyal, Parth
Home-Office und die Bedeutung des arbeitsrechtlichen Datenschutzes für Unternehmen
by
Hebing, Madlen
Mastering Linux Security and Hardening
by
Tevault, Donald a.
Cyber Warfare - Truth, Tactics, and Strategies
by
Cunningham, Chase
Game of hacking with terminal: The only way to stop a hacker is to think like one.
by
Mr N. Ravi Kiran
Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
by
Fitzgerald, Todd
Cross-Cultural Design
by
Akpem, Senongo
Designing a Hipaa-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
by
Thompson, Eric C.
AWS Security Cookbook
by
Kanikathottu, Heartin
Security Operations in Practice
by
Sheward, Mike
Qos Routing Algorithms for Wireless Sensor Networks
by
T, Shiv Prakash, Kumaraswamy, M., Venugopal, K. R.
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
by
Alrabaee, Saed, Shirani, Paria, Debbabi, Mourad
Comando de Linux: Una guía completa para principiantes para aprender los reinos del comando Linux desde A-Z
by
Vance, William
Time Override: Prophetic Images from the Future Decoded
by
Clearfield, Dylan
Linux para hackers: Una guía completa para principiantes para el mundo del hackeo utilizando Linux
by
Vance, William
Cyberkriminalität. Bedeutung, Auswirkungen auf digitalisierte Produktions- und Logistikprozesse und Abwehrmaßnahmen
by
Danner, Sofie
Notebook: A cute and discrete password book to keep your log in details safe and close at hand at all times (Large Print Edition)
by
Summers, Faith V.
Cyber Security: Essential principles to secure your organisation
by
Calder, Alan
Cybersecurity Law, Standards and Regulations: 2nd Edition
by
Schreider, Tari
Wsdm'19: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining
by
Wsdm'19
WordPress Security for Webmaster 2020: How to Stop Hackers Breaking into Your Website
by
Williams, Andy
Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments
by
Dall'acqua, Luisa, Gironacci, Irene M.
Cyber Security Guide: "Art of Hacking"
by
Security, The Hard
Wasec: Web Application Security for the everyday software engineer: Everything a web developer should know about application
by
Nadalin, Alessandro
Kali Linux: 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux
by
Thorpe, Ethan
Conoce todo sobre Hacking y seguridad de páginas Web
by
Barbero Muñoz, Carlos a., Ramos Varón, Antonio Ángel
Hacking Connected Cars: Tactics, Techniques, and Procedures
by
Knight, Alissa
The Implant
by
Ivey, Robert L.
Conoce todo sobre Kali Linux
by
Santo Orcero, David
Conoce todo sobre Seguridad Digital e Informática
by
Maíllo Fernández, Juan Andres
Rethinking InfoSec: Thoughts on why today's Information Security doesn't work, and how we can do better.
by
Van Der Gaast, Greg
Cyber Law in Bangladesh
by
Karim, Mohammad Ershadul
Cyber Law in Czech Republic
by
Donát, Josef, Polcák, Radim, Čermák, Jiří
Codaspy'19: Proceedings of the 2019 International Symposium on Data and Application Security and Privacy
by
Codaspy'19
Conoce todo sobre Seguridad Informática. Básico
by
Gómez Vieites, Álvaro
Gray Day Gray Day: My Undercover Mission to Expose America's First Cyber Spy My Undercover Mission to Expose America's First Cyber Spy
by
O'Neill, Eric
Differential Privacy for Dynamic Data
by
Le Ny, Jerome
Securing Cloud Services: A pragmatic guide
by
Newcombe, Lee
Seguridad Informática - Manual Principiantes: Un excelente manual para acercarse al mundo de la ciberseguridad personal
by
Ruggero, Placido
Hack Proof Your Business, Volume 2: Featuring 14 IT Experts Nationwide
by
Brown, Chuck, Bunnell, Bill, Tomlinson, Chuck
Cybersecurity Attacks - Red Team Strategies
by
Rehberger, Johann
Visual Communication for Cybersecurity
by
Van Deursen, Nicole
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
by
Carey, Marcus J., Jin, Jennifer
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security!
by
Dodson, Adam
CyberGuardian(TM): A SecureTheVillage Guide for Residents
by
Krantz, Steve
Web Penetration Testing: Step-By-Step Guide
by
Shatob, Radhi
Cryptology for Engineers: An Application-Oriented Mathematical Introduction
by
Schmied, Robert
Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems
by
Bushey, Gary, Diver, Richard
Cyber Strategy: Risk-Driven Security and Resiliency
by
Siegel, Carol A., Sweeney, Mark
Cyber Strategy: Risk-Driven Security and Resiliency
by
Sweeney, Mark, Siegel, Carol A.