Computer Security in 2020
Blockchain: An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Mone
by
Jones, Herbert
Practical Mobile Forensics - Fourth Edition
by
Mahalik, Heather, Tamma, Rohit, Skulkin, Oleg
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
by
Rahalkar, Sagar
Days of Pandemic
by
Aldred, Andrew
Securing Blockchain Networks like Ethereum and Hyperledger Fabric: Learn advanced security configurations and design principles to safeguard Blockchai
by
Parisi, Alessandro
Ethical Hacking: Best Tips and Tricks of Ethical Hacking
by
Lewis, Elijah
A Hacker I Am Vol 2
by
Ford, Craig
A Hacker I Am Vol 2
by
Ford, Craig
IBM i Security Administration and Compliance
by
Woodbury, Carol
NetScaler Hacks: 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for legacy Citrix
by
Moses, Joseph
Digital Forensics with Kali Linux - Second Edition: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux
by
Parasram, Shiva V. N.
Cyber Law in Australia
by
Cho, George
The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity
by
Shoemaker, Daniel, Kohnke, Anne, Sigler, Ken
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
by
Beyer, Betsy, Adkins, Heather, Blankinship, Paul
Secure Yourself: Staying Safe in a Digital World
by
Fousekis, Dimitri
Datenschutz - Wer hat den schwarzen Peter?: Aufgabenverteilung im Datenschutzmanagement
by
Pauls, Birgit
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
by
Oettinger, William
Top Hacking Techniques & Terms: A must knowledge for everyone to stay protected from cyber attacks
by
Mohammed, Sarfaraz
Applied Machine Learning/Neural Networks: Offensive Security
by
Atkins, Christopher
Measuring Cybersecurity and Cyber Resiliency
by
Snyder, Don, Mayer, Lauren A., Weichenberg, Guy
CCNA Certification Study Guide and Practice Tests Kit: Exam 200-301
by
Lammle, Todd, Buhagiar, Jon
Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method?
by
Rokas, Liutauras
Unhackable: Your Online Security Playbook: Recreating Cyber Security in an Unsecure World
by
Mansour, George
Etica hacker: Guía Completa Para Principiantes Para Aprender Sobre las Estrategias Eficaces de la Ética Hacker(Libro En Español/Spanish version)
by
Lewis, Elijah
Ciberseguridad: Guía completa para principiantes aprende todo de la ciberseguridad de la Aa la Z(Libro En Español/Spanish version)
by
Lewis, Elijah
How to Analyze the Cyber Threat from Drones: Background, Analysis Frameworks, and Analysis Tools
by
Tierney, Shane, Schmid, Jon, Best, Katharina Ley
Ethical Hacking: Advanced and Effective Measures of Ethical Hacking
by
Lewis, Elijah
PCI Dss: An Integrated Data Security Standard Guide
by
Seaman, Jim
Le répertoire secret d'une licorne connectée !: Petit calepin utile pour mémoriser vos codes d'accès pour internet -124 pages - Format 14x21.6 cm - Co
by
Nohicknohack, Editions
Build Your Own Blockchain: A Practical Guide to Distributed Ledger Technology
by
Hellwig, Daniel, Karlic, Goran, Huchzermeier, Arnd
Automatische Erkennung und Messung von IT-Sicherheitsaufwänden
by
Wittor, Sebastian
Stiennon On Security: Collected Essays Volume 1
by
Stiennon, Richard
Blockchain for Non IT Professionals: An Example Driven, Metaphorical Approach
by
Srinivas Mahankali
The Modern Parent: Raising a great kid in the digital world
by
Oglethorpe, Martine
Bitcoin Basics: A Beginner's Guide to Bitcoin and Blockchain
by
Gordon, Marc
Intro to Cybersecurity: A Practitioner's Study Guide
by
Evenden, David, Carrera, Dominic
Data Protection: Ensuring Data Availability
by
de Guise, Preston
Data Protection: Ensuring Data Availability
by
de Guise, Preston
Cybersecurity Fundamentals: A Real-World Perspective
by
Thakur, Kutub, Pathan, Al-Sakib Khan
Cybersecurity Fundamentals: A Real-World Perspective
by
Pathan, Al-Sakib Khan, Thakur, Kutub
Container Security: Fundamental Technology Concepts That Protect Containerized Applications
by
Rice, Liz
Digital Self-Defense: The Layperson's Guide to Digital Security
by
Fields, Justin
Cryptoeconomics: Igniting a New Era of Blockchain
by
Xu, Wei, Gong, Jian
You Can't Afford to Get Hacked: The must-have practical guide to keeping your household safe online
by
Roknifard, Amir, Pirotti, Amjad
Building an Anonymization Pipeline: Creating Safe Data
by
Emam, Khaled El, Arbuckle, Luk
Penetration Testing for Dummies
by
Shimonski, Robert
Cybersecurity essentials - Beginners guide: Step-by-step manual with ten methods to protect your privacy online
by
Costa, David, Amadio, Gianluca
Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications
by
Kävrestad, Joakim
Unhackable: Your Online Security Playbook: Recreating Cyber Security in an Unsecure World
by
Mansour, George
Unhackable: Your Online Security Playbook: Recreating Cyber Security in an Unsecure World
by
Mansour, George
Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation
by
Singh, Harpreet, Sharma, Himanshu
The Design of Rijndael: The Advanced Encryption Standard (Aes)
by
Daemen, Joan, Rijmen, Vincent
Three Little Hackers
by
Carey, Marcus J.
Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection
by
Massey, Stephen R.
CCNP and CCIE Security Core Scor 350-701 Official Cert Guide
by
Santos, Omar
Incident Handling and Response: A Holistic Approach for an efficient Security Incident Management.
by
Alex, Jithin
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more.
by
Medlin, Richard
Password Authentication for Web and Mobile Apps: The Developer's Guide To Building Secure User Authentication
by
Chestnykh, Dmitry
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)
by
White, Gregory B., Sjelin, Natalie
Cyber Threat Intelligence for the Internet of Things
by
Bou-Harb, Elias, Neshenko, Nataliia
Devsecops for .Net Core: Securing Modern Software Applications
by
Zeeshan, Afzaal Ahmad
Learning by Practicing - Mastering TShark Network Forensics: Moving From Zero to Hero
by
Alleyne, Nik
Data Security in Cloud Storage
by
Shen, Xuemin Sherman, Xu, Chunxiang, Zhang, Yuan
Reversible Steganography and Authentication Via Transform Encoding
by
Mandal, Jyotsna Kumar
Dot Con: The Art of Scamming a Scammer
by
Veitch, James
Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202
by
Medlin, Richard, Sharma, Nitin, Casey, Justin
Thoughts on cyber security
by
Desmyter, Quinten
Threat Hunting, Hacking, and Intrusion Detection: SCADA, Dark Web, and APTs
by
Sharma, Nitin, Ma, James, Medlin, Richard
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
by
Haber, Morey J.
Network Availability of Internet Services: Threats and Defenses
by
Stavrou, Angelos
Microsoft 365 Security Administration: MS-500 Exam Guide: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environme
by
Rising, Peter
Web Security for Developers: Real Threats, Practical Defense
by
McDonald, Malcolm
Introduction to Online Safety: A practical Guide to Cybersecurity
by
Jacob, John G.
Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data
by
Hoptroff, Richard, Emam, Khaled El, Mosquera, Lucy
Introduction to FortiGate Part-1 Infrastructure: Fortinet Network Security Introduction (Black and White Edition)
by
Howard, Daniel
Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach
by
Schauer, Stefan, König, Sandra, Rass, Stefan
The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society
by
Young, Kaliya
The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society
by
Young, Kaliya
Developing a Cybersecurity Immune System for Industry 4.0
by
Petrenko, Sergei
Secure Html programming and website building: learn coding for website building in less than 24 hrs.
by
Ramesh Kumar, Sri Rekha
Guida al Pentesting: ed. 2020
by
Caranti, Milo
Linux for Hackers: Tips and Tricks of Using Linux Theories for Hacking
by
Vance, William
Introduction to Criminal Justice Information Systems
by
Ioimo, Ralph
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits
by
Tiller, James S.
Blockchain Technology and Applications
by
Banafa, Ahmed
Linux Command: Logical and Systematic Approach to Linux Administration
by
Vance, William
Linux for Hackers: The Advanced Guide on Kali Linux Operating System
by
Vance, William
Unclassified and Secure: A Defense Industrial Base Cyber Protection Program for Unclassified Defense Networks
by
Adgie, Mary Kate, Gonzales, Daniel, Harting, Sarah
Linux Command: Advanced Methods and Strategies to Shell Scripting
by
Vance, William
Securing and Sustaining the Olympic City: Reconfiguring London for 2012 and Beyond
by
Fussey, Pete, Hobbs, Dick, Coaffee, Jon
Mathematical Foundations of Public Key Cryptography
by
Xu, Guangwu, Wang, Xiaoyun, Wang, Mingqiang
Security and Data Reliability in Cooperative Wireless Networks
by
Hassan, Emad
Location Privacy in Wireless Sensor Networks
by
Lopez, Javier, Cuellar, Jorge, Rios, Ruben
Introduction to Certificateless Cryptography
by
Vasilakos, Athanasios V., Xiong, Hu, Qin, Zhen
Analysis and Design of Networked Control Systems Under Attacks
by
Guo, Lei, Yuan, Yuan, Yang, Hongjiu
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations
by
Hu, Fei
Infinity Ethical Hacking: Learn basic to advance hacks
by
Sapp, Arthur S.
How Hacks Happen: and how to protect yourself
by
Germanos, Mark Anthony, Cracker, Brad
Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain
by
Moriarty, Kathleen M.
Cybercrime Investigations: A Comprehensive Resource for Everyone
by
Merzon, Antonia, Bandler, John
Professional Security Management: A Strategic Guide
by
Swanson, Charles
Cybersecurity, Hacking, and Espionage - a beginners guide
by
Vaid, Abhinav
Operacion Bitcoins: Login Infernal
by
Antonioli, Maria Gloria, Hill, Alberto Daniel
Cyber Warfare: A Documentary and Reference Guide
by
Springer, Paul
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
by
Gorecki, Andrew
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats
by
Tumbarello, Matt, Dunkerley, Mark
Humorous Cryptograms: 300 Large Print Puzzles To Keep You Entertained (Large Print Edition)
by
Nest, Game
Near Miss: : 10 Ways Your IT Guy is Failing to Protect You & Putting Your Business at Risk
by
Lacy, Brent
Computer Security and Encryption: An Introduction
by
Chauhan, S. R., Jangra, S.
Cybersecurity essentials
by
Winowicz, Pawel
Information Fusion in Distributed Sensor Networks with Byzantines
by
Abrardo, Andrea, Barni, Mauro, Kallas, Kassem
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
by
Galluccio, Ettore, Lombari, Gabriele, Caselli, Edoardo
Blockchain: Empowering Secure Data Sharing
by
Shen, Meng, Zhu, Liehuang, Xu, Ke
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)
by
White, Gregory B., Sjelin, Natalie
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
by
Sabillon, Regner
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
by
Steffens, Timo
Networking for Dummies
by
Lowe, Doug
Active Shooter Response Training: Lone Wolf to Coordinated Attacks
by
Hyderkhan, Scott
Active Shooter Response Training: Lone Wolf to Coordinated Attacks
by
Hyderkhan, Scott
Adapt and Overcome: What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis
by
Lam, Chee, Morgan, Jeri, Hornung, Bryan
Cybersecurity: 3 in 1- Beginner's Guide+ Tips and tricks+ Advanced and Effective measures to secure your Cyber Networks
by
Lewis, Elijah
Ethical Hacking: 3 in 1- Beginner's Guide+ Tips and Tricks+ Advanced and Effective measures of Ethical Hacking
by
Lewis, Elijah
Social Network Analysis and Law Enforcement: Applications for Intelligence Analysis
by
Burcher, Morgan
Identity and Data Protection for the Average Person
by
Pasono, Michael
Credit Card Fraud Detection and Analysis through Machine Learning
by
Sharma, Anand, Goyal, Yogita