Computer Security in 2020
Practical Artificial Intelligence and Blockchain: A guide to converging blockchain and AI to build smart applications for new economies
by
Kumble, Ganesh Prasad
China and Middle East Conflicts: Responding to War and Rivalry from the Cold War to the Present
by
Burton, Guy
Ciberseguridad: Los mejores consejos y trucos para aprender y proteger sus redes cibernéticas
by
Lewis, Elijah
Ética Hacker: Los Mejores consejos y trucos de la ética hacker
by
Lewis, Elijah
Distributed Denial of Service Attacks: Real-World Detection and Mitigation
by
Özçelik, İlker, Brooks, Richard
Distributed Denial of Service Attacks: Real-World Detection and Mitigation
by
Özçelik, İlker, Brooks, Richard
Testing and Securing Web Applications
by
Johnson, Greg, Das, Ravi
Testing and Securing Web Applications
by
Johnson, Greg, Das, Ravi
Online Predators, an Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena
by
Lee, Jeffrey A.
Beginners Guide To Ethical Hacking And Cyber Security
by
Ojha, Abhinav
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
by
Sabillon, Regner
Real-Time and Retrospective Analyses of Cyber Security
by
Bird, David Anthony
Implementing Cryptography Using Python
by
Bray, Shannon W.
Fully Homomorphic Encryption in Real World Applications
by
Chatterjee, Ayantika, Aung, Khin Mi Mi
Improving Image Quality in Visual Cryptography
by
Xiang, Yong, Hua, Guang, Yan, Bin
Blockchain Technology in Internet of Things
by
Gai, Keke, Li, Meng, Zhu, Liehuang
Ética Hacker: Medidas avanzadas y efectivas de ética hacker
by
Lewis, Elijah
Digital Privacy: Internet Security to Stop Big Companies from Tracking and Selling Your Data
by
Capra, Chris, Faster, Eric
Storing Digital Binary Data in Cellular DNA: The New Paradigm
by
Termanini, Rocky
Decoding Blockchain for Business: Understand the Tech and Prepare for the Blockchain Future
by
Van Hijfte, Stijn
On Thin Ice
by
Cybersecurity Experts, Leading
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
by
Ciesla, Robert
Gcih Giac Certified Incident Handler All-In-One Exam Guide
by
Mitropoulos, Nick
I'll Take Some Coffee with My French Vanilla Creamer: Sudoku Puzzle Book for Adults ... Difficulty--Medium Level, with Solutions
by
Policeman, Coffee
Investigations and the Art of the Interview
by
Sebyan Black, Inge, Fennelly, Lawrence J.
FortiGate - Guía de resolución de problemas
by
Wiśniewski, Hubert
The Pocket Guide to Cyber Security
by
H, James, D, Usha
HonorSociety.org Scam Alerts: How to Avoid the Top E-mail Scams: 10 Ways to Spot Real or Fake E-mails
by
Moradian, Mike
La Sicurezza delle Reti Grandi e Distribuite: Difendi la tua organizzazione dagli attacchi informatici e dagli Hacker utilizzando le migliori strategi
by
Cocco, Fabrizio
Cybersecurity: A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phish
by
Kiser, Quinn
Bitcoin in International Monetary Relations. New Innovation or Old Imperialism?
by
Trump, Carl Philipp
Advance Metadata Fair: The Retention and Disclosure of 4g, 5g and Social Media Location Information, for Law Enforcement and National Securit
by
Shanapinda, Stanley
Mastering Blockchain - Third Edition: A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, a
by
Bashir, Imran
Android Apps Security: Mitigate Hacking Attacks and Security Breaches
by
Gunasekera, Sheran
Beginning Ethereum and Solidity with React
by
Lim, Greg
The Ghidra Book: The Definitive Guide
by
Nance, Kara, Eagle, Chris
Beginners Guide To Ethical Hacking and Cyber Security
by
Ojha, Abhinav
Caesura in Cryptography [Paperback]: My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University a
by
Ackermann, Evelyn, Klein, Michael
Real-Time and Retrospective Analyses of Cyber Security
by
Bird, David Anthony
Practical Blockchains and Cryptocurrencies: Speed Up Your Application Development Process and Develop Distributed Applications with Confidence
by
Garewal, Karan Singh
Cloud Security Auditing
by
Madi, Taous, Wang, Yushun, Majumdar, Suryadipta
AWS Certified Security - Specialty Exam Guide: Build your cloud security knowledge and expertise as an AWS Certified Security Specialist (SCS-C01)
by
Scott, Stuart
Kubernetes: The Ultimate Guide to Master Kubernetes
by
Neal, Clint
Cybersecurity in the Electricity Sector: Managing Critical Infrastructure
by
Leszczyna, Rafal
Intrusion Detection Honeypots
by
Sanders, Chris
Ciberseguridad para la Familia: El Firewall eres tu
by
Vergara, Edwin
Comptia Security+ Certification Study Guide: Network Security Essentials
by
Sheikh, Ahmed F.
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
by
Foltz, Kevin E., Simpson, William R., Institute for Defense Analyses
97 Things about Ethics Everyone in Data Science Should Know: Collective Wisdom from the Experts
by
Franks, Bill
Konzeption einer Blockchain-Schnittstelle. Organisationsübergreifende Workflows in Workflow Management Systemen
by
Krüger, Daniel
Hcispp Healthcare Information Security and Privacy Practitioner All-In-One Exam Guide
by
Murphy, Sean P.
Accountability and Privacy in Network Security
by
Ge, Jingguo, Ma, Yuxiang, Wu, Yulei
Comptia Cysa+ Practice Tests: Exam Cs0-002
by
Chapple, Mike, Seidl, David
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
by
Arcuri, Jennifer, Hickey, Matthew
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
by
Carey, Marcus J., Jin, Jennifer
Cognitive Modeling for Automated Human Performance Evaluation at Scale
by
Yuan, Haiyue, Li, Shujun, Rusconi, Patrice
The Art of War for Computer Security
by
Madsen, Tom
Building an Effective Security Program
by
Williams, Chris, Donaldson, Scott, Siegel, Stanley
Customer Data and Privacy: The Insights You Need from Harvard Business Review
by
Review, Harvard Business, Burt, Andrew, Morey, Timothy
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
by
Saldanha, Anoop, Mohanta, Abhijit
Ética Hacker: 3 en 1- Guía para principiantes + Consejos y trucos + Medidas avanzadas y efectivas de ethical hacking
by
Lewis, Elijah
Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind
by
Ferreira, Frederico, Medlin, Richard, Belbase, Vishal M.
Ciberseguridad: 3 en 1 Guía para principiantes + Consejos y trucos + Medidas avanzadas y efectivas para proteger sus cyber networks
by
Lewis, Elijah
Automotive Cyber Security: Introduction, Challenges, and Standardization
by
Shrestha, Rakesh, Kim, Shiho
Privilege Escalation: A Stairway to Heaven
by
Belbase, Vishal M., Mp, Ambadi, Sharma, Nitin
Datensicherheit: Technische Und Organisatorische Schutzmaßnahmen Gegen Datenverlust Und Computerkriminalität
by
Lenhard, Thomas H.
Cyberspace and Cybersecurity
by
Kostopoulos, George
A History of Cyber Security Attacks: 1980 to Present
by
Middleton, Bruce
The Cio's Guide to Information Security Incident Management
by
Goucher, Wendy Fiona, Pemble, Matthew William Arthur
Analyzing and Securing Social Networks
by
Thuraisingham, Bhavani, Abrol, Satyen, Heatherly, Raymond
A Guide to the National Initiative for Cybersecurity Education (Nice) Cybersecurity Workforce Framework (2.0)
by
Sigler, Ken, Shoemaker, Dan, Kohnke, Anne
Access Control Management in Cloud Environments
by
Wang, Hua, Cao, Jinli, Zhang, Yanchun
Persönlichkeitsschutz in Social Networks: Technische Unterstützung Eines Grundrechtskonformen Angebots Von Social Networks
by
Nebel, Maxi
Data Analytics for Internal Auditors
by
Cascarino, Richard E.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies
by
Li, Chong, Qiu, Meikang
Bitcoin begreifen
by
Rosenbaum, Kalle
Google Cloud Professional Cloud Security Engineer Exam Practice Questions & Dumps: Exam Study Guide for Professional Cloud Security Engineer Exam Prep
by
Books, Quantic
Google Cloud Professional Cloud Developer Exam Practice Questions & Dumps: EXAM STUDY GUIDE FOR PROFESSIONAL CLOUD DEVELOPER Exam Prep LATEST VERSION
by
Books, Quantic
An Introduction to Crime and Crime Causation
by
Winters, Robert C., Globokar, Julie L., Roberson, Cliff
Information Security Policies, Procedures, and Standards: A Practitioner's Reference
by
Landoll, Douglas J.
Practical Cloud Security: A Cross-Industry View
by
Greer, Jr., Jackson, Kevin L.
Integrating a Usable Security Protocol Into User Authentication Services Design Process
by
Naqvi, Bilal, Braz, Christina, Seffah, Ahmed
Social Media Warfare: Equal Weapons for All
by
Erbschloe, Michael
Enterprise Level Security: Securing Information Systems in an Uncertain World
by
Simpson, William R.
Information Technology Control and Audit, Fifth Edition
by
Otero, Angel R.
Information Security Governance Simplified: From the Boardroom to the Keyboard
by
Fitzgerald, Todd
Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques
by
Girod, Robert J.
Honeypots and Routers: Collecting Internet Attacks
by
Rehman, Habib-Ur, Mohammed, Mohssen
Multivariate Public Key Cryptosystems
by
Schmidt, Dieter S., Ding, Jintai, Petzoldt, Albrecht
Kosten der IT-Sicherheit: Ein Ausgangspunkt für weitergehende Untersuchungen
by
Jurecz, Stefanie, Kirschner, Sascha, Grigat, Maximilian
The Complete Guide for CISA Examination Preparation
by
Cascarino, Richard E.
Cryptographic Obfuscation: A Survey
by
Horváth, Máté, Buttyán, Levente
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in Aws, Microsoft Azure, and Google Cloud
by
Calles, Miguel A.
The Complete Guide for CISA Examination Preparation
by
Cascarino, Richard E.
Sicherheit Und Kryptographie Im Internet: Theorie Und PRAXIS
by
Schwenk, Jörg
Cissp: Simple and Effective Strategies for Mastering Information Systems Security from A-Z
by
Schmidt, Walker
Cyber Security
by
Zhou, Yu, Li, Jia, Ding, Li
Cyber Security
by
Zhou, Yu, Li, Jia, Ding, Li
Security in Computer and Information Sciences
by
Komnios, Ioannis, Tzovaras, Dimitrios, Romano, Luigi