Computer Security in 2020
Security in Computer and Information Sciences
by
Komnios, Ioannis, Tzovaras, Dimitrios, Romano, Luigi
Principles of Security and Trust
by
Nielson, Flemming, Sands, David
Principles of Security and Trust
by
Nielson, Flemming, Sands, David
Cybersecurity: A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phish
by
Kiser, Quinn
A Contemporary Approach to Cybercrime
by
Dastgir, Ghulam, Rehman, Tansif Ur, Muhammad Irfan, Syed
Modern Network Architectures Network and System Protection
by
Velinov, Vladimir
Lattice-Based Cryptosystems: A Design Perspective
by
Zhang, Zhenfeng, Zhang, Jiang
The Myth Of Security: Hackers' Inventions Will Win The Race for Information
by
Starling, Niels
The Myth Of Security: Hackers' Inventions Will Win The Race for Information
by
Starling, Niels
New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA
by
Mohamed, Khaled Salah
Learn Blockchain by Building One: A Concise Path to Understanding Cryptocurrencies
by
Van Flymen, Daniel
Screen Time Log: Daily Track Kids Screenfree Digital Detox, Screen Activities Tracker, For Parents, Journal, Book
by
Newton, Amy
Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing
by
Schnell, Rainer, Christen, Peter, Ranbaduge, Thilina
Shue's, CompTIA Security+, Exam SY0-601, Study Supplement
by
Schumacher, Mark
GRU Cybervillains: The DOJ Indictment Against Six Russian Hackers
by
Department of Justice
New Research on the Voynich Manuscript: Proceedings of a Seminar
by
National Security Agency
Scam Survivor: How One Victim Fought Back
by
Leakey, Jonathan A.
Ptfm: Purple Team Field Manual
by
Bryant, Tim
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by
Greenberg, Andy
A Practical Guide to Digital Forensics Investigations
by
Hayes, Darren
Como entender la ciberseguridad desde la perspectiva de un Product Owner: Y no morir en el intento
by
Diaz Bautista, Miguel Angel
CompTIA: CompTIA Security+: SY0-501: Practice Exams SY0-501: 390 Top Notch Questions CompTIA Security +
by
Cromwell, Dennis
Können sich Kryptowährungen im bargeldlosen Zahlungsverkehr etablieren?: Bekanntheit, Akzeptanz und die Nutzung von Kryptowährungen in Deutschland
by
Wilhelm, Simon
Password Keeper: Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook, Journal
by
Newton, Amy
Hacking Multifactor Authentication
by
Grimes, Roger A.
Technical Articles about the Voynich Manuscript
by
National Security Agency
Cyber Security: The Lifeline of Information and Communication Technology
by
Rohokale, Vandana, Prasad, Ramjee
Building Secure Firmware: Armoring the Foundation of the Platform
by
Yao, Jiewen, Zimmer, Vincent
Defense and Deception: Confuse and Frustrate the Hackers
by
Cardwell, Kevin
The Personal Digital Resilience Handbook: An essential guide to safe, secure and robust use of everyday technology
by
Wild, David
Device-Independent Quantum Information Processing: A Simplified Analysis
by
Arnon-Friedman, Rotem
Chroot your Red Hat/Centos 8 - Extreme Hardening.
by
de Oliveira, Renato Carlos
Palo Alto Networks Certified Network Security Engineer (PCNSE) Exam Practice Questions & Dumps: Exam Practice Questions For Palo Alto Networks (PCNSE)
by
Books, Quantic
Smiling Security: The Cybersecurity Manager's Road to Success
by
Niemelä, Mikko, Koistinen, Pasi
Cyber Security: Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked
by
Studios, Hacking
Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
by
Mukherjee, Aditya
A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities
by
Rahalkar, Sagar
Python Testing with Selenium: Learn to Implement Different Testing Techniques Using the Selenium Webdriver
by
Raghavendra, Sujay
70 Tips and Tricks for Mastering the Cissp Exam
by
Danturthi, R. Sarma
The Cybersecurity Maturity Model Certification (CMMC): A pocket guide
by
Gamble, William
Alice and Bob Learn Application Security
by
Janca, Tanya
The Darknet and Smarter Crime: Methods for Investigating Criminal Entrepreneurs and the Illicit Drug Economy
by
Bancroft, Angus
Die Blockchain und ihr Nutzen für Finanzinstitute
by
Kösling, Tim
Cognitive Superiority: Information to Power
by
Hartley III, Dean S., Jobson, Kenneth O.
Fintech: Hacking, Blockchain, Big Data, Cryptocurrency
by
Reznor, Eliot P.
Hackable: How to Do Application Security Right
by
Harrington, Ted
Konfliktmanagement Für Sicherheitsprofis: Auswege Aus Der "Buhmann-Falle" Für Informations- Und It-Sicherheitsbeauftragte, Datenschützer, Cisos Und Co
by
Klipper, Sebastian
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide: Begin a successful career in networking with 200-301 CCNA certification
by
Singh, Glen D.
Patientenorientierte Digitalisierung Im Krankenhaus: It-Architekturmanagement Am Behandlungspfad
by
Bender, Matthias, Mangiapane, Markus
Securing Docker: The Attack and Defense Way
by
Sharma, Nitin, Martin, Jeremy
Cissp: 3 in 1- Beginner's Guide] Tips and Tricks+ Simple and Effective Strategies to Learn Information Systems Security
by
Schmidt, Walker
Ressourcen schützen: Die Sicherung von Hardware und Software
by
Thaller, Georg Erwin
Mastering Corda: Blockchain for Java Developers
by
Sheikh, Jamiel
Contact Tracing in Post-Covid World: A Cryptologic Approach
by
Nandi, Mridul, Chakraborty, Pranab, Maitra, Subhamoy
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach
by
Zhu, Quanyan, Xu, Zhiheng
Cyber Attack Survival Manual: From Identity Theft to the Digital Apocalypse: And Everything in Between 2020 Paperback Identify Theft Bitcoin Deep Web
by
Selby, Nick, Vescent, Heather
Blockchain with Hyperledger Fabric, Second Edition: Build decentralized applications using Hyperledger Fabric 2
by
Desrosiers, Luc, Ramakrishna, Venkatraman, Gaur, Nitin
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
by
Moyle, Ed, Kelley, Diana
Red Hat and It Security: With Red Hat Ansible, Red Hat Openshift, and Red Hat Security Auditing
by
Chatterjee, Rithik
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography
by
Baka, Paul, Schatten, Jeremy
The Pentester Blueprint: Starting a Career as an Ethical Hacker
by
Wylie, Phillip L., Crawley, Kim
Lattice-Based Public-Key Cryptography in Hardware
by
Sinha Roy, Sujoy, Verbauwhede, Ingrid
Pro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .Net
by
Mihailescu, Marius Iulian, Nita, Stefania Loredana
Fintech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations
by
Dorfleitner, Gregor, Hornuf, Lars
Algorithms for Data and Computation Privacy
by
Liu, Alex X., Li, Rui
Network Hacks - Intensivkurs: Angriff Und Verteidigung Mit Python 3
by
Ballmann, Bastian
MentalTheft
by
Newton, Paul, Lawrence, Jesse, Ivory, Diane
Cciso Certified Chief Information Security Officer All-In-One Exam Guide
by
Genung, Jordan, Bennett, Steven
You Can Stop Stupid: Stopping Losses from Accidental and Malicious Actions
by
Brown, Tracy Celaya, Winkler, Ira
SELinux System Administration - Third Edition: Implement mandatory access control to secure applications, users, and information flows on Linux
by
Vermeulen, Sven
Cybersecurity in Digital Transformation: Scope and Applications
by
Möller, Dietmar P. F.
New Dimensions of Information Warfare
by
Di Pietro, Roberto, Raponi, Simone, Caprolu, Maurantonio
AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
by
Helmus, Jonathan
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
by
Abelson, Hal, Ledeen, Ken, Lewis, Harry
31 Days Before Your CCNP and CCIE Enterprise Core Exam
by
Gargano, Patrick
Pro Google Cloud Automation: With Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins
by
Pandey, Piyush, Sabharwal, Navin
Hackable: How to Do Application Security Right
by
Harrington, Ted
Guide to Pentesting: English edition 2020
by
Caranti, Milo
Strafbarkeitsrisiken bei White-Hat und Grey-Hat-Hacking
by
Beer, Sascha
Programming Hyperledger Fabric: Creating Enterprise Blockchain Applications
by
Jain, Siddharth
Cybersecurity for Everyone
by
Skillicorn, David B.
Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security
by
Dorsel, Richard
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)
by
Calder, Alan
The Cyber Security Handbook: Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF)
by
Calder, Alan
DevSecOps: A leader's guide to producing secure software without compromising flow, feedback and continuous improvement
by
Wilson, Glenn
Mathematical Theory of Advanced Computing
by
Osterhage, Wolfgang W.
Hacking with Python and Kali-Linux: Develop your own Hackingtools with Python in Kali-Linux
by
Noors, Alicia, B, Mark
Authentication and Access Control: Practical Cryptography Methods and Tools
by
Boonkrong, Sirapat
Accountability in Computing: Concepts and Mechanisms
by
Wright, Rebecca N., Feigenbaum, Joan, Jaggard, Aaron D.
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption
by
Jarvis, Craig
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption
by
Jarvis, Craig
Comptia Security+ Guide to Network Security Fundamentals
by
Ciampa, Mark
Time Based Security: Adding Measurement, Detection, and Reaction Time to Cybersecurity.
by
Schwartau, Winn
Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps
by
Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Blockchain: Hype or Innovation
by
Gayvoronskaya, Tatiana, Meinel, Christoph
Cyber Security on Azure: An It Professional's Guide to Microsoft Azure Security
by
Copeland, Marshall, Jacobs, Matthew
Perceived Privacy in Location-Based Mobile System
by
Poikela, Maija Elina
Redesigning Wiretapping: The Digitization of Communications Interception
by
Fitsanakis, Joseph
CCNP Security Identity Management Sise 300-715 Official Cert Guide
by
Woland, Aaron, McNamara, Katherine
Introduction to Modern Cryptography
by
Katz, Jonathan, Lindell, Yehuda
Customer Data and Privacy: The Insights You Need from Harvard Business Review
by
Review, Harvard Business, Burt, Andrew, Morey, Timothy
Security Engineering: A Guide to Building Dependable Distributed Systems
by
Anderson, Ross
Threat Modeling: A Practical Guide for Development Teams
by
Tarandach, Izar, Coles, Matthew J.
Derecho y criminalistica en informática forense: delitos informáticos
by
Cabrera Pivaral, Carlos Enrique, López Toledo, Sabina, García, Sergio Alberto Ramírez
Manipulationssichere Cloud-Infrastrukturen: Nachhaltige Digitalisierung Durch Sealed Cloud Security
by
Inclusive Security: Digital Security Meets Web Science
by
Coles-Kemp, Lizzie