Computer Security in 2021
Machine Learning Approaches in Cyber Security Analytics
by
P. Vijayaraghavan, Athira, Emmanuel, Sabu, Thomas, Tony
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography
by
Baka, Paul, Schatten, Jeremy
Mike Meyers' Comptia Security+ Certification Passport, Sixth Edition (Exam Sy0-601)
by
Dunkerley, Dawn
Mastering Python for Networking and Security - Second Edition: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome network
by
Ortega, José Manuel
Comptia Security+ Certification Practice Exams, Fourth Edition (Exam Sy0-601)
by
Clarke, Glen E., LaChance, Daniel
Cryptography in the Information Society
by
Ryabko, Boris, Fionov, Andrey
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction
by
Shaabani, Elham, Shakarian, Paulo, Alvari, Hamidreza
Quantum Cryptography: From Key Distribution to Conference Key Agreement
by
Grasselli, Federico
Chatbots: Aufbau Und Anwendungsmöglichkeiten Von Autonomen Sprachassistenten
by
Rolf, Christian, Kohne, Andreas, Kleinmanns, Philipp
The Truth about Social Media
by
Gulshan, Priyanka
Cybsersecurity Fundamentals 1
by
Jony, Tapon Mahamud
Machine Learning in Cyber Security: Network Traffic Classification based on Class Weight-based K-NN Classifier (CWK-NN)
by
Khalife, Jawad, Hijazi, Mohamad Osama
Artificial Intelligence controlling Cyber Security
by
Odayan, Kershlin
Unhackable: Workbook
by
Mansour, George
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems
by
Madieu, John
Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de
by
Kiser, Quinn
Viral Bs: Medical Myths and Why We Fall for Them
by
Yasmin, Seema
How To Crack Bitcoin Wallets For Million Dollar Bounty
by
Raman, Venkata
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
by
Espinosa, Christian
Introduction to the Darknet: Darknet 101
by
Hoffer, Martin
Tor Anonymity Network 101: An Introduction to The Most Private Part of The Internet
by
Gates, Steven
Senior Cyber: Best Security Practices for Your Golden Years
by
Schober, Scott N.
Senior Cyber: Best Security Practices for Your Golden Years
by
Schober, Scott N., Schober, Craig W.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
by
Bochman, Andrew A., Freeman, Sarah
How to Destroy Surveillance Capitalism
by
Doctorow, Cory
Practical Network Security Monitoring: Using Free Software
by
Graham, Elizabeth
Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools
by
Ntemngwa, Celestin
Intrusion Detection: A Data Mining Approach
by
Sil, Jaya, SenGupta, Nandita
CompTIA Pentest+ (Practice Exams)
by
Karamagi, Robert
AWS Certified Security Study Guide: Specialty (Scs-C01) Exam
by
Sapata, Fernando, Neto, Marcello Zillo, Santana, Gustavo A. a.
Internet of Things Security: Principles and Practice
by
Du, Fan, Tang, Qinghao
Design and Cryptanalysis of Zuc: A Stream Cipher in Mobile Telephony
by
Maitra, Subhamoy, Mukherjee, Chandra Sekhar, Roy, Dibyendu
Poc or Gtfo, Volume 3
by
Laphroaig, Manul
Consumer Identity & Access Management: Design Fundamentals
by
Moffatt, Simon
Fortigate Security Pocket Guide
by
Shmueli, Ofer
Cryptography Arithmetic: Algorithms and Hardware Architectures
by
Omondi, Amos R.
Game Theory for Cyber Deception: From Theory to Applications
by
Pawlick, Jeffrey, Zhu, Quanyan
Practical Paranoia macOS 11 Security Essentials
by
Mintz, Marc Louis
Penetration Testing Step By Step Guide
by
Shatob, Radhi
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
by
Espinosa, Christian
Comptia Security+ Review Guide: Exam Sy0-601
by
Stewart, James Michael
Comptia Security+ Practice Tests: Exam Sy0-601
by
Seidl, David
Quantum Communication Networks
by
Boche, Holger, Deppe, Christian, Bassoli, Riccardo
Boolean Functions for Cryptography and Coding Theory
by
Carlet, Claude
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects
by
Boroojeni, Kianoosh G., Sniatala, Pawel, Amini, M. Hadi
Practical Paranoia iOS 14 Security Essentials
by
Mintz, Marc Louis
Fault-Tolerant Distributed Transactions on Blockchain
by
Gupta, Suyash, Hellings, Jelle, Sadoghi, Mohammad
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography
by
Mittelbach, Arno, Fischlin, Marc
Security Essentials
by
Lavender, Linda K.
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools
by
Costa-Gazcón, Valentina
Network Penetration Testing
by
Shatob, Radhi
Data Protection Officer
by
Johnssén, Filip, Edvardsen, Sofia
Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change
by
Hallas, Bruce, Barker, Jessica, Davis, Adrian
Ich hacke Technik: Ein Lei[td]faden durch die [hochsichere] Technik des 21. Jahrhunderts
by
Faithful, Stacey
Ocp Oracle Certified Professional Java Se 11 Developer Practice Tests: Exam 1z0-819 and Upgrade Exam 1z0-817
by
Boyarsky, Jeanne, Selikoff, Scott
Phishing Attacks: Advanced Attack Techniques 2
by
Atkins, Christopher
Crafting Test-Driven Software with Python: Write test suites that scale with your applications' needs and complexity using Python and PyTest
by
Molina, Alessandro
Mastering Veeam Backup & Replication 10: Protect your virtual environment and implement cloud backup using Veeam technology
by
Childerhose, Chris
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks
by
Calder, Alan
Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators
by
Guide to Cybersecurity - Part 1: A complete book for Ethical Hackers
by
Dey, Prashant Kumar
Arithmetic and Algebraic Circuits
by
Lloris Ruiz, Antonio, Castillo Morales, Encarnación, Parrilla Roure, Luis
Assembly Language Laboratory Work
by
Silaghi, Marius
Cryptocurrency: A Beginner's Guide To Understanding And Winning With Fintech
by
Reznor, Eliot P.
Ransomware Revolution: The Rise of a Prodigious Cyber Threat
by
Ryan, Matthew
Cybersecurity Readiness: A Holistic and High-Performance Approach
by
Chatterjee, Dave
Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
by
Ozkaya, Erdal
Big Breaches: Cybersecurity Lessons for Everyone
by
Elbayadi, Moudy, Daswani, Neil
Practical AI for Cybersecurity
by
Das, Ravi
Practical AI for Cybersecurity
by
Das, Ravi
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives
by
Gupta, Brij B., Sahoo, Somya Ranjan
Zero Trust Security: An Enterprise Guide
by
Chapman, Jerry W., Garbis, Jason
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
by
Mehta, Deep
Qos Routing Algorithms for Wireless Sensor Networks
by
T, Shiv Prakash, Kumaraswamy, M., Venugopal, K. R.
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
by
Shirani, Paria, Alrabaee, Saed, Debbabi, Mourad
Distributed Denial of Service (Ddos) Attacks: Classification, Attacks, Challenges and Countermeasures
by
Dahiya, Amrita, Gupta, Brij B.
Book of Anonymity
by
Collective, Anon
Cybersecurity Now
by
Hughes, Fred, McCracken, George, Sachs, Amir
Practical Paranoia Chromebook Security Essentials
by
Mintz, Marc Louis
Cybersecurity Lessons from Covid-19
by
Slade, Robert
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C
by
Kiser, Quinn
Network Security and Cryptography
by
Karamagi, Robert
Hack1ng stories: [Volume 1]
by
DuBois, Julien
Password Book With Alphabetical Tabs: Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal
by
Harrlez, Iris Lorry
The Secure Board: How To Be Confident That Your Organisation Is Cyber Safe
by
Leibel, Anna, Pales, Claire
Exclusive M1 Macbook Pro User Guide: An Exhaustive Step By Step Guide in Mastering the New Apple M1 Chip with MacOS Big Sur
by
Eleazar, Michael
Palo Alto Cortex XSOAR: A Practical Guide
by
Alex, Jithin
The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework
by
Gorge, Mathieu
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C
by
Kiser, Quinn
Secure Searchable Encryption and Data Management
by
Mamta, Gupta, Brij B.
Cybersecurity in the Covid-19 Pandemic
by
Okereafor, Kenneth
Security by Design: Security Engineering Informationstechnischer Systeme
by
Lunkeit, Armin, Zimmer, Wolf
Equity of Cybersecurity in the Education System: High Schools, Undergraduate, Graduate and Post-Graduate Studies.
by
Esin, Joseph O.
Real Fake
by
Haque, Farid, Watts, Clint
The Doctor's In: Treating America's Greatest Cyber Security Threat
by
Weinberger, Alan D.
Network Programming with Go: Code Secure and Reliable Network Services from Scratch
by
Woodbeck, Adam
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining
by
Koshiba, Takeshi, Zolfaghari, Behrouz, Bibak, Khodakhast
Guide To Hacking: Give You Few Of The Most Important Steps Essential To Be A Hacker: How To Hack Smartphones
by
Deloe, Keeley
Risk Management Framework 2.0 Workbook
by
Broad, James
Modern Cryptography with Proof Techniques and Implementations
by
Oun Hwang, Seong, Kim, Intae, Lee, Wai Kong
Hacking Book: Learning A Bit Of Hacking Can Be The Way To Keep Your Network Safe: Basic Concepts Of Hacking
by
Bainter, Gerri
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
by
Kernighan, Brian W.
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
by
Kernighan, Brian W.
Steps By Step To Hacker: Focus On Skills And Attitude That Is Required To Become A Hacker: The Basic Of Hacking
by
Purtlebaugh, Charlie
Cryptographic Methods
by
Alajlan, Abrar, Razaque, Abdul, Amsaad, Fathi
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics
by
Wyant, R. T., Burns, Thomas
Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program
by
Lyons, Sean
Introduction to Cryptography
by
Sahu, Rajeev A., Padhye, Sahadeo, Saraswat, Vishal
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition
by
Sachowski, Jason
Counter Terrorism Issues: Case Studies in the Courtroom
by
Castagnera, James Ottavio
Cryptographic Methods
by
Alajlan, Abrar, Razaque, Abdul, Amsaad, Fathi
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard
by
Almunawar, Mohammad Nabil, Susanto, Heru
Private Investigation and Homeland Security
by
Benny, Daniel J.
The Politics and Technology of Cyberspace
by
Steed, Danny
Wireless Network Security: Second Edition
by
Osterhage, Wolfgang
Extremist Propaganda in Social Media: A Threat to Homeland Security
by
Erbschloe, Michael
Digital Forensics for Handheld Devices
by
Doherty, Eamon P.
Critical Infrastructure: Homeland Security and Emergency Preparedness, Fourth Edition
by
McDougall, Allan, Radvanovsky, Robert S.
Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy
by
Warner, Richard, Sloan, Robert