Computer Security in 2021
Machine Learning Approaches in Cyber Security Analytics
by
Emmanuel, Sabu, Thomas, Tony, P. Vijayaraghavan, Athira
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography
by
Schatten, Jeremy, Baka, Paul
Mastering Python for Networking and Security - Second Edition: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome network
by
Ortega, José Manuel
Cryptography in the Information Society
by
Ryabko, Boris, Fionov, Andrey
Mike Meyers' Comptia Security+ Certification Passport, Sixth Edition (Exam Sy0-601)
by
Dunkerley, Dawn
Comptia Security+ Certification Practice Exams, Fourth Edition (Exam Sy0-601)
by
LaChance, Daniel, Clarke, Glen E.
Chatbots: Aufbau Und Anwendungsmöglichkeiten Von Autonomen Sprachassistenten
by
Kohne, Andreas, Kleinmanns, Philipp, Rolf, Christian
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction
by
Shakarian, Paulo, Alvari, Hamidreza, Shaabani, Elham
Quantum Cryptography: From Key Distribution to Conference Key Agreement
by
Grasselli, Federico
The Truth about Social Media
by
Gulshan, Priyanka
Cybsersecurity Fundamentals 1
by
Jony, Tapon Mahamud
Machine Learning in Cyber Security: Network Traffic Classification based on Class Weight-based K-NN Classifier (CWK-NN)
by
Hijazi, Mohamad Osama, Khalife, Jawad
Artificial Intelligence controlling Cyber Security
by
Odayan, Kershlin
Unhackable: Workbook
by
Mansour, George
Boolean Functions for Cryptography and Coding Theory
by
Carlet, Claude
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems
by
Madieu, John
Viral Bs: Medical Myths and Why We Fall for Them
by
Yasmin, Seema
Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de
by
Kiser, Quinn
How To Crack Bitcoin Wallets For Million Dollar Bounty
by
Raman, Venkata
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
by
Espinosa, Christian
Introduction to the Darknet: Darknet 101
by
Hoffer, Martin
Tor Anonymity Network 101: An Introduction to The Most Private Part of The Internet
by
Gates, Steven
Senior Cyber: Best Security Practices for Your Golden Years
by
Schober, Scott N., Schober, Craig W.
Senior Cyber: Best Security Practices for Your Golden Years
by
Schober, Scott N.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
by
Bochman, Andrew A., Freeman, Sarah
How to Destroy Surveillance Capitalism
by
Doctorow, Cory
Practical Network Security Monitoring: Using Free Software
by
Graham, Elizabeth
Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools
by
Ntemngwa, Celestin
Intrusion Detection: A Data Mining Approach
by
SenGupta, Nandita, Sil, Jaya
CompTIA Pentest+ (Practice Exams)
by
Karamagi, Robert
AWS Certified Security Study Guide: Specialty (Scs-C01) Exam
by
Neto, Marcello Zillo, Santana, Gustavo A. a., Sapata, Fernando
Comptia Security+ Study Guide: Exam Sy0-601
by
Seidl, David, Chapple, Mike
Internet of Things Security: Principles and Practice
by
Tang, Qinghao, Du, Fan
Design and Cryptanalysis of Zuc: A Stream Cipher in Mobile Telephony
by
Mukherjee, Chandra Sekhar, Roy, Dibyendu, Maitra, Subhamoy
Poc or Gtfo, Volume 3
by
Laphroaig, Manul
Consumer Identity & Access Management: Design Fundamentals
by
Moffatt, Simon
Fortigate Security Pocket Guide
by
Shmueli, Ofer
Cryptography Arithmetic: Algorithms and Hardware Architectures
by
Omondi, Amos R.
Game Theory for Cyber Deception: From Theory to Applications
by
Zhu, Quanyan, Pawlick, Jeffrey
Practical Paranoia macOS 11 Security Essentials
by
Mintz, Marc Louis
Penetration Testing Step By Step Guide
by
Shatob, Radhi
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
by
Espinosa, Christian
Comptia Security+ Practice Tests: Exam Sy0-601
by
Seidl, David
Comptia Security+ Review Guide: Exam Sy0-601
by
Stewart, James Michael
Quantum Communication Networks
by
Deppe, Christian, Bassoli, Riccardo, Boche, Holger
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects
by
Amini, M. Hadi, Boroojeni, Kianoosh G., Sniatala, Pawel
Practical Paranoia iOS 14 Security Essentials
by
Mintz, Marc Louis
Fault-Tolerant Distributed Transactions on Blockchain
by
Hellings, Jelle, Sadoghi, Mohammad, Gupta, Suyash
Comptia Security+ Certification Kit: Exam Sy0-601
by
Chapple, Mike, Seidl, David
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography
by
Mittelbach, Arno, Fischlin, Marc
Security Essentials
by
Lavender, Linda K.
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools
by
Costa-Gazcón, Valentina
Network Penetration Testing
by
Shatob, Radhi
Data Protection Officer
by
Edvardsen, Sofia, Johnssén, Filip
Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change
by
Davis, Adrian, Hallas, Bruce, Barker, Jessica
Ich hacke Technik: Ein Lei[td]faden durch die [hochsichere] Technik des 21. Jahrhunderts
by
Faithful, Stacey
Ocp Oracle Certified Professional Java Se 11 Developer Practice Tests: Exam 1z0-819 and Upgrade Exam 1z0-817
by
Selikoff, Scott, Boyarsky, Jeanne
Phishing Attacks: Advanced Attack Techniques 2
by
Atkins, Christopher
Crafting Test-Driven Software with Python: Write test suites that scale with your applications' needs and complexity using Python and PyTest
by
Molina, Alessandro
Mastering Veeam Backup & Replication 10: Protect your virtual environment and implement cloud backup using Veeam technology
by
Childerhose, Chris
Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators
by
The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks
by
Calder, Alan
Guide to Cybersecurity - Part 1: A complete book for Ethical Hackers
by
Dey, Prashant Kumar
Assembly Language Laboratory Work
by
Silaghi, Marius
Arithmetic and Algebraic Circuits
by
Castillo Morales, Encarnación, Parrilla Roure, Luis, Lloris Ruiz, Antonio
Cryptocurrency: A Beginner's Guide To Understanding And Winning With Fintech
by
Reznor, Eliot P.
Ransomware Revolution: The Rise of a Prodigious Cyber Threat
by
Ryan, Matthew
Big Breaches: Cybersecurity Lessons for Everyone
by
Daswani, Neil, Elbayadi, Moudy
Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
by
Ozkaya, Erdal
Practical AI for Cybersecurity
by
Das, Ravi
Practical AI for Cybersecurity
by
Das, Ravi
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives
by
Sahoo, Somya Ranjan, Gupta, Brij B.
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
by
Mehta, Deep
Zero Trust Security: An Enterprise Guide
by
Garbis, Jason, Chapman, Jerry W.
Qos Routing Algorithms for Wireless Sensor Networks
by
Kumaraswamy, M., Venugopal, K. R., T, Shiv Prakash
Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
by
Gupta, Brij B., Dahiya, Amrita
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
by
Debbabi, Mourad, Shirani, Paria, Alrabaee, Saed
Book of Anonymity
by
Collective, Anon
Cybersecurity Now
by
Sachs, Amir, Hughes, Fred, McCracken, George
Practical Paranoia Chromebook Security Essentials
by
Mintz, Marc Louis
Cybersecurity Lessons from CoVID-19
by
Slade, Robert
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C
by
Kiser, Quinn
Network Security and Cryptography
by
Karamagi, Robert
Hack1ng stories: [Volume 1]
by
DuBois, Julien
Cybersecurity Readiness: A Holistic and High-Performance Approach
by
Chatterjee, Dave
Password Book With Alphabetical Tabs: Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal
by
Harrlez, Iris Lorry
The Secure Board: How To Be Confident That Your Organisation Is Cyber Safe
by
Leibel, Anna, Pales, Claire
Exclusive M1 Macbook Pro User Guide: An Exhaustive Step By Step Guide in Mastering the New Apple M1 Chip with MacOS Big Sur
by
Eleazar, Michael
Palo Alto Cortex XSOAR: A Practical Guide
by
Alex, Jithin
Secure Searchable Encryption and Data Management
by
Gupta, Brij B., Mamta
The Cyber-Elephant in the Boardroom: Cyber-Accountability with the Five Pillars of Security Framework
by
Gorge, Mathieu
Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, C
by
Kiser, Quinn
Cybersecurity in the COVID-19 Pandemic
by
Okereafor, Kenneth
Security by Design: Security Engineering Informationstechnischer Systeme
by
Lunkeit, Armin, Zimmer, Wolf
Equity of Cybersecurity in the Education System: High Schools, Undergraduate, Graduate and Post-Graduate Studies.
by
Esin, Joseph O.
The Doctor's In: Treating America's Greatest Cyber Security Threat
by
Weinberger, Alan D.
Real Fake
by
Watts, Clint, Haque, Farid
Beginners Guide to Cybersecurity for Senior Citizens: A comprehensive guide to protecting yourself cyber attacks and identity theft in 2021
by
Tindall, Mason
Network Programming with Go: Code Secure and Reliable Network Services from Scratch
by
Woodbeck, Adam
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining
by
Zolfaghari, Behrouz, Bibak, Khodakhast, Koshiba, Takeshi
Guide To Hacking: Give You Few Of The Most Important Steps Essential To Be A Hacker: How To Hack Smartphones
by
Deloe, Keeley
Risk Management Framework 2.0 Workbook
by
Broad, James
Modern Cryptography with Proof Techniques and Implementations
by
Lee, Wai Kong, Oun Hwang, Seong, Kim, Intae
Hacking Book: Learning A Bit Of Hacking Can Be The Way To Keep Your Network Safe: Basic Concepts Of Hacking
by
Bainter, Gerri
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
by
Kernighan, Brian W.
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition
by
Kernighan, Brian W.
Steps By Step To Hacker: Focus On Skills And Attitude That Is Required To Become A Hacker: The Basic Of Hacking
by
Purtlebaugh, Charlie
Cryptographic Methods
by
Amsaad, Fathi, Alajlan, Abrar, Razaque, Abdul
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics
by
Wyant, R. T., Burns, Thomas
Corporate Defense and the Value Preservation Imperative: Bulletproof Your Corporate Defense Program
by
Lyons, Sean
Introduction to Cryptography
by
Saraswat, Vishal, Sahu, Rajeev A., Padhye, Sahadeo
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition
by
Sachowski, Jason
Counter Terrorism Issues: Case Studies in the Courtroom
by
Castagnera, James Ottavio
Cryptographic Methods
by
Amsaad, Fathi, Alajlan, Abrar, Razaque, Abdul
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard
by
Susanto, Heru, Almunawar, Mohammad Nabil
Private Investigation and Homeland Security
by
Benny, Daniel J.
Strategic Security: Forward Thinking for Successful Executives
by
Perois, Jean
The Politics and Technology of Cyberspace
by
Steed, Danny
Wireless Network Security: Second Edition
by
Osterhage, Wolfgang
Extremist Propaganda in Social Media: A Threat to Homeland Security
by
Erbschloe, Michael
Digital Forensics for Handheld Devices
by
Doherty, Eamon P.