Computer Security in 2022
No Domain: The John McAfee Tapes
by
Eglinton, Mark
Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication
by
Kaschner, Holger
Preference-Based Spatial Co-Location Pattern Mining
by
Fang, Yuan, Zhou, Lihua, Wang, Lizhen
Data Security: Technical and Organizational Protection Measures Against Data Loss and Computer Crime
by
Lenhard, Thomas H.
Event- And Data-Centric Enterprise Risk-Adjusted Return Management: A Banking Practitioner's Handbook
by
Kumar Kattumannil, Sudheesh, Subramanian R., Kannan
Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
by
Ozkaya, Erdal
والدین حقیقی ، فرزندان مج
by
Monshizadeh, Mohammad
Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
by
Ristic, Ivan
Library Patrons' Privacy: Questions and Answers
by
Beckstrom, Matthew A., Lund, Brady D., Valenti, Sandra J.
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
by
Ali, Ikram, Chen, Yong, Faisal, Mohammad
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Cloud
by
Ipsale, Maurizio, Gilioli, Mirko
The Crypto Kid
by
Shembekar, Jackson
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
by
Payne, Bryson
Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity
by
Olson, Scott, Garber, Leeza
Expressing Information Flow Properties
by
Myers, Andrew C., Kozyri, Elisavet, Chong, Stephen
Privacy Is Power: Why and How You Should Take Back Control of Your Data
by
Veliz, Carissa
The Development of Blockchain Technology: Research on the Development of Electronic Information Engineering Technology in China
by
Center for Electronics and Information Studies Chinese Acade
Microsoft Sentinel in Action - Second Edition: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions
by
Bushey, Gary, Perkins, John, Diver, Richard
Machine Learning for Cyber Agents: Attack and Defence
by
Abaimov, Stanislav, Martellini, Maurizio
Game Theory for Cyber Deception: From Theory to Applications
by
Pawlick, Jeffrey, Zhu, Quanyan
Cryptography and Steganography. A multilayer Data Security Approach
by
Patni, Jagdish Chandra, Sharma, Hitesh Kumar
Cyber Arms: Security in Cyberspace
by
Abaimov, Stanislav, Martellini, Maurizio
Advanced Security Testing with Kali Linux
by
Dieterle, Daniel W.
Understanding Network Hacks: Attack and Defense with Python 3
by
Ballmann, Bastian
Quantum Communication Networks
by
Bassoli, Riccardo, Boche, Holger, Deppe, Christian
Access Control Models and Architectures for Iot and Cyber Physical Systems
by
Alshehri, Asma Hassan, Gupta, Maanak, Bhatt, Smriti
ACE - CISSP - Essential Approach To The Exam
by
Hazra, Sabyasachi
DNSSEC Mastery, 2nd Edition
by
Lucas, Michael W.
DNSSEC Mastery, 2nd Edition
by
Lucas, Michael W.
The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market
by
Jin, Yuxi, Miller, Klaus M., Skiera, Bernd
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass th
by
Hedberg, Viktor, Darr, Shabaz
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography
by
Mittelbach, Arno, Fischlin, Marc
Mastering Veeam Backup & Replication - Second Edition: Secure backup with Veeam 11 for defending your data and accelerating your data protection strat
by
Childerhose, Chris
Practical Security for Agile and DevOps
by
Merkow, Mark S.
Practical Security for Agile and DevOps
by
Merkow, Mark S.
Wing-Level Mission Assurance for a Cyber-Contested Environment
by
Mayer, Lauren A., Brosmer, Jonathan Lee, Snyder, Don
Parenting for the Digital Generation: A Guide to Digital Education and the Online Environment
by
Garon, Jon M.
Data Privacy: A Runbook for Engineers
by
Bhajaria, Nishant
Agile Security Operations: Engineering for agility in cyber defense, detection, and response
by
Hettema, Hinne
Cyber Law in Israel
by
Hallevy, Gabriel
The Security Hippie
by
Engel, Barak
The Security Hippie
by
Engel, Barak
Cloud Computing Security: Foundations and Research Directions
by
Chakraborti, Anrin, Curtmola, Reza, Katz, Jonathan
Information Retrieval and Natural Language Processing: A Graph Theory Approach
by
Mahalle, Parikshit N., Ghotkar, Archana S., Sonawane, Sheetal S.
Arithmetic and Algebraic Circuits
by
Castillo Morales, Encarnación, Parrilla Roure, Luis, Lloris Ruiz, Antonio
The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
by
Singh, Glen D.
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency
by
Paxton, Paul
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency
by
Paxton, Paul
Ransomware Revolution: The Rise of a Prodigious Cyber Threat
by
Ryan, Matthew
Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Health
by
Srivastava, Anurag
Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser
by
Segala, Alessandro
Authorization and Access Control: Foundations, Frameworks, and Applications
by
R. Shinde, Gitanjali, N. Mahalle, Parikshit, S. Bhong, Shashikant
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you
by
Velu, Vijay Kumar
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes
by
Fried, Robert B.
Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
by
Bertaccini, Massimo
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes
by
Fried, Robert B.
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering
by
Alaofin, Tunde
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering
by
Alaofin, Tunde
The Internet: A Practical Guide for Beginners
by
Fong, Keith
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ E Communication
by
Lawson, Sean T., Gehl, Robert W.
Cloud Security for Dummies
by
Coombs, Ted
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
by
Harper, Allen, Sims, Stephen, Linn, Ryan
Cybersecurity: Ethics, Legal, Risks, and Policies
by
Priyadarshini, Ishaani, Cotton, Chase
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks
by
Wittkop, Jeremy
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-
by
Natwick, Dwayne
Advanced Windows Memory Dump Analysis with Data Structures: Training Course Transcript and WinDbg Practice Exercises with Notes, Fourth Edition
by
Vostokov, Dmitry, Software Diagnostics Services
Multimedia Security 1: Authentication and Data Hiding
by
Puech, William
Privacy-Preserving Machine Learning
by
Liu, Zheli, Li, Jin, Li, Ping
The Cybersecurity to English Dictionary: 5th Edition
by
Meeuwisse, Raef
The Cybersecurity to English Dictionary: 5th Edition
by
Meeuwisse, Raef
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security Stack for
by
Anich, Joe, Stuart, Trevor
Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory
by
Skulkin, Oleg, Ostrovskaya, Svetlana
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition: Explore the new features of Zabbix 6 for designing, building, and maintaining your Za
by
Baekel, Brian Van, Liefting, Nathan
NFT (Non-Fungible Token) For Beginners: THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow
by
Streamings, Megalodona
Cryptocurrency Trading: A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN
by
Streamings, Megalodona
Implementing Devsecops with Docker and Kubernetes: An Experiential Guide to Operate in the Devops Environment for Securing and Monitoring Container Ap
by
Ortega Candel, Jose Manuel
Python for Cybersecurity: Using Python for Cyber Offense and Defense
by
Poston, Howard E.
The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning
by
Smith-Ruiu, Justin
KAT - A Kid's Guide to Staying Safe Online: A Kid's Guide to Staying Safe Online
by
Trafficking, Kids Against
Linux Command Line and Shell Scripting Techniques: Master practical aspects of the Linux command line and then use it as a part of the shell scripting
by
Dakic, Vedran, Redzepagic, Jasmin
Tor Browser: Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet Priva
by
Robson, Joseph
It Security Controls: A Guide to Corporate Standards and Frameworks
by
Viegas, Virgilio, Kuyucu, Oben
Selected Topics in Information Security Research and Teaching
by
Al-Janabi, Sufyan
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
by
Cryptocurrency for Beginners: How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins
by
Pascall, Zeph
Comptia Pentest+ Certification for Dummies
by
Clarke, Glen E.
Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-Pacific
by
Domingo, Francis C.
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects
by
Summers, Akira
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects
by
Summers, Akira
Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency
by
Wagner, Isabel
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be
by
Fraley, Harper
Data Ethics and Challenges
by
Tiwari, Kapil, Shukla, Samiksha, George, Jossy P.
Fundamentals of Adopting the Nist Cybersecurity Framework: Part of the Create, Protect, and Deliver Digital Business Value Series
by
Moskowitz, David, Nichols, David
The Social Hacking Dictionary
by
Kathy, Black Hat
Digital Transformation with Dataverse: Become a Citizen Developer and Lead the Digital Transformation Wave with Microsoft Teams and Power Platform
by
Brooke, Aaron
Cybersecurity and Local Government
by
Mateczun, Laura K., Forno, Richard F., Norris, Donald F.
Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002)
by
Nutting, Raymond, Linn, Heather
Password Log Book and Internet Addresses I Can't Remember
by
Read Me Press, Pick Me
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience
by
Donalds, Charlette, Barclay, Corlane, Osei-Bryson, Kweku-Muata
Cyber Security primer for managers
by
Osunkoya, Ph. D. Ola
Secret Colors
by
Kleppmann, Martin