Computer Security in 2022
No Domain: The John McAfee Tapes
by
Eglinton, Mark
Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication
by
Kaschner, Holger
Preference-Based Spatial Co-Location Pattern Mining
by
Wang, Lizhen, Fang, Yuan, Zhou, Lihua
Data Security: Technical and Organizational Protection Measures Against Data Loss and Computer Crime
by
Lenhard, Thomas H.
Event- And Data-Centric Enterprise Risk-Adjusted Return Management: A Banking Practitioner's Handbook
by
Subramanian R., Kannan, Kumar Kattumannil, Sudheesh
Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
by
Ozkaya, Erdal
والدین حقیقی ، فرزندان مج
by
Monshizadeh, Mohammad
Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
by
Ristic, Ivan
Library Patrons' Privacy: Questions and Answers
by
Valenti, Sandra J., Beckstrom, Matthew A., Lund, Brady D.
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
by
Chen, Yong, Faisal, Mohammad, Ali, Ikram
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Cloud
by
Gilioli, Mirko, Ipsale, Maurizio
The Crypto Kid
by
Shembekar, Jackson
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
by
Payne, Bryson
Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity
by
Garber, Leeza, Olson, Scott
Expressing Information Flow Properties
by
Chong, Stephen, Myers, Andrew C., Kozyri, Elisavet
Privacy Is Power: Why and How You Should Take Back Control of Your Data
by
Veliz, Carissa
The Development of Blockchain Technology: Research on the Development of Electronic Information Engineering Technology in China
by
Center for Electronics and Information Studies Chinese Acade
Microsoft Sentinel in Action - Second Edition: Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions
by
Perkins, John, Diver, Richard, Bushey, Gary
Machine Learning for Cyber Agents: Attack and Defence
by
Abaimov, Stanislav, Martellini, Maurizio
Game Theory for Cyber Deception: From Theory to Applications
by
Pawlick, Jeffrey, Zhu, Quanyan
Cryptography and Steganography. A multilayer Data Security Approach
by
Patni, Jagdish Chandra, Sharma, Hitesh Kumar
Cyber Arms: Security in Cyberspace
by
Abaimov, Stanislav, Martellini, Maurizio
Advanced Security Testing with Kali Linux
by
Dieterle, Daniel W.
Understanding Network Hacks: Attack and Defense with Python 3
by
Ballmann, Bastian
Quantum Communication Networks
by
Deppe, Christian, Bassoli, Riccardo, Boche, Holger
Access Control Models and Architectures for Iot and Cyber Physical Systems
by
Gupta, Maanak, Bhatt, Smriti, Alshehri, Asma Hassan
The CISO Guide to Zero Trust Security
by
Badhwar, Raj
ACE - CISSP - Essential Approach To The Exam
by
Hazra, Sabyasachi
DNSSEC Mastery, 2nd Edition
by
Lucas, Michael W.
DNSSEC Mastery, 2nd Edition
by
Lucas, Michael W.
The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market
by
Jin, Yuxi, Miller, Klaus M., Skiera, Bernd
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography
by
Mittelbach, Arno, Fischlin, Marc
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass th
by
Darr, Shabaz, Hedberg, Viktor
Mastering Veeam Backup & Replication - Second Edition: Secure backup with Veeam 11 for defending your data and accelerating your data protection strat
by
Childerhose, Chris
Practical Security for Agile and DevOps
by
Merkow, Mark S.
Practical Security for Agile and DevOps
by
Merkow, Mark S.
Data Privacy: A Runbook for Engineers
by
Bhajaria, Nishant
Wing-Level Mission Assurance for a Cyber-Contested Environment
by
Brosmer, Jonathan Lee, Snyder, Don, Mayer, Lauren A.
Parenting for the Digital Generation: A Guide to Digital Education and the Online Environment
by
Garon, Jon M.
Agile Security Operations: Engineering for agility in cyber defense, detection, and response
by
Hettema, Hinne
Cyber Law in Israel
by
Hallevy, Gabriel
Cloud Computing Security: Foundations and Research Directions
by
Katz, Jonathan, Chakraborti, Anrin, Curtmola, Reza
The Security Hippie
by
Engel, Barak
The Security Hippie
by
Engel, Barak
Information Retrieval and Natural Language Processing: A Graph Theory Approach
by
Mahalle, Parikshit N., Ghotkar, Archana S., Sonawane, Sheetal S.
Arithmetic and Algebraic Circuits
by
Castillo Morales, Encarnación, Parrilla Roure, Luis, Lloris Ruiz, Antonio
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency
by
Paxton, Paul
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency
by
Paxton, Paul
The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
by
Singh, Glen D.
Ransomware Revolution: The Rise of a Prodigious Cyber Threat
by
Ryan, Matthew
Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Health
by
Srivastava, Anurag
Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser
by
Segala, Alessandro
Authorization and Access Control: Foundations, Frameworks, and Applications
by
N. Mahalle, Parikshit, S. Bhong, Shashikant, R. Shinde, Gitanjali
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition: Apply a proactive approach to secure your cyber infrastructure and enhance you
by
Velu, Vijay Kumar
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes
by
Fried, Robert B.
Forensic Data Collections 2.0: The Guide for Defensible & Efficient Processes
by
Fried, Robert B.
Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
by
Bertaccini, Massimo
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering
by
Alaofin, Tunde
Anarchy of Cyberterrorism: What you should know about Cyber Crimes, Cyber Espionage, Cyber Attack, Cyberwarfare & Social Engineering
by
Alaofin, Tunde
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ E Communication
by
Lawson, Sean T., Gehl, Robert W.
The Internet: A Practical Guide for Beginners
by
Fong, Keith
Cloud Security for Dummies
by
Coombs, Ted
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
by
Sims, Stephen, Harper, Allen, Linn, Ryan
Cybersecurity: Ethics, Legal, Risks, and Policies
by
Cotton, Chase, Priyadarshini, Ishaani
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-
by
Natwick, Dwayne
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks
by
Wittkop, Jeremy
Multimedia Security 1: Authentication and Data Hiding
by
Puech, William
Privacy-Preserving Machine Learning
by
Li, Jin, Li, Ping, Liu, Zheli
The Cybersecurity to English Dictionary: 5th Edition
by
Meeuwisse, Raef
The Cybersecurity to English Dictionary: 5th Edition
by
Meeuwisse, Raef
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security Stack for
by
Anich, Joe, Stuart, Trevor
Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory
by
Ostrovskaya, Svetlana, Skulkin, Oleg
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition: Explore the new features of Zabbix 6 for designing, building, and maintaining your Za
by
Liefting, Nathan, Baekel, Brian Van
NFT (Non-Fungible Token) For Beginners: THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow
by
Streamings, Megalodona
Cryptocurrency Trading: A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN
by
Streamings, Megalodona
Implementing Devsecops with Docker and Kubernetes: An Experiential Guide to Operate in the Devops Environment for Securing and Monitoring Container Ap
by
Ortega Candel, Jose Manuel
The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning
by
Smith-Ruiu, Justin
Python for Cybersecurity: Using Python for Cyber Offense and Defense
by
Poston, Howard E.
KAT - A Kid's Guide to Staying Safe Online: A Kid's Guide to Staying Safe Online
by
Trafficking, Kids Against
Linux Command Line and Shell Scripting Techniques: Master practical aspects of the Linux command line and then use it as a part of the shell scripting
by
Dakic, Vedran, Redzepagic, Jasmin
It Security Controls: A Guide to Corporate Standards and Frameworks
by
Viegas, Virgilio, Kuyucu, Oben
Tor Browser: Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet Privacy)
by
Robson, Joseph
Selected Topics in Information Security Research and Teaching
by
Al-Janabi, Sufyan
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
by
Cryptocurrency for Beginners: How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins
by
Pascall, Zeph
Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-Pacific
by
Domingo, Francis C.
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects
by
Summers, Akira
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be
by
Fraley, Harper
Auditing Corporate Surveillance Systems
by
Wagner, Isabel
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects
by
Summers, Akira
Fundamentals of Adopting the Nist Cybersecurity Framework: Part of the Create, Protect, and Deliver Digital Business Value Series
by
Nichols, David, Moskowitz, David
The Social Hacking Dictionary
by
Kathy, Black Hat
Data Ethics and Challenges
by
Tiwari, Kapil, Shukla, Samiksha, George, Jossy P.
Digital Transformation with Dataverse: Become a Citizen Developer and Lead the Digital Transformation Wave with Microsoft Teams and Power Platform
by
Brooke, Aaron
Cybersecurity and Local Government
by
Mateczun, Laura K., Forno, Richard F., Norris, Donald F.
Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002)
by
Linn, Heather, Nutting, Raymond
Password Log Book and Internet Addresses I Can't Remember
by
Read Me Press, Pick Me
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience
by
Osei-Bryson, Kweku-Muata, Donalds, Charlette, Barclay, Corlane
Secret Colors
by
Kleppmann, Martin