Computer Security in 2022
Cyber Security primer for managers
by
Osunkoya, Ph. D. Ola
Guide to Differential Privacy Modifications: A Taxonomy of Variants and Extensions
by
Pejó, Balázs, Desfontaines, Damien
Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux
by
Nastase, Ramon
Cyberdefense: Domain Name Systems as the Next Public Utility
by
Mackinder, Craig
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise
by
Minella, Jennifer
Pro Active Directory Certificate Services: Creating and Managing Digital Certificates for Use in Microsoft Networks
by
Hughes, Lawrence E.
The Official (Isc)2 Sscp Cbk Reference
by
Wills, Mike
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
by
Pillay, Rishalin
Cyber Storm
by
Cybersecurity Experts, Leading
Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them
by
Skulkin, Oleg
Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP
by
Estrin, Eyal
Competition and Restraint in Cyberspace: The Role of International Norms in Promoting U.S. Cybersecurity
by
Frederick, Bryan, Ellinger, Emily, Mazarr, Michael J.
The Definitive Guide to Security in Jakarta Ee: Securing Java-Based Enterprise Applications with Jakarta Security, Authorization, Authentication and M
by
Bais, Teo, Tijms, Arjan, Keil, Werner
Blockchain QuickStart Guide: Explore Cryptography, Cryptocurrency, Distributed Ledger, Hyperledger Fabric, Ethereum, Smart Contracts and Dapps
by
Amit Johri, Kalpesh Parikh
Your Data, Their Billions: Unraveling and Simplifying Big Tech
by
Hoffman, Jane S.
High-Speed Networks: A Tutorial
by
Crichigno, Jorge, Bou-Harb, Elias, Kfoury, Elie
The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
by
Carpenter, Perry, Roer, Kai
Security Issues for Wireless Sensor Networks
by
Dumka, Ankur, Verma, Parag, Bhardwaj, Anuj
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic
by
Das, Ravi
CYBERSECURITY and HACKING for Beginners: The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect
by
Huss, Robert M.
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic
by
Das, Ravi
Wireless Hacking With Kali Linux: Begin to Learn Fast How to Hack any Wireless Networks With this Penetration Test and Implementation Guide (2022 Cras
by
Delgado, Eugene
The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime
by
Dimaggio, Jon
Cybersecurity for Dummies
by
Steinberg, Joseph
Hacking for Dummies
by
Beaver, Kevin
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be
by
Fraley, Harper
Mastering Azure Security - Second Edition: Keeping your Microsoft Azure workloads safe
by
Toroman, Mustafa, Janetscheck, Tom
Privacy Preservation in Iot: Machine Learning Approaches: A Comprehensive Survey and Use Cases
by
Qu, Youyang, Gao, Longxiang, Yu, Shui
Cybersecurity: A Practical Engineering Approach
by
Santos, Henrique M. D.
Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
by
Vincent, Torty
Ethically Hacking an Industrial Control System: Analyzing, Exploiting, Mitigating, and Safeguarding Industrial Processes for an Ethical Hacker
by
Ferrone, Sharon
China and Middle East Conflicts: Responding to War and Rivalry from the Cold War to the Present
by
Burton, Guy
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
by
Dahj, Jean Nestor M.
Data Science for Fake News: Surveys and Perspectives
by
P, Deepak, Chakraborty, Tanmoy, Long, Cheng
Cyber Mission Thread Analysis: A Prototype Framework for Assessing Impact to Missions from Cyber Attacks to Weapon Systems
by
Bodine-Baron, Elizabeth, Goldfeld, Dahlia Anne, Snyder, Don
Cissp: Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security Professionals)
by
Watley, Michael
Rmf Isso: Foundations (Guide)
by
Brown, Bruce
Computer Security: A Hands-on Approach
by
Du, Wenliang
Internet Security: A Hands-on Approach
by
Du, Wenliang
Computer & Internet Security: A Hands-on Approach
by
Du, Wenliang
Security Awareness for Dummies
by
Winkler, Ira
Policy Design in the Age of Digital Adoption: Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation
by
Ferreira, Ricardo
Exam Ref Az-500 Microsoft Azure Security Technologies, 2/E
by
Diogenes, Yuri, Thomas, Orin
Cyber-Sicherheit: Das Lehrbuch Für Konzepte, Prinzipien, Mechanismen, Architekturen Und Eigenschaften Von Cyber-Sicherheitssystemen in D
by
Pohlmann, Norbert
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
by
Tiepolo, Gianluca
Introduction to the Cyber Ranges
by
Pandey, Bishwajeet, Ahmad, Shabeer
Hacking Artificial Intelligence: A Leader's Guide from Deepfakes to Breaking Deep Learning
by
Gibian, Davey
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2020, Volume 3
by
Secure Data Science: Integrating Cyber Security and Data Science
by
Khan, Latifur, Kantarcioglu, Murat, Thuraisingham, Bhavani
Handbook for Ctfers
by
Nu1l Team
The Right to Data Protection: Individual and Structural Dimensions of Data Protection in EU Law
by
Bieker, Felix
Recent Trends in Peripheral Security Systems
by
Rawat, Abhishek, Deb, Dipankar, Upadhyay, Jatin
The Metrics Manifesto: Confronting Security with Data
by
Seiersen, Richard
The Complete Guide to Scion: From Design Principles to Formal Verification
by
Basin, David, Chuat, Laurent, Legner, Markus
Cyber Law in Bangladesh
by
Karim, Mohammad Ershadul
Blockchain Systems and Communication Networks: From Concepts to Implementation
by
Rehmani, Mubashir Husain
Fraud Investigation and Forensic Accounting in the Real World
by
Jennings, William L.
Fraud Investigation and Forensic Accounting in the Real World
by
Jennings, William L.
Cism Certified Information Security Manager Study Guide
by
Chapple, Mike
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900: Familiarize yourself with security, identity, and compliance in Microsoft 3
by
Natwick, Dwayne
MS-700 Managing Microsoft Teams Exam Guide - Second Edition: Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification wi
by
Chamberlain, Nate, Rising, Peter
Mobile App Reverse Engineering: Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
by
Mishra, Abhinav
Energy Resilience and Climate Protection: Energy Systems, Critical Infrastructures, and Sustainability Goals
by
Krebs, Heinz-Adalbert, Hagenweiler, Patricia
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (Englis
by
Ozkaya, Erdal
Competition in the Gray Zone: Countering China's Coercion Against U.S. Allies and Partners in the Indo-Pacific
by
McClintock, Bruce, Garafola, Cristina L., Lin, Bonny
Say What!? Communicate with Tact and Impact: What to say to get results at any point in an audit
by
Butera, Ann M.
Basiswissen IT Forensik
by
B, Mark
Cloud Native Security Cookbook: Recipes for a Secure Cloud
by
Armitage, Josh
Reinforcement Learning with Hybrid Quantum Approximation in the Nisq Context
by
Kunczik, Leonhard
Human Factors In Cybersecurity: Understanding Behavioral Biases and Vulnerabilities
by
Ejiofor, Oluomachi Eunice
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
by
Stevenson, James
Phishing Detection Using Content-Based Image Classification
by
Khandelwal, Shekhar, Das, Rik
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future
by
Mauro, Aaron
Conversations About Physics Volume 1
by
Burton, Howard
Privacy-Preserving in Edge Computing
by
Gao, Longxiang, Luan, Tom H., Gu, Bruce
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks
by
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks
by
Cyber Security Consultants Playbook
by
Rauschendorfer, David
Internet of Things Security: Architectures and Security Measures
by
Wu, Chuan-Kun
Hardware Platform Security for Mobile Devices
by
Asokan, N., Gunn, Lachlan J., Ekberg, Jan-Erik
Mastering Palo Alto Networks - Second Edition: Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS
by
'Reaper', Tom Piens Aka
Gdpr: A Game of Snakes and Ladders: How Small Businesses Can Win at the Compliance Game
by
Alford, Samantha
Many Hands in the Cookie Jar: Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Res
by
Shokh, Yuliya, Balk, Jonathan, Hodgson, Quentin E.
Proceedings of International Conference on Network Security and Blockchain Technology: Icnsbt 2021
by
Ransomware and Cybercrime
by
Jenkinson, Andrew
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
by
Wilhoit, Kyle, Opacki, Joseph
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
by
Thompson, Jeremy, Copeland, William, Maurice, Chad
Intelligent Security Management and Control in the Iot
by
Chalouf, Mohamed-Aymen
Practical Industrial Cybersecurity: Ics, Industry 4.0, and Iiot
by
Brooks, Charles J., Craig, Philip A.
Cyber Crime Investigator's Field Guide
by
Middleton, Bruce
Evidence-Based Cybersecurity: Foundations, Research, and Practice
by
Pomerleau, Pierre-Luc, Maimon, David
Ethical Hacker's Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks
by
Rakshit, Samir Kumar
Spatial Grasp as a Model for Space-Based Control and Management Systems
by
Sapaty, Peter Simon
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation
by
Rossier, Samuel, Routin, David, Thoores, Simon
Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunti
by
Martínez, Roberto
OPNsense Beginner to Professional: Protect networks and build next-generation firewalls easily with OPNsense
by
Camargo, Julio Cesar Bueno de
CCNP Security Cisco Secure Firewall and Intrusion Prevention System Official Cert Guide
by
Rajib, Nazmul
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices
by
Ozkaya, Erdal
Datenanonymisierung Im Kontext Von Künstlicher Intelligenz Und Big Data: Grundlagen - Elementare Techniken - Anwendung
by
Krebs, Heinz-Adalbert, Hagenweiler, Patricia
Cybersecurity and Identity Access Management
by
Rawal, Bharat S., Manogaran, Gunasekaran, Peter, Alexender
Relax: A Guide To True Cyber Security
by
Fanger, J. Kenneth