Computer Security in 2022
Ransomware and Cybercrime
by
Jenkinson, Andrew
Secure Multi-Party E-Commerce Protocols
by
Bîrjoveanu, Mirela, Bîrjoveanu, Cătălin V.
Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets
by
Scott, Brett
Cyber Defenders' Career Guide
by
Miller, Alyssa
Information System Audit: How to Control the Digital Disruption
by
Peret, Philippe
Metaverse Mastery: Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies
by
Belford, Cameron
Navigate Testprep for Fundamentals of Information Systems Security with Cloud Labs
by
Solomon, Michael G., Kim, David
Fundamentals of Information Systems Security with Navigate Testprep
by
Kim, David, Solomon, Michael G.
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
by
Meredith, Dale
Android Malware Detection Using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence
by
Karbab, Elmouatez Billah, Debbabi, Mourad, Derhab, Abdelouahid
The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software
by
Wardle, Patrick
Hacking APIs: Breaking Web Application Programming Interfaces
by
Ball, Corey J.
Agile Audit Transformation and Beyond
by
Deroche, Toby
Theoretical Cybersecurity: Principles and Advanced Concepts
by
York, Wayne, Oakley, Jacob G., Butler, Michael
Security Compliance in Model-Driven Development of Software Systems in Presence of Long-Term Evolution and Variants
by
Peldszus, Sven Matthias
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography: Efficient Modular Exponential Techniques
by
Vollala, Satyanarayana, Ramasubramanian, N., Tiwari, Utkarsh
Active Directory Administration Cookbook - Second Edition: Proven solutions to everyday identity and authentication challenges for both on-premises an
by
Berkouwer, Sander
Security Awareness Design in the New Normal Age
by
Goucher, Wendy F.
Digital Forensics in the Era of Artificial Intelligence
by
Moustafa, Nour
Digital Forensics in the Era of Artificial Intelligence
by
Moustafa, Nour
7 Rules To Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals
by
Joshi, Chirag D.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison
by
Spina, Francesca, Sturgeon, William P.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison
by
Sturgeon, William P., Spina, Francesca
Data Analytics for Cybersecurity
by
Janeja, Vandana P.
Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
by
Kranjac, Sasha
Cybercomplexity: A Macroscopic View of Cybersecurity Risk
by
Young, Carl S.
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources
by
Hills, Christopher, Haber, Morey J., Chappell, Brian
Safety and Security of Cyber-Physical Systems: Engineering Dependable Software Using Principle-Based Development
by
Furrer, Frank J.
Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling
by
Holderer, Julius
The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
by
Roer, Kai, Carpenter, Perry
The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
by
Carpenter, Perry, Roer, Kai
Cyber and the City: Securing London's Banks in the Computer Age
by
Sweetman, Ashley
Personalized Privacy Protection in Big Data
by
Cui, Lei, Qu, Youyang, Nosouhi, Mohammad Reza
Surveillance and Surveillance Detection: A CIA Insider's Guide
by
Kiriakou, John
Assured Autonomy Survey
by
Rouff, Christopher, Watkins, Lanier
Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career
by
Underhill, Ken, Foulon, Christophe, Hopkins, Tia
Cybersecurity Essentials: The Beginner's Guide
by
Johnson, Charles H., Jr.
Data Encryption Standard (DES) and Issues of DES and its Replacement
by
Ismail, Haitham
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
by
Oettinger, William
Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach
by
Guilley, Sylvain, Ouladj, Maamar
Security Architecture � How & Why
by
Madsen, Tom
Managing Response to Significant Cyber Incidents: Comparing Event Life Cycles and Incident Response Across Cyber and Non-Cyber Events
by
Hodgson, Quentin E., Clark-Ginsberg, Aaron, Haldeman, Zachary
Russian Disinformation Efforts on Social Media
by
Cheravitch, Joe, Cohen, Raphael S., Treyger, Elina
Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries
by
Fowler, Bradley, Maranga, Kennedy
Cybersecurity for Everyone
by
Skillicorn, David B.
Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms
by
Bajgoric, Nijaz, Turulja, Lejla, Ibrahimovic, Semir
The Etherik Spaceship
by
Doge, Scoobi
Practical Core Software Security: A Reference Framework
by
Merkow, Mark S., Ransome, James F., Misra, Anmol
Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications
by
Cawrey, Daniel, Lantz, Lorne
Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications
by
Cawrey, Daniel, Lantz, Lorne
Practical Core Software Security: A Reference Framework
by
Merkow, Mark S., Ransome, James F., Misra, Anmol
Luck Follows the Brave: From Refugee Camps, Abuse, and Suicide Loss to Living the Dream
by
Šibić, Aida
Luck Follows the Brave: From Refugee Camps, Abuse, and Suicide Loss to Living the Dream
by
Šibić, Aida
If It's Smart, It's Vulnerable
by
Hyppönen, Mikko
Comptia Linux+ Certification Kit: Exam Xk0-005
by
Bresnahan, Christine, Suehring, Steve, Blum, Richard
How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO
by
Das, Ravi
How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO
by
Das, Ravi
Understanding Cybersecurity Management in Fintech: Challenges, Strategies, and Trends
by
Habibi Lashkari, Arash, Kaur, Gurdip, Habibi Lashkari, Ziba
The Personal Finance Guide for Tech Professionals: Building, Protecting, and Transferring Your Wealth
by
Taulli, Tom
The Ciso's Next Frontier: Ai, Post-Quantum Cryptography and Advanced Security Paradigms
by
Badhwar, Raj
Executive's Guide to Cyber Risk: Securing the Future Today
by
Moyo, Siegfried
Deadly Odds 5.0
by
Wyler, Allen
Your Short Guide to Security Systems
by
Everything Security Systems
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing
by
Vishwanath, Arun
Practical Mathematical Cryptography
by
Gjøsteen, Kristian
Espionage & Encryption Super Pack: How to Be Invisible Online
by
Henderson, Lance
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
by
Dunkerley, Mark, Tumbarello, Matt
Cyber Law in Bulgaria
by
Zahariev, Martin, Dimitrov, George
Ethical Hacking: Learn About Effective Strategies of Ethical Hacking (A Complete Beginners Guide to Successful Ethical Hacking Career)
by
Ellis, John
Get in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies
by
Stringfield, Jonathan
Get in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies
by
Stringfield, Jonathan
Darknet
by
Henderson, Lance
Cryptocurrency for Beginners: How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins
by
Pascall, Zeph
Advanced Blockchain Technology: Frameworks and Enterprise-Level Practices
by
Liang, Xiubo, Cai, Liang, Li, Qilei
Cyber Security, Artificial Intelligence, Data Protection & the Law
by
Walters, Robert, Novak, Marko
Tor Darknet Bundle: Master the Art of Invisibility
by
Henderson, Lance
Microsoft Azure Sentinel: Planning and Implementing Microsoft's Cloud-Native Siem Solution
by
Turpijn, Tiander, Diogenes, Yuri, Dicola, Nicholas
Smart Card Security: Applications, Attacks, and Countermeasures
by
Quamara, Megha, Gupta, Brij B.
Information Centric Networks (Icn): Architecture & Current Trends
by
Sarma, Hiren Kumar Deva, Jadeja, Rajendrasinh, Dutta, Nitul
The Cybersecurity Body of Knowledge: The Acm/Ieee/Ais/Ifip Recommendations for a Complete Curriculum in Cybersecurity
by
Shoemaker, Daniel, Kohnke, Anne, Sigler, Ken
Check Point Firewall Administration R81.10+: A practical guide to Check Point firewall deployment and administration
by
Yakovlev, Vladimir
A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals
by
Tewari, Aakanksha, Gupta, Brij B.
Vulnerability Management
by
Foreman, Park
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures
by
Chaudhary, Pooja, Gupta, Brij B.
Cybercrime Investigations: A Comprehensive Resource for Everyone
by
Merzon, Antonia, Bandler, John
Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Test
by
Mishra, Ashish
Smart Log Data Analytics: Techniques for Advanced Security Analysis
by
Skopik, Florian, Wurzenberger, Markus, Landauer, Max
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
by
Wolff, Josephine
Windows and Linux Penetration Testing from Scratch - Second Edition: Harness the power of pen testing with Kali Linux for unbeatable hard-hitting resu
by
Bramwell, Phil
Cybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide
by
Clark, Kevin
Zero Trust Journey Across the Digital Estate
by
Kudrati, Abbas, Pillai, Binil A.
Zero Trust Journey Across the Digital Estate
by
Pillai, Binil A., Kudrati, Abbas
Cyber Security Awareness: Employee Handbook
by
Mullins, Michael
Metaverse: A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Be
by
Fraley, Harper
Iot Supply Chain Security Risk Analysis and Mitigation: Modeling, Computations, and Software Tools
by
Kieras, Timothy, Farooq, Junaid, Zhu, Quanyan
Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, Nfts, and Smart Contracts
by
Poston, Howard E.
Hacking with Kali Linux: Learn Hacking with this Detailed Guide, How to Make Your Own Key Logger and How to Plan Your Attacks (2022 Crash Cours
by
Wilcher, Ollie
Nft for Beginners: Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies)
by
Badman, Shaun
The Complete Ethical Hacking Book: A Comprehensive Beginner's Guide to Learn and Master in Ethical Hacking
by
Thirumalesh
Data Governance and Data Management: Contextualizing Data Governance Drivers, Technologies, and Tools
by
Mahanti, Rupa
Cyberpredators and Their Prey
by
Shapiro, Lauren R.
Quantum Key Distribution Networks: A Quality of Service Perspective
by
Rass, Stefan, Mehic, Miralem, Fazio, Peppino
Cyberpredators and Their Prey
by
Shapiro, Lauren R.
Ultra-Dense Heterogeneous Networks
by
Wang, Qubeijian, Sun, Wen, Zhao, Nan
Citizen Privacy Framework: Case of a Fuzzy-Based Recommender System for Political Participation
by
Kaskina, Aigul
Windows Server 2022 Administration Fundamentals - Third Edition: A beginner's guide to managing and administering Windows Server environments
by
Dauti, Bekim
Enterprise-Grade It Security for Small and Medium Businesses: Building Security Systems, in Plain English
by
Cherry, Denny
Aws Security
by
Shields, Dylan
Secret Key Cryptography
by
Rubin, Frank
Practical Cloud Native Security with Falco: Risk and Threat Detection for Containers, Kubernetes, and Cloud
by
Grasso, Leonardo, Degioanni, Loris
Information Technology Law in Japan
by
Yanaga, Masao
Information Technology Law in the United States of America
by
Cunningham, McKay, Murphy, Timothy
Network Security: Private Communication in a Public World
by
Kaufman, Charlie, Perlman, Radia, Speciner, Mike
If It's Smart, It's Vulnerable
by
Hypponen, Mikko
If It's Smart, It's Vulnerable
by
Hypponen, Mikko
Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors
by
Gomzin, Slava
Perfect Secrecy in Iot: A Hybrid Combinatorial-Boolean Approach
by
Zolfaghari, Behrouz, Bibak, Khodakhast
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2022, Volume 3
by
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
by
Thabet, Amr, Kleymenov, Alexey
Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating
by
Diogenes, Yuri, Ozkaya, Erdal
Partially Homomorphic Encryption
by
Ödemiş Özger, Zeynep, Koç, Çetin Kaya, Özdemir, Funda