Computer Security in 2022
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
by
Finney, George
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide
by
Chapple, Mike, Seidl, David
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
by
Finney, George
Digital Children: A Guide for Adults
by
Gray, Sandra Leaton, Phippen, Andy
Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams
by
Robinson, Nikki
Mind the Tech Gap: Addressing the Conflicts Between It and Security Teams
by
Robinson, Nikki
Achieving Amazing (Client) Relationships
by
Gifford, Frank
White-Collar Crime Online: Deviance, Organizational Behaviour and Risk
by
Hamerton, Christopher, Gottschalk, Petter
Security Testing with Raspberry Pi, Second Edition
by
Dieterle, Daniel W.
Secure Multi-Party Computation Against Passive Adversaries
by
Patra, Arpita, Choudhury, Ashish
Iot-Enabled Unobtrusive Surveillance Systems for Smart Campus Safety
by
Anagnostopoulos, Theodoros
Cyber-Security Threats and Response Models in Nuclear Power Plants
by
Smidts, Carol, Ray, Indrajit, Zhu, Quanyan
The Official (Isc)2 Ccsp Cbk Reference
by
Kraus, Aaron
System of Controls: I.T.'s Guide to Managing Cyber Risk
by
Reed, William D.
Security in Vehicular Networks: Focus on Location and Identity Privacy
by
Benarous, Leila, Batim, Salim, Mellouk, Abdelhamid
Cism Certified Information Security Manager All-In-One Exam Guide, Second Edition
by
Gregory, Peter H.
Casp+ Comptia Advanced Security Practitioner Certification Kit: Exam Cas-004
by
Parker, Jeff T., Tanner, Nadean H.
Privacy and Data Protection Law in New Zealand
by
Roth, Paul, Stewart, Blair
European Privacy and Data Protection Law
by
Gryffroy, Pieter, Roex, Ruben, Dumortier, Jos
Information Technology Law in Jamaica
by
Foga, Nicole
Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
by
Microsoft Defender for Cloud
by
Janetscheck, Tom, Diogenes, Yuri
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation
by
Lanza, Claudia
Ihr Untergang als Informationssicherheitsbeauftragter (ISB)
by
Naumann, Jacqueline
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes
by
Buchanan, Marlon
Auditing It Infrastructures for Compliance
by
Weiss, Marty, Johnson, Robert, Solomon, Michael G.
How to Hack Like a Legend: Breaking Windows
by
Flow, Sparc
(Isc)2 Ccsp Certified Cloud Security Professional Official Practice Tests
by
Seidl, David, Chapple, Mike
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
by
Golden, Daniel, Dudley, Renee
Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
by
Khanna, Deepanshu, Orzach, Yoram
Ransomware and Cyber Extortion: Response and Prevention
by
Davidoff, Sherri, Durrin, Matt, Sprenger, Karen
Cyber Security: Issues and Current Trends
by
Tanwar, Sudeep, Dutta, Nitul, Jadav, Nilesh
(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
by
Chapple, Mike, Seidl, David
Secret Admirer: Behind the Curtains of a Parasocial Relationship
by
Lee, Celina, Singh, Anjali, Jafar, Samantha
Online Predators, an Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena
by
Lee, Jeffrey A.
The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance
by
Aghili, Shaun
The Auditor's Guide to Blockchain Technology: Architecture, Use Cases, Security and Assurance
by
Aghili, Shaun
The Art of Selling Cybersecurity
by
Raza, Mahdi, Mahdi, David
Metaverso y NFT: El descubrimiento de la Web 3.0, la inversión en tokens no fungibles, la realidad virtual, el criptojuego y el criptoarte
by
Newman, Donn
Building a Cyber Resilient Business: A cyber handbook for executives and boards
by
Chelly, Magda, Tan, Shamane, Tran, Hai
Guide to Data Privacy: Models, Technologies, Solutions
by
Torra, Vicenç
Cybersecurity in Intelligent Networking Systems
by
Xu, Shengjie, Qian, Yi, Hu, Rose Qingyang
IT-Sicherheit
by
Hellmann, Roland
MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam Az-500
by
Brathwaite, Shimon
Smart Cities: Cyber Situational Awareness to Support Decision Making
by
Neshenko, Nataliia, Bou-Harb, Elias, Furht, Borko
Crypto Currency Trading Tracker: Cryptocurrency Coin Tracker for Your Portofolio Investory Stock Trading Log Book
by
Apfel, Sasha
AI and Machine Learning for Network and Security Management
by
Wu, Yulei, Ge, Jingguo, Li, Tong
Security Strategies in Linux Platforms and Applications
by
Jang, Michael, Messier, Ric
Web3: The End of Business as Usual; The impact of Web 3.0, Blockchain, Bitcoin, NFTs, Crypto, DeFi, Smart Contracts and the
by
Cooke, G. C.
Diving into Secure Access Service Edge: A technical leadership guide to achieving success with SASE at market speed
by
Ginn, Jeremiah
A European Perspective on Crisis Informatics: Citizens' and Authorities' Attitudes Towards Social Media for Public Safety and Security
by
Reuter, Christian
Security Strategies in Linux Platforms and Applications + Cloud Labs
by
Jang, Michael, Messier, Ric
The Small Business Owner's Guide to Protecting Your Business From Hackers
by
Skinner, Mike, Haxton, Patrick, de Prado, Carl
Iso/Iec 27001:2022: An Introduction to Information Security and the Isms Standard
by
Watkins, Steven
The Wires of War: Technology and the Global Struggle for Power
by
Helberg, Jacob
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
by
Brathwaite, Shimon
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
by
Brathwaite, Shimon
Linux Fundamentals
by
Blum, Richard
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
by
Khairallah, Mustafa
Metaverse Investing & Marketing Book: Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse
by
Pauley, Doran
Red Hat Enterprise Linux 9 Administration - Second Edition: A comprehensive Linux system administration guide for RHCSA certification exam candidates
by
Requena, Pedro Ibáñez, Gómez, Pablo Iranzo, Colino, Miguel Pérez
CompTIA Network+ N10-008 Certification Guide - Second Edition: The ultimate guide to passing the N10-008 exam
by
Singh, Glen D.
Solving Identity Management in Modern Applications: Demystifying Oauth 2, Openid Connect, and Saml 2
by
Wilson, Yvonne, Hingnikar, Abhishek
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
by
Iyer, Sreekanth
Pro Encryption in SQL Server 2022: Provide the Highest Level of Protection for Your Data
by
McGiffen, Matthew
Cybersecurity in Morocco
by
Maleh, Yassine, Maleh, Youness
Stream Ciphers in Modern Real-Time It Systems: Analysis, Design and Comparative Studies
by
Poluyanenko, Nikolay Alexandrovich, Kuznetsov, Alexandr Alexandrovich, Potii, Oleksandr Volodymyrovych
Privacy and Data Protection Law in Mexico
by
Velasco, Cristos, Maqueo, María Solange
Privacy and Data Protection Law in the Philippines
by
Dee, Celine Melanie a., Aguirre, Leandro Angelo Y.
Our Data, Ourselves: A Personal Guide to Digital Privacy, First Edition
by
Lipton, Jacqueline D.
Our Data, Ourselves: A Personal Guide to Digital Privacy, First Edition
by
Lipton, Jacqueline D.
Resistance to the Current: The Dialectics of Hacking
by
Maxigas, Soderberg, Johan
Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications
by
Schwenk, Jörg
Crypto Currency Trading Tracker: Crypto Book for Everyone nvestory Stock Trading for Your Portofolio
by
Lowes, Josephine
Winning the National Security AI Competition: A Practical Guide for Government and Industry Leaders
by
Strickland, Frank, Whitlock, Chris
Managing the Insider Threat: No Dark Corners
by
Catrantzos, Nick
Managing the Insider Threat: No Dark Corners and the Rising Tide Menace
by
Catrantzos, Nick
Federated Learning: Fundamentals and Advances
by
Xu, Jinjin, Zhu, Hangyu, Jin, Yaochu
Cryptography and Network Security
by
Sampaio de Alencar, Marcelo
What Every Engineer Should Know about Cyber Security and Digital Forensics
by
Defranco, Joanna F., Maley, Bob
What Every Engineer Should Know about Cyber Security and Digital Forensics
by
Defranco, Joanna F., Maley, Bob
Moderne Verfahren Der Kryptographie: Von Rsa Zu Zero-Knowledge Und Darüber Hinaus
by
Beutelspacher, Albrecht, Schwenk, Jörg, Wolfenstetter, Klaus-Dieter
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
by
Ramani, Sanjeev Kaushik, Sniatala, Pawel, Iyengar, S. S.
Blockchains: Decentralized and Verifiable Data Systems
by
Dinh, Tien Tuan Anh, Loghin, Dumitrel, Ruan, Pingcheng
Scam!: How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large Print Edition)
by
Oje, Hope
Azure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts
by
Miller, Richie
Sachkunde Im Bewachungsgewerbe (Ihk) - Übungsbuch: 250 Fragen Mit Antworten Und 10 Übungsfälle Mit Lösungen
by
Schwarz, Robert
Computer Networking: Beginners Guide to Network Security & Network Troubleshooting Fundamentals
by
Miller, Richie
Computer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals
by
Miller, Richie
Losing the Cybersecurity War: And What We Can Do to Stop It
by
King, Steve
Losing the Cybersecurity War: And What We Can Do to Stop It
by
King, Steve
Das Buch Satoshis: Die gesammelten Schriften des Bitcoin-Schöpfers
by
Champagne, Phil
Proofs, Arguments, and Zero-Knowledge
by
Thaler, Justin
Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Securit
by
Fiky, Ahmed Hashem El
Data Governance for Dummies
by
Reichental, Jonathan
Das Standard-Datenschutzmodell (Sdm): Einführung, Hintergründe Und Kontexte Zum Erreichen Der Gewährleistungsziele
by
Rost, Martin
Oxidize eBPF: eBPF programming with Rust
by
Patil, Vishal
Internet and Web Application Security
by
Price, Ron, Harwood, Mike
Cyber Security: The complete guide to cyber threats and protection
by
Sutton, David
Rmf Isso: NIST 800-53 Controls
by
Brown, Bruce
A Practical Introduction to Security and Risk Management
by
Newsome, Bruce Oliver
Data Governance Success: Growing and Sustaining Data Governance
by
Mahanti, Rupa
The Role of Information in U.S. Concepts for Strategic Competition
by
Vasseur, Michael, Paul, Christopher, Schwille, Michael
Certified Information Security Manager Exam Prep Guide - Second Edition: Gain the confidence to pass the CISM exam using test-oriented study material
by
Doshi, Hemang
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
by
Gunawardana, Kushantha
Cybersecurity and Privacy Law Handbook: A beginner's guide to dealing with privacy and security while keeping hackers at bay
by
Rocchi, Walter
Digital Forensics and Incident Response - Third Edition: Incident response tools and techniques for effective cyber threat response
by
Johansen, Gerard
Pocket Guide to Keeping your Kids Safe Online: A Practical and Concise Handbook for Parents
by
Vaiser, Nathalie
Cyberattaque: plongez au coeur du blackout !: Nouvelle édition augmentée
by
Vagabulle, Angeline, Renard
Information Technology Law in South Africa
by
Merwe, Daniel Van Der
Privacy and Data Protection Law in United Kingdom
by
Savirimuthu, Joseph, Tzanou, Maria
Information Technology Law in Slovenia
by
Lutman, Karmen, Zavrsnik, Ales, Sarf, Pika
Information Technology Law in Hong Kong
by
Zhao, Yun
Burners and Black Markets
by
Henderson, Lance
Security Assurance by Efficient Password Based Authentication
by
Chandok, Amanpreet Kaur
E-Voting Through Biometric Security System
by
Kumar, Sanjay
Improving the Security and Privacy of Edge Devices Through Blockchain
by
Leopoldina, Maria
Amazon FBA 2022: Step By Step Beginner Guide On How to Sell On Amazon for Cash, Finding Products and Building a Passive Income
by
Spike, Josh
The Invisibility Toolkit
by
Henderson, Lance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
by
Adamson, James, Williams, Branden
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
by
Adamson, James, Williams, Branden
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
by
Federico, Giuseppe Di, Barcaroli, Fabrizio
Practical Gitops: Infrastructure Management Using Terraform, Aws, and Github Actions
by
Salecha, Rohit
Small Business Cybersecurity Planning: An Owner's Step-by-Step Guide to Reducing Your Online Risk
by
Ruder, Robert
Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security
by
Stiennon, Richard, Forslund, Fredrik, Ernst, Russ B.
The Little Handbook of DFIR: Just some thoughts about Digital Forensics and Incident Response!
by
Fortuna, Andrea
Emotions Online: Feelings and Affordances of Digital Media
by
Petersen, Alan
Emotions Online: Feelings and Affordances of Digital Media
by
Petersen, Alan
Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes
by
Mueller, John Paul
Java 9.0 to 17.0 Cookbook: A Roadmap with Instructions for the Effective Implementation of Features, Codes, and Programs (English Edition)
by
Jog, Mandar, Jog, Tejaswini
Intelligent Mobile Malware Detection
by
Thomas, Tony, John, Teenu, Surendran, Roopak
Artificial Intelligence-Based Cybersecurity for Connected and Automated Vehicles
by
Choi, You-Jun, Guijarro, Jordi, Mhiri, Saber