Computer Security in 2023
The Security & Privacy Acceptance Framework (Spaf)
by
Das, Sauvik, Faklaris, Cori, Hong, Jason I.
Criptología Digital (Digital Cryptology)
by
Thomas, Rachael L.
Disconnect: Why We Get Pushed to Extremes Online and How to Stop It
by
Guiao, Jordan
Datenschutz: Einführung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie
by
Petrlic, Ronald, Sorge, Christoph, Ziebarth, Wolfgang
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity
by
Montasari, Reza
Mobile Health Applications: Rechtliche Rahmenbedingungen Von Gesundheits-Apps
by
Reitebuch, Lukas
Algorithmic Bias: Verzerrungen Durch Algorithmen Verstehen Und Verhindern: Ein Leitfaden Für Entscheider Und Data Scientists
by
Bär, Tobias
Geprüfte Schutz- Und Sicherheitskraft (Ihk): Lehrbuch Für Prüfung Und PRAXIS
by
Schwarz, Robert
Sachkunde Im Bewachungsgewerbe (Ihk): Lehrbuch Für Prüfung Und PRAXIS
by
Schwarz, Robert
Cybersecurity - Data Protection and Strategies: First Edition
by
Palmer, Wesley
Cybersecurity - Data Protection and Strategies: First Edition
by
Palmer, Wesley
Space Rogue: How the Hackers Known as L0pht Changed the World
by
Thomas, Cris
Space Rogue: How the Hackers Known as L0pht Changed the World
by
Thomas, Cris
Securing Delay-Tolerant Networks with Bpsec
by
Birrane, Edward J., Heiner, Sarah, McKeever, Ken
Searchable Encryption: From Concepts to Systems
by
Ren, Kui, Wang, Cong
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment
by
Miller, Richie
Cybersecurity Design Principles: Building Secure Resilient Architecture
by
Miller, Richie
CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance
by
Miller, Richie
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance
by
Miller, Richie
Cissp: Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans
by
Miller, Richie
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies
by
Natwick, Dwayne
Archives and Records: Privacy, Personality Rights, and Access
by
Čtvrtník, Mikulás
Archives and Records: Privacy, Personality Rights, and Access
by
Čtvrtník, Mikulás
Preference-Based Spatial Co-Location Pattern Mining
by
Zhou, Lihua, Wang, Lizhen, Fang, Yuan
Connecting the Internet of Things: Iot Connectivity Standards and Solutions
by
Chun, Anthony, Kumar, Anil, Hussain, Jafer
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
by
Foltz, Kevin E., Simpson, William R., Institute for Defense Analyses
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends
by
Sharafaldin, Iman, Kaur, Gurdip, Habibi Lashkari, Arash
Securing Kubernetes Secrets
by
Block, Andrew, Bueno, Alex
Asymmetric Cryptography: Primitives and Protocols
by
Pointcheval, David
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
by
Ali, Ikram, Chen, Yong, Faisal, Mohammad
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
by
Cambric, Shinesa, Ratemo, Michael
Cybersecurity Jobs: Resume Marketing
by
Brown, Bruce
Cybersecurity Jobs & Career Paths
by
Brown, Bruce
Analysis of the BEM Code of Professional Guidelines
by
Hezam, Bandar
Cybersecurity Essentials Made Easy: A No-Nonsense Guide to Cyber Security For Beginners
by
Paula, Daniel
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus
by
Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks
by
Meng, Yan, Zhu, Haojin, Shen
Digitale Kompetenz: Grundlagen Der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing Und Deren Anwendungen Für Die Digita
by
Lang, Volker
The Compliance Formula
by
Cybersecurity Experts, Leading
Information Technology Law in Australia
by
Cho, George
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
by
Hardt, Robert, Pandit, Parth
Cryptoeconomics: Igniting a New Era of Blockchain
by
Gong, Jian, Xu, Wei
Learn AAVE DeFi Protocol: 100+ Coding Q&A
by
Cakal, Yasin Hasan
Combinatorics and Number Theory of Counting Sequences
by
Mezo, Istvan
Acquiring Card Payments
by
Dubinsky, Ilya
Introduction to Coding Theory
by
Bierbrauer, Jurgen
Secrets of a Cyber Security Architect
by
Schoenfield, Brook S. E.
Secure, Resilient, and Agile Software Development
by
Merkow, Mark
Cryptography: Theory and Practice
by
Paterson, Maura, Stinson, Douglas Robert
Cryptology: Classical and Modern
by
Klima, Richard, Klima, Richard E., Sigmon, Neil
An Introduction to Number Theory with Cryptography
by
Kraft, James, Washington, Lawrence
Cbap(r) Certification and Babok(r) Study Guide
by
Jonasson, Hans
Windows 11 Datenschutzfibel: Alle Datenschutzeinstellungen finden und optimal einstellen
by
Gieseke, Wolfram
Compliance Made Easy
by
Cybersecurity Experts, Leading
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls That Derail Us
by
Metcalf, Leigh, Dykstra, Josiah, Spafford, Eugene
Así Es Como Me Dicen Que Acabará El Mundo
by
Perlroth, Nicole
Quantum Computers: A Complete Guide to Explain in Easy Way(Mathematical Principle and Transition to the Classical Discrete)
by
Price, Carlos
Application Security Program Handbook
by
Fisher, Derek
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts
by
Lab, Nan00t's
Machine Learning for Cyber Agents: Attack and Defence
by
Abaimov, Stanislav, Martellini, Maurizio
Der Persoenlichkeitsschutz im Internet im europaeischen, deutschen und rumaenischen Recht - Bestandsaufnahme, Kritik und Zukunftsperspektiven in recht
by
Sammel, Denisa-Lavinia
Social Engineering and Digital Defense Survival Guide for the Everyday Person: Tools & Tactics to Protect Your Privacy and Identity from Cybercriminal
by
Danielson, Henry, Baker, James J.
Netzwerk- Und Datensicherheit: Eine Praktische Einführung
by
Kappes, Martin
Cyber Security: How to Protect Your Business
by
Himilsbach, Sven
Handbuch Unternehmenssicherheit: Umfassendes Sicherheits-, Kontinuitäts- Und Risikomanagement Mit System
by
Müller, Klaus-Rainer
Triangle Mesh Watermarking and Steganography
by
Zhou, Hang, Chen, Kejiang, Ma, Zehua
Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers)
by
Lee, Michael
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
by
Nearchou, Nearchos
Basics on Public Key Infrastructure (PKI)
by
Scholtens, A.
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies
by
Parker, Carey
Access Control Models and Architectures for Iot and Cyber Physical Systems
by
Bhatt, Smriti, Alshehri, Asma Hassan, Gupta, Maanak
Iapp Cipm Certified Information Privacy Manager Study Guide
by
Chapple, Mike, Shelley, Joe
Security as Code: Devsecops Patterns with AWS
by
Das, Bk Sarthak, Chu, Virginia
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
by
Schneier, Bruce
Threats: What Every Engineer Should Learn from Star Wars
by
Shostack, Adam
Cybersecurity All-In-One for Dummies
by
Winkler, Ira, Beaver, Kevin, Steinberg, Joseph
The 10 Most Famous Hacks in History (Hardcover Edition)
by
Kathy, Black Hat
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks
by
Jenkinson, Andrew
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks
by
Jenkinson, Andrew
Linux Essentials for Hackers & Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands
by
Advocate Team, Linux
Software Security: Concepts & Practices
by
Kumar, Rajeev, Ahmad Khan, Raees, Ahmad Khan, Suhel
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
by
Windley, Phillip
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
by
Shoemaker, Daniel, Sigler, Ken, Shoemaker, Tamara
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
by
Shoemaker, Daniel, Sigler, Ken, Shoemaker, Tamara
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Li, Zhenhua, Dai, Yafei, Chen, Guihai
Blockchain for Everyone: A Guide for Absolute Newbies
by
Herrmann, Noah
Metaverse Investing: The Ultimate Guide
by
Herrmann, Noah
Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization
by
Sehgal, Kunal, Thymianis, Nikolaos
Crypto Investing Guide: The Ultimate Safe and Secure Guide
by
Herrmann, Noah
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
by
Strout, Benjamin
A Proactive Network Surveillance Framework
by
Singh, Maninder
IT-Sicherheit
by
Eckert, Claudia
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by
Perlroth, Nicole
Sicheres Homeoffice: Herausforderungen nachhaltiger Sicherheit
by
Penner, Marco, Karunakumar, Saghana, Keuntje, Jörg-Michael
Rust for Network Programming and Automation: Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust
by
Anderson, Brian
Information Retrieval and Natural Language Processing: A Graph Theory Approach
by
Ghotkar, Archana S., Sonawane, Sheetal S., Mahalle, Parikshit N.
Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program
by
Brown, Jason
Secure Multimodal Biometric Authentication System Involving Ear, Fingerprint and Voice Recognition in Cloud Computing
by
Parimala, R.
Parent Handbook for Online Safety: Practical Ideas, Activities, & Information for Your Family
by
Miller, Dana L. C.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
by
Schneier, Bruce
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide 9th Edition: 9th Edition
by
Stewart, James Michael, Gibson, Darril, Chapple, Mike
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
by
Tevault, Donald a.
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
by
Tevault, Donald a.
Personal Security Data in an Increasingly Digital World
by
Mardon, Austin, Aldada, Suhaib, Cara, Julia
Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level
by
Huijbregts, Paul, Anich, Joe, Graves, Justen
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence
by
Yang, Xinghao, Liu, Bo, Sreevallabh Chivukula, Aneesh
Cybersecurity for Main Street: Cyber Fit in 21 Days
by
Westerheim, Ann
Blockchain for Real World Applications
by
Garg, Rishabh
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
by
Torres, Nestor N., Almoailu, Ahmed, Soper, Ryan
Behavior-based Authentication to Protect System Services From Malicious Attacks
by
Muthumanickam, K.
Behavioral Game Theory Analysis of Cybersecurity With Deception and Ids
by
Aggarwal, Palvi
Security and Privacy in Federated Learning
by
Yu, Shui, Cui, Lei
Hardening Windows 11
by
Nomer Cissp, Russell D.
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter
by
Taylor, Ian
Mastering C++ Network Automation: Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking
by
Barbara, Justin
The Phantom CISO: Time to step out of the shadow
by
Khan, Mishaal, Zahid, Hisham
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness
by
Lapointe, Lise
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness
by
Lapointe, Lise
Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons
by
McKernan, Megan, Wilson, Bradley, Goughnour, Thomas
PKI Implementation and Infrastructures
by
Ashbourn, Julian
PKI Implementation and Infrastructures
by
Ashbourn, Julian
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
by
Payton, Theresa, Claypoole, Ted
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
by
Sandbu, Marius
The Book on Testing: For a World that Runs on Software
by
Rodov, Alex
Privacy and Data Protection in Law Israel
by
Rachum-Twaig, Omri, Birnhack, Michael
Privacy and Data Protection Law in Brazil
by
Pinheiro, Patricia Peck
Never Be Scammed Again: Knowing the Psychology of Scams, Becoming Cybersmart, Discovering Simple Strategies to outsmart today's Con Artists, a
by
Udeh, Prosper
Information Technology Law in India
by
Fatima, Talat
Threats: What Every Engineer Should Learn from Star Wars
by
Shostack, Adam
Threats: What Every Engineer Should Learn from Star Wars
by
Shostack, Adam