Computer Security in 2024
CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 3: The Incident Commander
by
Clark, Colby A.
Comptia Security+ Guide to Network Security Fundamentals
by
Ciampa, Mark
IT Risk Management: Introduction to the main concepts and processes of IT Risk Management
by
Zuccari, Fabrizio
Malware Reverse Engineering: Cracking The Code
by
Botwright, Rob
The Cybersecurity Spiral of Failure (and How to Break Out of It): Why large firms still struggle with cybersecurity and how to engineer real change dy
by
Gaillard, Jean-Christophe
Darknet: Expert Guide to Online Anonymity and Digital Secrecy
by
Knight, Ryan
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity
by
Montasari, Reza
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research
by
Mannheimer, Sara
Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security
by
Botwright, Rob
Cybersecurity for Modern Smart Grid Against Emerging Threats
by
Chen, Yao, Roomi, Muhammad M., Mashima, Daisuke
Das Ddr-Chiffriergerät T-310: Kryptographie Und Geschichte
by
Killmann, Wolfgang, Stephan, Winfried
Ccsp for Dummies: Book + 2 Practice Tests + 100 Flashcards Online
by
Deane, Arthur J.
OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng
by
Botwright, Rob
Defense In Depth: Network Security And Cyber Resilience
by
Botwright, Rob
Ultimate Splunk for Cybersecurity
by
Sinha, Jit
Searchable Encryption: From Concepts to Systems
by
Ren, Kui, Wang, Cong
Mastering Active Directory Attacks: Exploitation and Defense
by
Álvarez, Gabriel
Social Media Monetization Handbook: Leveraging Your Online Presence to Turn Likes and Followers into Income
by
Robson, Carl
Kali Linux CLI Boss: Novice To Command Line Maestro
by
Botwright, Rob
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Azure Security
by
Magusic, Bojan
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Bapst, Brandon, Hicks, Terry Allan, Allen, Brian
Artificial Intelligence Ethics and International Law -: Practical Approaches to AI Governance
by
Abhivardhan
Ethisches Hacken: Ein umfassendes Einsteigerbuch Leitfaden zum Erlernen der effektiven Strategien des ethischen Hackings
by
Lewis, Elijah
Wireless Hacking Demystified: The Ultimate Penetration Testing Handbook
by
Fernándezea, Nicolás
Continuous Biometric Authentication Systems: An Overview
by
Smith-Creasey, Max
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends
by
Habibi Lashkari, Arash, Kaur, Gurdip, Sharafaldin, Iman
Comptia Security+ Practice Tests: Exam Sy0-701
by
Seidl, David
Comptia Security+ Certification Kit: Exam Sy0-701
by
Chapple, Mike, Seidl, David
Privacy-Preserving Computing: For Big Data Analytics and AI
by
Yang, Qiang, Chen, Kai
Online Traffic & Advertisements: Take Off Online
by
Mawking, Philippa
Cryptocoding Based on Quasigroups
by
Bakeva, Verica, Mechkaroska, Daniela, Popovska-Mitrovikj, Aleksandra
PCI DSS Bootcamp The A-Z Information Security Guide
by
Publications, Book Wave
Mastering Mobile App Penetration Testing: A Comprehensive Guide
by
Vásquez, Lorenzo
Crypto Champions: How DePINs are Building a Greener, Fairer World with Blockchain
by
Thompson, Lindsay M.
OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith
by
Botwright, Rob
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
by
Sharma, Manish
Neon Reckoning: Shadows of Truth
by
Bonari, Roman, Grigorovich, Liza
Pentesting 101: Cracking Gadgets And Hacking Software
by
Botwright, Rob
Identifying and Mitigating the Security Risks of Generative AI
by
Barrett, Clark, Boyd, Brad, Bursztein, Elie
Mastering Red Team Penetration Testing: Techniques and Tactics
by
Contreras, Iyad
Information Security Planning: A Practical Approach
by
Lincke, Susan
The Black Box Hacker's Toolkit: Techniques for Successful Pen Testing
by
Reyes, Mikha'il
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses
by
Montasari, Reza
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus
by
Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks
by
Meng, Yan, Zhu, Haojin, Shen
Oracle Linux Cookbook: Embrace Oracle Linux and master Linux Server management
by
Benner, Erik, Thomsen, Erik B., Spindel, Jonathan
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
by
Taylor, Andrew
Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment
by
Larson, Olivia
Guide to Computer Network Security
by
Kizza, Joseph Migga
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark
by
Botwright, Rob
The Nmap Handbook: A Deep Dive into Network Mapping and Scanning
by
Benowitz, Zachary
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment
by
Arenson, Avyaan
Rust for Blockchain Developers: A Comprehensive Guide to Build Decentralized Apps with Rust Programming
by
Krum, Jose
Secure Horizons An Introduction to Cybersecurity: Safeguarding the Digital Realm: A Comprehensive Guide to Cybersecurity
by
Pansuriya, Pansuriya, Pansuriya P., Harsh Hasmukbhai
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing
by
Aronowitz, Zusman
Click and Connect: The Power of Digital Relationship Building
by
Sreekumar, V. T.
Cyber Wise: An Insight into the World of Cyber Security
by
Allure, R.
Advanced Golang Networking: Build High-Availability, Fault-Tolerant Networks with GO Programming
by
Krum, Jose
Infinite Possibilities: A Guide to Manifesting Your Dreams
by
Sreekumar, V. T.
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
by
Chaput, Bob
Unveiling the Core: A Comprehensive Guide to Operating System Design and Implementation: Unveiling the Core: A Comprehensive Journey into
by
Pansuriya P., Harsh Hasmukbhai
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment
by
Hershkowitz, Yaakov
Weaponizing Cyberspace: Inside Russia's Hostile Activities
by
Sambaluk, Nicholas Michael
Dora: A guide to the EU digital operational resilience act
by
Pattison, Andrew
Cybersecurity tales: Cyber risk, what it is and how to manage it
by
Fausti, Marcello
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
by
Schmitz, Roland, Duplys, Paul
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
by
Cohen, David, Sturm, Christian
Conquiste sua vaga em segurança da informação
by
Sobiecki, Fabio
Mastering Cybersecurity Ethics: Mastering Cybersecurity and Ethical Hacking: Defense and Offense in the Digital World
by
Conrad, Julian
Touchless Fingerprint Biometrics
by
Piuri, Vincenzo, Scotti, Fabio, Labati, Ruggero Donida
Ultimate Cyberwarfare for Evasive Cyber Tactics
by
Tan, Chang
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
by
Nomani, Qamar
Multilevel Modeling of Secure Systems in Qop-ML
by
Ksiezopolski, Bogdan
Azure Penetration Testing: Advanced Strategies For Cloud Security
by
Botwright, Rob
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutions
by
Adams, Rom, Gkatziouras, Emmanouil, XI, Chen
Car Hacking Playbook: Revving Up Cyber Defense
by
Dworsky, Hannah
Triangle Mesh Watermarking and Steganography
by
Chen, Kejiang, Ma, Zehua, Zhou, Hang
Cybersecurity Fundamentals Explained
by
MacKay, Brian
NFT Masterclass: Exploring the Digital Future in Art, Investments, and Creativity.
by
Digitalis, Lex
Red Team Blue Team: A White Hacking Reference
by
Kathy, Black Hat
Cybersecurity for Everyone
by
Franklin, Edward
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection
by
Knowings, L. D.
Zero Trust Security Demystified: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient N
by
Knowings, L. D.
Kali Linux, Ethical Hacking And Pen Testing For Beginners
by
Bharat Nishad
Social Sector - Check What Awaits You
by
Gorsky, Patrick
CompTIA Cloud+ (Plus) Certification Practice Questions, Answers and Master the Exam
by
Mills, Jake T.
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era
by
Cohan, Ofek
X86 Software Reverse-Engineering, Cracking, and Counter-Measures
by
Domas, Stephanie, Domas, Christopher
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns
by
Damrosch, Tuvya
Under Pressure: Empowering Cyber Security Incident Responders
by
Phair, Nigel
Cybersecurity for Everyone (Hardcover Edition)
by
Franklin, Edward
Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces
by
Domoney, Colin
Crypto Fundamentals: Unlocking the world of cryptocurrencies: essential concepts and strategies
by
Stone, Aiden
NIST Cloud Security: Cyber Threats, Policies, And Best Practices
by
Botwright, Rob
AI Powered Data Privacy & Data Protection For Small Businesses
by
Arefin, Sabira
AI and the Battlefield: Friend or Foe?
by
Woldemariam, Abebe-Bard Ai
Privacy Computing: Theory and Technology
by
Li, Fenghua, Li, Hui, Niu, Ben
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Dai, Yafei, Chen, Guihai, Li, Zhenhua
Crypto Wealth Navigation: Cryptocurrency investment fundamentals: building wealth in the digital age
by
Wells, Alexander
Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange
by
Alrich, Tom
Dawn of Distrust: Technological Threads Weaving a Trustless Society
by
Maxwell J Aromano
Being Less "Hackable": for Seniors and "Non-Techies"
by
Johnson, Brenda Lynn
Survival in a Silicon Dawn: Navigating a Hostile A.I. World Takeover
by
Intelligence, Artificial
Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation
by
Botwright, Rob
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
The Language of Deception: Weaponizing Next Generation AI
by
Hutchens, Justin
The Language of Deception: Weaponizing Next Generation AI
by
Hutchens, Justin
Advanced Techniques of Artificial Intelligence in It Security Systems
by
Korytkowski, Marcin
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions
by
Stankovic, Milena, Stankovic, Radomir S., Moraga, Claudio
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware
by
Tobias, Marc Weber
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
by
Grimes, Roger A.
The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age
by
Wilder, Zane
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals
by
Haqanee, Mansoor, Ramakrishnan, Ganesh
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations that are powered by blockchain such as smart contracts dece
by
Franklin, Edward
Boost Your Business with Instagram: Expert Techniques to Increase Leads, Sales and Revenue with an Optimized Instagram Presence
by
Robson, Carl
Trustworthy AI: From Theory to Practice
by
Catak, Ferhat Ozgur, Kuzlu, Murat
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You
by
Fagan, Peter
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You
by
Fagan, Peter
DDOS Attack: What it is, and how to stop it.: A Cybersecurity guide for 2024
by
Kanegi, Takehiro, Van Der Post, Hayden
Cybersecurity for Beginners: A Сomprehensive Guide on Protecting Against Digital Threats in the Modern World
by
Peterson, Liam
In Zero Trust We Trust
by
Naduvath, Avinash
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
by
Santos, Omar, Salam, Samer, Dahir, Hazim
Digital Dreams Have Become Nightmares: What We Must Do
by
Baecker, Ronald M.