Computer Security in 2024
Python Programming for Cybersecurity: A Comprehensive Handbook for Beginners
by
Bytebazzar Publications
"Securing the Cloud: Strategies for Protecting Your Digital Horizon" Navigating the Future Safely: Proven Strategies for Securing Your Digi
by
Pansuriya, Harsh, Pansuriya P., Harsh Hasmukbhai
Mastering SQL Injection: A Comprehensive Guide to Exploiting and Defending Databases
by
Martin, Evelyn
CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 3: The Incident Commander
by
Clark, Colby A.
Comptia Security+ Guide to Network Security Fundamentals
by
Ciampa, Mark
IT Risk Management: Introduction to the main concepts and processes of IT Risk Management
by
Zuccari, Fabrizio
The Cybersecurity Spiral of Failure (and How to Break Out of It): Why large firms still struggle with cybersecurity and how to engineer real change dy
by
Gaillard, Jean-Christophe
Malware Reverse Engineering: Cracking The Code
by
Botwright, Rob
SSRF Exposed: Understanding and Preventing Attacks
by
Meyer, Christoph
Darknet: Expert Guide to Online Anonymity and Digital Secrecy
by
Knight, Ryan
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity
by
Montasari, Reza
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research
by
Mannheimer, Sara
Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security
by
Botwright, Rob
Das Ddr-Chiffriergerät T-310: Kryptographie Und Geschichte
by
Killmann, Wolfgang, Stephan, Winfried
Cybersecurity for Modern Smart Grid Against Emerging Threats
by
Roomi, Muhammad M., Mashima, Daisuke, Chen, Yao
OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng
by
Botwright, Rob
Ccsp for Dummies: Book + 2 Practice Tests + 100 Flashcards Online
by
Deane, Arthur J.
Defense In Depth: Network Security And Cyber Resilience
by
Botwright, Rob
Searchable Encryption: From Concepts to Systems
by
Wang, Cong, Ren, Kui
Ultimate Splunk for Cybersecurity
by
Sinha, Jit
Mastering Active Directory Attacks: Exploitation and Defense
by
Álvarez, Gabriel
Social Media Monetization Handbook: Leveraging Your Online Presence to Turn Likes and Followers into Income
by
Robson, Carl
Kali Linux CLI Boss: Novice To Command Line Maestro
by
Botwright, Rob
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Azure Security
by
Magusic, Bojan
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Bapst, Brandon, Hicks, Terry Allan, Allen, Brian
Artificial Intelligence Ethics and International Law -: Practical Approaches to AI Governance
by
Abhivardhan
Ethisches Hacken: Ein umfassendes Einsteigerbuch Leitfaden zum Erlernen der effektiven Strategien des ethischen Hackings
by
Lewis, Elijah
Mastering Web Application Penetration Testing: Techniques and Strategies
by
Delgado, Tomás
Continuous Biometric Authentication Systems: An Overview
by
Smith-Creasey, Max
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends
by
Kaur, Gurdip, Habibi Lashkari, Arash, Sharafaldin, Iman
Wireless Hacking Demystified: The Ultimate Penetration Testing Handbook
by
Fernándezea, Nicolás
Comptia Security+ Certification Kit: Exam Sy0-701
by
Seidl, David, Chapple, Mike
Privacy-Preserving Computing: For Big Data Analytics and AI
by
Chen, Kai, Yang, Qiang
Comptia Security+ Practice Tests: Exam Sy0-701
by
Seidl, David
Online Traffic & Advertisements: Take Off Online
by
Mawking, Philippa
Mastering the Art of Social Engineering Penetration Testing
by
Reyes, Juan
Uncovering the Universe of Fundamental Classified Associations (Vpns): Investigating the Modernized Space Safely and Subtly
by
James, Qasi
Fortify and Shield: Security and Protection in Operating Systems: "Fortify and Shield: Elevating Security Standards for Robust Protection
by
Pansuriya, Harsh, Pansuriya P., Harsh Hasmukbhai
Cryptocoding Based on Quasigroups
by
Popovska-Mitrovikj, Aleksandra, Bakeva, Verica, Mechkaroska, Daniela
Mastering IoT Penetration Testing: A Comprehensive Guide
by
Sánchezes, Felipez
Mastering Mobile App Penetration Testing: A Comprehensive Guide
by
Vásquez, Lorenzo
PCI DSS Bootcamp The A-Z Information Security Guide
by
Publications, Book Wave
Crypto Champions: How DePINs are Building a Greener, Fairer World with Blockchain
by
Thompson, Lindsay M.
OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith
by
Botwright, Rob
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
by
Sharma, Manish
Neon Reckoning: Shadows of Truth
by
Grigorovich, Liza, Bonari, Roman
Pentesting 101: Cracking Gadgets And Hacking Software
by
Botwright, Rob
Mastering Red Team Penetration Testing: Techniques and Tactics
by
Contreras, Iyad
Information Security Planning: A Practical Approach
by
Lincke, Susan
Identifying and Mitigating the Security Risks of Generative AI
by
Boyd, Brad, Bursztein, Elie, Barrett, Clark
The Black Box Hacker's Toolkit: Techniques for Successful Pen Testing
by
Reyes, Mikha'il
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses
by
Montasari, Reza
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus
by
Flores-Flores, Juan Pablo, Martínez-Guerra, Rafael, Montesinos-García, Juan Javier
Security in Smart Home Networks
by
Shen, Meng, Yan, Zhu, Haojin
Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment
by
Larson, Olivia
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
by
Taylor, Andrew
Oracle Linux Cookbook: Embrace Oracle Linux and master Linux Server management
by
Thomsen, Erik B., Spindel, Jonathan, Benner, Erik
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark
by
Botwright, Rob
Guide to Computer Network Security
by
Kizza, Joseph Migga
The Nmap Handbook: A Deep Dive into Network Mapping and Scanning
by
Benowitz, Zachary
Comprehensive Cybersecurity Handbook for Novice Readers: Introduction to Cybersecurity
by
Vatchinsky, Krasimir
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment
by
Arenson, Avyaan
Cyber Wise: An Insight into the World of Cyber Security
by
Allure, R.
Click and Connect: The Power of Digital Relationship Building
by
Sreekumar, V. T.
Secure Horizons An Introduction to Cybersecurity: Safeguarding the Digital Realm: A Comprehensive Guide to Cybersecurity
by
Pansuriya P., Harsh Hasmukbhai, Pansuriya, Pansuriya
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing
by
Aronowitz, Zusman
Infinite Possibilities: A Guide to Manifesting Your Dreams
by
Sreekumar, V. T.
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
by
Chaput, Bob
Weaponizing Cyberspace: Inside Russia's Hostile Activities
by
Sambaluk, Nicholas Michael
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment
by
Hershkowitz, Yaakov
Unveiling the Core: A Comprehensive Guide to Operating System Design and Implementation: Unveiling the Core: A Comprehensive Journey into
by
Pansuriya P., Harsh Hasmukbhai
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
by
Duplys, Paul, Schmitz, Roland
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
by
Sturm, Christian, Cohen, David
Cybersecurity tales: Cyber risk, what it is and how to manage it
by
Fausti, Marcello
Conquiste sua vaga em segurança da informação
by
Sobiecki, Fabio
Mastering Cybersecurity Ethics: Mastering Cybersecurity and Ethical Hacking: Defense and Offense in the Digital World
by
Conrad, Julian
Azure Penetration Testing: Advanced Strategies For Cloud Security
by
Botwright, Rob
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
by
Nomani, Qamar
Touchless Fingerprint Biometrics
by
Labati, Ruggero Donida, Piuri, Vincenzo, Scotti, Fabio
Multilevel Modeling of Secure Systems in Qop-ML
by
Księżopolski, Bogdan
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutions
by
Adams, Rom, Gkatziouras, Emmanouil, XI, Chen
Ultimate Cyberwarfare for Evasive Cyber Tactics
by
Tan, Chang
Car Hacking Playbook: Revving Up Cyber Defense
by
Dworsky, Hannah
Triangle Mesh Watermarking and Steganography
by
Chen, Kejiang, Ma, Zehua, Zhou, Hang
Cybersecurity Fundamentals Explained
by
MacKay, Brian
Red Team Blue Team: A White Hacking Reference
by
Kathy, Black Hat
Cybersecurity for Everyone
by
Franklin, Edward
Zero Trust Security Demystified: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient N
by
Knowings, L. D.
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection
by
Knowings, L. D.
Kali Linux, Ethical Hacking And Pen Testing For Beginners
by
Bharat Nishad
NFT Masterclass: Exploring the Digital Future in Art, Investments, and Creativity.
by
Digitalis, Lex
Social Sector - Check What Awaits You
by
Gorsky, Patrick
CompTIA Cloud+ (Plus) Certification Practice Questions, Answers and Master the Exam
by
Mills, Jake T.
X86 Software Reverse-Engineering, Cracking, and Counter-Measures
by
Domas, Stephanie, Domas, Christopher
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era
by
Cohan, Ofek
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns
by
Damrosch, Tuvya
Cybersecurity for Everyone (Hardcover Edition)
by
Franklin, Edward
Under Pressure: Empowering Cyber Security Incident Responders
by
Phair, Nigel
Crypto Fundamentals: Unlocking the world of cryptocurrencies: essential concepts and strategies
by
Stone, Aiden
Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces
by
Domoney, Colin
NIST Cloud Security: Cyber Threats, Policies, And Best Practices
by
Botwright, Rob
AI Powered Data Privacy & Data Protection For Small Businesses
by
Arefin, Sabira
AI and the Battlefield: Friend or Foe?
by
Woldemariam, Abebe-Bard Ai
Privacy Computing: Theory and Technology
by
Li, Fenghua, Li, Hui, Niu, Ben
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Li, Zhenhua, Dai, Yafei, Chen, Guihai
Crypto Wealth Navigation: Cryptocurrency investment fundamentals: building wealth in the digital age
by
Wells, Alexander
Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange
by
Alrich, Tom
Dawn of Distrust: Technological Threads Weaving a Trustless Society
by
Maxwell J Aromano
Being Less "Hackable": for Seniors and "Non-Techies"
by
Johnson, Brenda Lynn
Survival in a Silicon Dawn: Navigating a Hostile A.I. World Takeover
by
Intelligence, Artificial
Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation
by
Botwright, Rob
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
The Language of Deception: Weaponizing Next Generation AI
by
Hutchens, Justin
The Language of Deception: Weaponizing Next Generation AI
by
Hutchens, Justin
Advanced Techniques of Artificial Intelligence in It Security Systems
by
Korytkowski, Marcin
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions
by
Stankovic, Milena, Stankovic, Radomir S., Moraga, Claudio
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware
by
Tobias, Marc Weber
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
by
Grimes, Roger A.
The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age
by
Wilder, Zane
Blockchain Beyond Bitcoin: A deep dive into the emerging technologies and innovations that are powered by blockchain such as smart contracts dece
by
Franklin, Edward
Boost Your Business with Instagram: Expert Techniques to Increase Leads, Sales and Revenue with an Optimized Instagram Presence
by
Robson, Carl
Trustworthy AI: From Theory to Practice
by
Catak, Ferhat Ozgur, Kuzlu, Murat