Computer Security in 2024
Exploring Altcoins and the Next Crypto Wave: Altcoins: Investing in the future of cryptocurrencies
by
Reyes, Ariana
Digital Dreams Have Become Nightmares: What We Must Do
by
Baecker, Ronald M.
Earning Online: From Side Hustle to Full-Time Income
by
Sreekumar, V. T.
Secure Coding Practices: Fortifying Applications Against Cyber Threats
by
Kathy, Black Hat
Digital Defense Essential: A Beginner's Guide to Cybersecurity and Ethical Hacking Careers
by
Williams, Robert
Security Without Obscurity: A Guide to PKI Operations
by
Stapleton, Jeff, Epstein, W. Clay
Security Without Obscurity: A Guide to PKI Operations
by
Stapleton, Jeff, Epstein, W. Clay
The Digital Revolution: How Technology is Reshaping Our World
by
Sreekumar, V. T.
Txting 2 Talking: Disconnect to Reconnect
by
Hotte, Kathryn
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls
by
Hodson, Christopher J.
PCI DSS Version 4.0: A guide to the payment card industry data security standard
by
Hancock, Stephen
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
by
Hoffman, Andrew
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls
by
Hodson, Christopher J.
Acquiring Publicly Available Information Analytic Tools in a Proprietary Marketplace: Acquisition Recommendations for Army Cyber Command
by
Warren, Kristin, Marcellino, William, Schwille, Michael
Privacy and Data Protection Law in China
by
Shao, Guosong, Peng, Chengxin
Pen Testing from Contract to Report
by
Basta, Alfred, Basta, Nadine, Anwar, Waqar
Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security
by
Boddu, Raghu, Lamppu, Sami, Trent, Rod
Declutter your Mind, Home and Digital Spaces
by
James, Andrew William
Killer Tech and the Drive to Save Humanity
by
Stross, Mark
Killer Tech and the Drive to Save Humanity
by
Stross, Mark
A Journey into Cybersecurity: Mastering cybersecurity: expert insights and best practices
by
Brooks, Cameron
Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition)
by
Kumar Chawdhury, Tarun, Gupta, Vipul, Banerjee, Joyanta
Infrastructure Attack Strategies for Ethical Hacking
by
Singh, Harpreet, Sharma, Himanshu
The Invisible Hand Economic Intelligence And Industrial Espionage
by
Truman, Davis
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence
by
Sreevallabh Chivukula, Aneesh, Yang, Xinghao, Liu, Bo
Why CISOs Fail
by
Engel, Barak
Why CISOs Fail
by
Engel, Barak
Navigating Cybersecurity and Ethical Hacking: The art of ethical hacking: exploring cybersecurity from within
by
Grayson, Lily
Implementando el Marco de Ciberseguridad NIST 2.0: Una Guía Completa para Profesionales de TI en PyMES
by
Fernandez Climent, Edgardo
Advanced Penetration Testing: Hacking Satellite Communication
by
Knowell, Richard
Security and Privacy in Federated Learning
by
Yu, Shui, Cui, Lei
Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware
by
Crossley, Cassie
The Werewolf at Dusk: And Other Stories
by
Small, David
A Non-Techie Beginners' Guide to Cybersecurity and Privacy: How Anyone Can Secure Their Digital Life, Protect Data, and Prevent Cyber Attacks in 5 Eas
by
Publishers, Teched
Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars
by
Tangredi, Sam J., Galdorisi, George
Mastering Microsoft Intune - Second Edition: Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite
by
Brinkhoff, Christiaan, Larsen, Per
Introduction to Cybersecurity in the Internet of Things
by
Yu, Jing, Zhu, Liehuang, Gai, Keke
Optimal Spending on Cybersecurity Measures: DevOps
by
Kissoon, Tara
Optimal Spending on Cybersecurity Measures: DevOps
by
Kissoon, Tara
Auto Detailing Startup: The Art of Car Detailing Business - Strategies, Tools, and Tips for Building Your Profitable Auto Care Venture
by
Robson, Carl
The New SOC Analyst's Guidebook: Surviving Your First SOC
by
Somers, J. R.
Cyber Resilience Fundamentals
by
Kieseberg, Peter, Tjoa, Simon, Gafic, Melisa
Security-Driven Software Development: Learn to analyze and mitigate risks in your software projects
by
Olmsted, Aspen
Satoshi's Legacy: A Journey Through Bitcoin's White Paper: From Genesis to the Future of Digital Gold
by
Morgan, Jonathan T.
Decoding Cryptocurrency: Navigating the crypto space: an introduction to virtual money and blockchain technology
by
Blake, Finnley
Europrivacy(TM)/(R): The first European Data Protection Seal
by
Turley, Alice
Decentralized Privacy Preservation in Smart Cities
by
Shen, Huang, Cheng
Walking the Tightrope: Security, Rights, and AI in Counter-Terrorism
by
Woldemariam, Abebe-Bard Ai
From Exposed to Secure: The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep Your Company Safe
by
Featuring Cybersecurity and Compliance Experts from Around t
Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking
by
Weyers, Jos, Burrough, Matt, Belgers, Walter
The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects
by
Fischer-Hübner, Simone, Karegar, Farzaneh
Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective
by
Luo, Xiaoyuan, Li, Xiaolei, Wang, Jiange
Criptomonedas para Principiantes Todo lo que Necesitas saber sobre Blockchain, Bitcoin, Minería, Altcoins, Finanzas Descentralizadas, Inversión, NFTs,
by
Gómez, Eduardo Robledo
Tales from the Cyber Crypt
by
Firewall, Stella
Tales from the Cyber Crypt
by
Firewall, Stella
Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications
by
Clarke, Nathan, Birath, Marcus, Kävrestad, Joakim
Database and Application Security: A Practitioner's Guide
by
Danturthi, R. Sarma
Cybersecurity Unveiled: The art of Cyber Defense: a comprehensive guide to protecting your data
by
Chang, Benjamin
Bitcoin con Rigor (Mr. Crypto Edition): Un estudio sobre el funcionamiento técnico de Bitcoin
by
Sanchis, Jose
Privacy-Preserving in Mobile Crowdsensing
by
Li, Youqi, Zhang, Chuan, Wu, Tong
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
by
Bayuk, Jennifer L.
Cryptography: Algorithms, Protocols, and Standards for Computer Security
by
Mammeri, Zoubir Z.
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats
by
Armstrong-Smith, Sarah
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
by
Grimes, Roger A.
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats
by
Armstrong-Smith, Sarah
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
by
Grimes, Roger A.
Lock Picking Handbook: Master the Art of Locksmithing: Learn Beginner to Advanced Skills, DIY Lock Picking, Lock Raking & Decoding, Lock Bypa
by
S. Rowe, Bobby
Grundlagen Der Kryptographie: Einführung in Die Mathematischen Und Algorithmischen Grundlagen
by
Buell, Duncan
Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
by
Kranjac, Sasha, Kudovic, Omar
Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks
by
Jaswal, Nipun
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture
by
Nichols, Lester
The OSINT Handbook: A practical guide to gathering and analyzing online information
by
Meredith, Dale
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills
by
Bodungen, Clint
Internal Paradigm For Affective Responses To Security Information
by
Junior, Charles
Randomized Response Techniques: Certain Thought-Provoking Aspects
by
Chaudhuri, Arijit, Pal, Sanghamitra, Patra, Dipika
Cyber Security
by
Arora, Jagdish Krishanlal
Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition
by
Rolls, Darran, Haber, Morey J.
Memory Dump Analysis Anthology, Volume 15
by
Vostokov, Dmitry, Software Diagnostics Institute
Aprende a Invertir en Criptomonedas 17 Trucos Para Hacer Dinero Online Desde Casa
by
Gómez, Eduardo Robledo
Revelando los secretos de la Seguridad Informática: Protegiendo su mundo digital
by
Rodríguez, Profesor
El Libro Negro de Ethereum ecretos Revelados: Desde la Inversión y Programación hasta el Futuro de la Web 3.0
by
Gómez, Eduardo Robledo
Zero Trust Networks: Building Secure Systems in Untrusted Networks
by
Rais, Razi, Morillo, Christina, Gilman, Evan
Digital Armor: The Confessions of a Reformed Hacker
by
Marques, Jacinto Luis
Digital Armor: The Confessions of a Reformed Hacker
by
Marques, Jacinto Luis
AI and ML Applications for Decision-Making in Zero Trust Cyber Security
by
Goraga, Zemelak
The Basics of Cybersecurity
by
Christly, John
Shielding the Digital Realm: Cybersecurity Basics
by
Harrow, Maxwell
Fibel IT-Sicherheit: Fachbegriffe und Akronyme im Kontext der IT-Sicherheit
by
Sittloh, Richard
Riding the Wave: Applying Project Management Science in the Field of Emergency Management
by
Boyarsky, Andrew
Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies
by
Ismat, Sadia, Thakur, Kutub, Pathan, Al-Sakib Khan
Robust Machine Learning: Distributed Methods for Safe AI
by
Pinot, Rafael, Gupta, Nirupam, Guerraoui, Rachid
Riding the Wave: Applying Project Management Science in the Field of Emergency Management
by
Boyarsky, Andrew
Introduction to One Digital Identity: Strategies, Innovations, and Future Trends
by
Goniwada, Shivakumar R.
AI vs. Identity Theft: Securing the Digital Age
by
Woldemariam, Abebe-Bard Ai
The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology
by
Dooley, John F.
Capital of Spies
by
Dg
Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the Internet of Things
by
Brooks, Tyson T.
Cyber Shield
by
Mungo, Cissp Jamaine, Pate, Cissp Lewis, Grace, Cissp Torrez L. Grace
High Performance Privacy Preserving AI
by
Shenoy, Jayavanth, Grinaway, Patrick, Palakodety, Shriphani
Python For Cybersecurity
by
Elsherif, Hesham Mohamed
Mastering Command & Control: Exploring C2 Frameworks using Kali Linux
by
Dieterle, Daniel W.
The Native-Born
by
Molony, John
Data-Centric Security in Software Defined Networks (Sdn)
by
Amanowicz, Marek, Szwaczyk, Sebastian, Wrona, Konrad
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
by
Gupta, Rajneesh
Guardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques
by
Grey, Harper
Guide to Computer Network Security
by
Kizza, Joseph Migga
Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems
by
Sapaty, Peter Simon
Códigos De Sombra: El espía Maestro De La era Digital
by
Bajwa, Usama, Bajwa
Códigos De Sombra: El espía Maestro De La era Digital
by
Bajwa, Danish Ali, Bajwa
AWS Certified Security - Specialty (SCS-C02) Exam Guide - Second Edition: Get all the guidance you need to pass the AWS (SCS-C02) exam on your first a
by
Scott, Stuart, Book, Adam
Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, Cosade 2024, Gardanne, France, April 9-10, 2024, Proceedings
by
Wacquez, Romain
Implementation and Analysis of Ciphers in Quantum Computing
by
Baksi, Anubhab, Jang, Kyungbae
Computer Forensics: Uncovering the Evidence: A Beginner's Guide to Investigating Digital Crimes
by
Parvin, R.
Explicando, Application Security
by
Pereira, Cássio Batista
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices
by
Möller, Dietmar P. F.
Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance
by
National Academies of Sciences Engineering and Medicine, Division of Behavioral and Social Sciences and Education, Policy and Global Affairs
Implementing IEC 62443: Best Practices for OT Security Professionals
by
Guha, Abhirup
Managed Detection and Response Services: A Cyber Stakeholders Guide
by
Dye, Stephen M.
Comptia Security+ Sy0-701 Cert Guide
by
Heuermann, Lewis
Cyber Operations: A Case Study Approach
by
Couretas, Jerry M.
The Right to Privacy 1914-1948: The Lost Years
by
Richardson, Megan Lloyd
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
by
Schneier, Bruce
Modernes It-Management: Methodische Kombination Von It-Strategie Und It-Reifegradmodell
by
Büchler, Roman P., Mangiapane, Markus
Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO's Guide to Protecting the Digital World
by
Mitcham, Msa Cciso
Designing to Fips-140: A Guide for Engineers and Programmers
by
Fant, Richard, Johnston, David