Computer Security in 2024
Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2024: Cybersecurity, Digital ID & Online Fraud Industry Market Research, Statisti
by
Plunkett, Jack W.
Mastering AWS Security - Second Edition: Strengthen your cloud environment using AWS security features coupled with proven strategies
by
Mathieu, Laurent
Machine Learning Techniques for Cybersecurity
by
Bhardwaj, Sonam, Cicala, Fabrizio, Bertino, Elisa
Ai-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability
by
Sarker, Iqbal H.
101 Ferramentas Hacker
by
Doin, Igor
A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program
by
Baker, Debra
Cybercrime and Digital Deviance
by
Graham, Roderick S., Smith, 'Shawn K.
Cybercrime and Digital Deviance
by
Graham, Roderick S., Smith, 'Shawn K.
Unveiling the NIST Risk Management Framework (RMF): A practical guide to implementing RMF and managing risks in your organization
by
Marsland, Thomas
Ultimate Linux Network Security for Enterprises
by
Kant, Adarsh
The Ultimate Kali Linux Book - Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting
by
Singh, Glen D.
Securing Salesforce Digital Experiences
by
Meyers, Matt
Securing Salesforce Digital Experiences
by
Meyers, Matt
Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem
by
Hughes, Chris, Robinson, Nikki
Windows Security Internals: A Deep Dive Into Windows Authentication, Authorization, and Auditing
by
Forshaw, James
Hacking Ético: Introducción a la Ciberseguridad
by
Jenkins, William V.
Talk To Them
by
Chance, Heidi
Security for Cloud Native Applications: The Practical Guide for Securing Modern Applications Using Aws, Azure, and Gcp
by
Estrin, Eyal
Cyber Crisis Management: Das Praxishandbuch Zu Krisenmanagement Und Krisenkommunikation
by
Kaschner, Holger
The Zero Trust Framework and Privileged Access Management (PAM)
by
Das, Ravindra
The Zero Trust Framework and Privileged Access Management (PAM)
by
Das, Ravindra
MyData and Data Sovereignty in the Age of AI
by
Lee, Michael
The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age
by
Kestner, Peter
Mastering CMMC 2.0: A Comprehensive Guide to Implementing Cybersecurity Maturity in Defense Contracting
by
Fernandez Climent, Edgardo
Ccsp: Novice To Certified
by
Botwright, Rob
Protect Your Business: A Small Business Guide to Basic Cybersecurity
by
Goodman, David, Bonney, Bill
It Infrastructure: Security and Resilience Solutions
by
Süß, Yannik, Süß, Ralf
Cybersecurity Measures for Municipal Administrators & Government Agencies
by
Locklear, Aaron
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning
by
Bingley, Richard
Security+ Exam Pass: Security Architecture, Threat Identification, Risk Management, Operations
by
Botwright, Rob
Operation REGAL: The Berlin Tunnel
by
National Security Agency
Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals
by
Botwright, Rob
Cybersecurity For Everyone
by
Marc
The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices
by
Edwards, Jason
The Comprehensive Guide to Cybersecurity Careers: A Professional's Roadmap for the Digital Security Age
by
Edwards, Jason
Spring Security in Action, Second Edition
by
Spilca, Laurentiu
Discovering Hidden Gems in Foreign Languages
by
Miller, M. D.
Smart City Cyber Resilience: Your Perception Matters
by
Doan, Tam Thanh
Design and Deploy Microsoft Defender for Iot: Leveraging Cloud-Based Analytics and Machine Learning Capabilities
by
Udayakumar, Puthiyavan, Anandan, R.
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
by
Güneysu, Tim, Paar, Christof, Pelzl, Jan
Machine Learning Safety
by
Huang, Xiaowei, Jin, Gaojie, Ruan, Wenjie
Implementing Palo Alto Networks Prisma(R) Access: Learn real-world network protection
by
'Reaper', Tom Piens Aka
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense
by
Hartman, Shane
Protect Your Practice: Basic Cybersecurity for Healthcare, Legal and Financial Professionals
by
Bonney, Bill, Goodman, David
DORA & NIS 2 Compliance Toolkit: Building a Secure Digital Future
by
Vemula, Anand
EU AI Act Explained: A Guide to the Regulation of Artificial Intelligence in Europe
by
Vemula, Anand
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
by
Reveron, Derek S., Lindsay, Jon R.
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
by
Lindsay, Jon R., Reveron, Derek S.
Codes and Ciphers of the Civil War
by
Friedman, William F.
Church Privacy Who Cares? You!: Simple Ways Anyone Can Feed the Flocks, Starve Risks, and Ditch Liabilities
by
Buckler, Grace
Church Privacy Who Cares? You!: Simple Ways Anyone Can Feed the Flocks, Starve Risks, and Ditch Liabilities
by
Buckler, Grace
Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches
by
Toledano, Soledad Antelada
Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats
by
Aravilli, Srinivasa Rao
Python for OSINT: Tracking and Profiling Targets
by
Bourny, Jason
Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
by
Aslaner, Milad
Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide: Master the SC-100 Exam with Practical Examples and Case Studies to Secure the Digital Wo
by
Rajesh, K. V. N.
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
by
Blyth, Andrew
Android Malware Detection and Adversarial Methods
by
Zhang, Xiaosong, Yan, Ran, Niu, Weina
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting
by
Zorich, Matthew, Morowczynski, Mark, Trent, Rod
فوزووز الابداعي
by
Fawzi Elgendi, Mohamed
Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools
by
Moallem, Abbas
Cyber Resilience Fundamentals
by
Gafic, Melisa, Kieseberg, Peter, Tjoa, Simon
Managing It Service Security: Methods and Recipes for User Organizations and Providers Along the Supply Chain
by
Von Faber, Eberhard
Cybersecurity-Awareness
by
Pils, Martin
The Cryptoverse for Teenagers
by
Peter-Idah, Michelle
Screening by International Aid Organizations Operating in the Global South: Mitigating Risks of Generosity
by
Paragi, Beata
Jump-Start Your Soc Analyst Career: A Roadmap to Cybersecurity Success
by
Wall, Tyler, Rodrick, Jarrett
Secrets of the Cyber Underworld: Unveiling the Hidden World of Cyber Criminals & Strategies for Addressing Cyber Crime
by
Aremu, Bolakale
Security Team Operating System
by
Hyatt, Christian
Security Team Operating System
by
Hyatt, Christian
Zero Trust Networks: Building Secure Systems in Untrusted Network (2nd Edition)
by
Morillo, Christina, Barth, Doug, Gilman, Evan
Zero Trust Networks: Building Secure Systems in Untrusted Network (2nd Edition)
by
Rais, Razi, Morillo, Christina, Gilman, Evan
Digital Innovation Adoption: Architectural Recommendations and Security Solutions
by
Rana, Muhammad Ehsan
Security Yearbook 2024: A History and Directory of the It Security Industry
by
Stiennon, Richard
CISM Exam Pass: Certified Information Security Manager Study Guide
by
Botwright, Rob
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
by
Paar, Christof, Pelzl, Jan, Güneysu, Tim
The History and Evolution of Invisible Ink
by
Throckmorton, Herkimer
Red Team Blue Team (Hardcover Edition): A White Hacking Reference
by
Kathy, Black Hat
Hacking for the Technically Challenged
by
Kathy, Black Hat
Comptia Linux+ Certification Companion: Hands-On Preparation to Master Linux Administration
by
Sheikh, Ahmed F.
The Number Theory of Cryptocurrencies
by
Aksara, Kuro
The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team
by
Butler, Michael, Oakley, Jacob G.
Osint: The Authoritative Guide to Due Diligence
by
Hetherington, Cynthia
Grokking Web Application Security
by
McDonald, Malcolm
Isc2 Cissp Certified Information Systems Security Professional Official Practice Tests
by
Chapple, Mike, Seidl, David
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide
by
Gibson, Darril, Chapple, Mike, Stewart, James Michael
Certified Ethical Hacker: Reconnaissance, Vulnerability Analysis & Social Engineering
by
Botwright, Rob
The Index of Coincidence
by
National Security Agency
The Code of Honor: Embracing Ethics in Cybersecurity
by
Skoudis, Ed, Maurer, Paul J.
Ultimate PowerShell Automation for System Administration: Streamline Automation and Administration Tasks with Advanced PowerShell Techniques and Exper
by
Gupta, Rajendra, Jayaram, Prashanth
The Character of Consent: The History of Cookies and the Future of Technology Policy
by
Jones, Meg Leta
Learning Devsecops: A Practical Guide to Processes and Tools
by
Suehring, Steve
The Cyber Domain: "Its Importance, in a guided journey through its many facets: Cyber Security, Cyber Intelligence, Cyber Warfare, Cyber
by
Rugolo, Alessandro
Certified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography
by
Botwright, Rob
Space-Air-Ground Integrated Network Security
by
Bai, Lin, Jiang, Chunxiao, Liu, Jianwei
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide: Build your knowledge to pass the CCSP exam with expert guidance
by
Turner, Omar A., Lakshmana, Navya
Hacking Wifi: A Starter's Manual
by
Bones, Julien
Hacked Justice: The Chronicles of AJ, The White Hat Hacker From Philly
by
Farrior, Anthony
Operational Technology Security: An In-Depth Overview
by
Guha, Abhirup
The Digital Polycrisis: A Resource & Framework for the Digital World (Large Print Edition)
by
Clarke-Joell, Cha'von K.
The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment
by
Martinez, Olivia
Hands-On Differential Privacy: Introduction to the Theory and Practice Using Opendp
by
Cowan, Ethan, Pereira, Mayana, Shoemate, Michael
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
by
Chapple, Mike
Trusted Execution Environments
by
Shepherd, Carlton, Markantonakis, Konstantinos
Cyber Incident Response: Counterintelligence And Forensics For Security Investigators
by
Botwright, Rob
Law Enforcement Strategies for Disrupting Cryptomarkets: A Practical Guide to Network Structure, Trust Dynamics, and Agent-Based Modelling Approaches
by
Harinam, Vincent, Ariel, Barak
IT Governance: An international guide to data security and ISO 27001/ISO 27002, Eighth edition
by
Calder, Alan, Watkins, Steve
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
by
Santiago Vázquez, Francisco Javier
Hands-On Blockchain for Python Developers - Second Edition: Empowering Python developers in the world of blockchain and smart contracts
by
Kok, Arjuna Sky
Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
by
Leyte-Vidal, James
Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon
by
High, Robert, Gupta, Sanjeev
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation
by
Staveley, Confidence
The Aspiring CIO and CISO: A career guide to developing leadership skills, knowledge, experience, and behavior
by
Gee, David J.
Spring Security - Fourth Edition: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures
by
Nasslahsen, Badr
Advanced Cybersecurity for Critical Infrastructure
by
Kathy, Black Hat
Implementing Zero-Knowledge Proofs With Practical Applications and Code Examples
by
Johnson, Hunter C.
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
by
Zhussupov, Zhassulan
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
by
Lane, Karl
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
by
Chow, Dennis
Cybersecurity Governance (Large Print Edition)
by
Carlton, Darryl
The CyberSecurity Leadership Handbook for the CISO and the CEO - Updated Edition
by
Gaillard, Jean-Christophe
Proceedings of the Tenth International Conference on Mathematics and Computing: ICMC 2024, Volume 2
by
Proceedings of the Tenth International Conference on Mathematics and Computing: ICMC 2024, Volume 1
by
Church Privacy Team: Building a Trust-Centered Church by Protecting Members' Privacy and Complying with Privacy Laws and Regulations
by
Buckler, Grace
Mastering Cybersecurity: Strategies, Technologies, and Best Practices
by
Edwards, Jason
Securing the Future: Introduction to Zero Trust in Cybersecurity
by
M, Spoorthi, H. L., Gururaj, Ravi, Vinayakumar
The Impact of Blockchain: Technology on Industries and Economies
by
Blake, Seraphina
Misterios de la Web Oscura: Entendiendo la Internet Profunda
by
Barciela, Gilberto
Beginners Guide To Ethical Hacking and Cyber Security
by
Abhinav Ojha
Safe and Secure: A Senior's Guide to Avoiding Scams
by
Roane, Ricky