Computer Security in 2024
Cyberveiligheid in de Gezondheidszorg: Bescherming van Kritieke Gegevens en Patiënten
by
Guardelli, Enrico
DIY CMMC for Small Business
by
McInteer, Richard
Face De-Identification: Safeguarding Identities in the Digital Era
by
Song, Li, Wen, Yunqian, Liu, Bo
Cybersecurity: from Management Perspective
by
Dr Manmohan Chaturvedi
Deepfakes: The Future of Digital Deception
by
Johnson, Hunter C.
Crypto Anarchy: Libertarians in the Digital Age
by
Garcia, Luis
Blockchain: Demistificare la Tecnologia Blockchain: Una Guida Completa ai Sistemi Decentralizzati
by
Verdi, Giulia
AI Data Privacy and Protection: The Complete Guide to Ethical AI, Data Privacy, and Security
by
Lazo, Mario, Ryan, Justin
The Friedman Lectures on Cryptology
by
Friedman, William F.
Shadows of Digital Traffic
by
Sodaghar, Joshua
Physical Layer Security in Power Line Communications: Fundamentals, Models and Applications
by
Omri, Aymen, Di Pietro, Roberto, Hernandez Fernandez, Javier
CC Certified in Cybersecurity Cert Guide
by
Jamali, Amena, Galloway, Mari
ISO 27001 Controls: A guide to implementing and auditing, Second edition
by
Kenyon, Bridget
Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zab
by
Liefting, Nathan, Baekel, Brian Van
Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications
by
Kävrestad, Joakim, Clarke, Nathan, Birath, Marcus
Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java Se 21 Lts and Jakarta Ee 11
by
Mihailescu, Marius Iulian, Nita, Stefania Loredana
Adn Emprendedor: Guía Práctica Para Lograr El Éxito Empresarial / Entrepreneuri Al Dna: A Practical Guide to Achieving Success in Business
by
Villalba Segarra, Fran
Cybersecurity for Space: A Guide to Foundations and Challenges
by
Oakley, Jacob G.
A Journey Into Security Certification: From the Cloud to Artificial Intelligence
by
Damiani, Ernesto, Anisetti, Marco, Ardagna, Claudio Agostino
Performance Analysis of Cooperative Networking with Multi Channels
by
Pokkunuri, Pardhasaradhi, Devulapalli, Praveen Kumar, Babu Maganti, Sushanth
The Personal Internet Address & Password Logbook
by
Locke, Sergei
Privacy in the Age of Innovation: AI Solutions for Information Security
by
Palle, Ranadeep Reddy, Kathala, Krishna Chaitanya Rao
Crypto Millionaires: Blockchain: A Chance for All?
by
Mach, Mateusz
Crypto Millionaires: Blockchain: A Chance for All?
by
Mach, Mateusz
Developing a Security Training Program
by
McDonald, Joseph
Developing a Security Training Program
by
McDonald, Joseph
Cissp for Dummies
by
Miller, Lawrence C., Gregory, Peter H.
Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers
by
Merli, Dominik
The Expert in the Next Office: Tools for Managing Operations and Security in the Era of Cyberspace
by
Kabay, M. E.
Blockchain: The New Internet? How You Can Benefit from Blockchain Technology Beyond Bitcoin, Cryptocurrency, and Ethereum
by
Rawson, Phillip
Encrypted Network Traffic Analysis
by
Ikram, Sumaiya Thaseen, Cherukuri, Aswani Kumar, Li, Gang
Cyber Safe: Protecting Your Digital Life in an Interconnected World
by
Blackwood, Nolan
Cyber Warfare: A Reference Handbook
by
Springer, Paul J.
Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with
by
Sotiropoulos, John
Snort 3 QuickStart Pro: Detect malicious network activity, scan packets, generate alerts, and debug traffic for active intrusion prevention sy
by
Quolmar, Darvin
Defensive Security Handbook: Best Practices for Securing Infrastructure
by
Berlin, Amanda
Church Privacy Team: Building a Trust-Centered Church by Protecting Members' Privacy and Complying with Privacy Laws and Regulations
by
Buckler, Grace
The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
by
Mukherjee, Akash
AWS Certified Security - Specialty Certification Guide (SCS-C01): AWS security concepts and best practices (English Edition)
by
Agarwal, Nikhil
Proxmox VE 8 Praxisbuch: Informationen, Tipps und Tricks für Proxmox-Einsteiger und Fortgeschrittene
by
Kleinert, Ralf-Peter
Microsoft Intune Administration: Learning Intune concepts and migrating endpoint devices from SCCM (English Edition)
by
Bangia, Manish
The Politics of Cyber-Security
by
Dunn Cavelty, Myriam
The Politics of Cyber-Security
by
Dunn Cavelty, Myriam
Hacker Mindset: Redes de Computadores
by
Santos, Rafael Da Silva
Cybersecurity for Normal People: A Practical Guide to Staying Safe Online
by
Montago, Charles
Business Email Compromise: Understanding, Preventing, and Responding to BEC Attacks
by
Hernandez, Felix
Simplificando la Ciberseguridad
by
Lorenzo, Tommy
FBI Digital Exhaust Opt Out Guide
by
Bureau of Investigation, Federal
Global Audit Leadership: A Practical Approach to Leading a Global Internal Audit (GIA) Function in a Constantly Changing Internal and External
by
Bell, Audley L.
Global Audit Leadership: A Practical Approach to Leading a Global Internal Audit (GIA) Function in a Constantly Changing Internal and External
by
Bell, Audley L.
AWS Certified Security - Specialty Exam Guide
by
Singh, Sk
Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964
by
Hanyok, Robert J.
Mastering Zero-knowledge Proofs: Practical study of security, scalability, and privacy in blockchain and modern systems (English Edition)
by
Dua, Amit, Kumar, Gaurav
Universal Threats in Expert Applications and Solutions: Proceedings of 3rd Uni-Teas 2024, Volume 1
by
Cybersecurity Education
by
Berry, Roland
Attack-And-Defense Games for Control Systems: Analysis and Synthesis
by
Yuan, Yuan, Dong, Huapeng, Yuan, Huanhuan
Policy as Code: Improving Cloud Native Security
by
Ray, Jimmy
A Study of Statistical Zero-Knowledge Proofs
by
Vadhan, Salil P.
Cybersecurity Sustainability
by
Berry, Roland
Cryptography and Embedded Systems Security
by
Breier, Jakub, Hou, Xiaolu
Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture
by
Crawley, Brett
Cryptography Algorithms - Second Edition: Get to grips with new algorithms in blockchain, zero-knowledge, homomorphic encryption, and quantum
by
Bertaccini, Massimo
Cybersecurity Secrets
by
Kathy, Black Hat
Inside the Sony Hack: The Story Behind America's Most Notorious Brink-of-War Cover-up
by
Heckenlively, Kent
The Hack Is Back: Techniques to Beat Hackers at Their Own Games
by
Varsalone, Jesse, Haller, Christopher
The Hack Is Back: Techniques to Beat Hackers at Their Own Games
by
Varsalone, Jesse, Haller, Christopher
IoT Fundamentals with a Practical Approach
by
Goyal, Sonali, Batra, Neera
IoT Fundamentals with a Practical Approach
by
Batra, Neera, Goyal, Sonali
Practical Cyber Intelligence: A Hands-On Guide to Digital Forensics
by
Jakobsen, Adam Tilmar
Nine Steps to Success: An ISO 27001:2022 Implementation Overview
by
Calder, Alan
Effective AI Security: Mastering the Art of Safeguarding Artificial Intelligence Systems in a Threat-Driven World
by
Stoianov, Nick
Construction Audit: Building a Solid Foundation
by
Cicchella, Denise
Construction Audit: Building a Solid Foundation
by
Cicchella, Denise
Parenting in the Digital Age: Raising Kids in a Tech-Driven World
by
Ravenscroft, T. J.
Incident Response for Windows: Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
by
Ostrovskaya, Svetlana, Tykushin, Anatoly
The Unforeseen Threat of AI on Security
by
Joseph, Emmanuel
Advanced Machine Learning, AI, and Cybersecurity in Web3: Theoretical Knowledge and Practical Application
by
Bouarara, Hadj Ahmed
Advanced Machine Learning, AI, and Cybersecurity in Web3: Theoretical Knowledge and Practical Application
by
Bouarara, Hadj Ahmed
The Gen Z Rebel Cookbook: Cyber Warfare and Guerrilla Methods in Full Detail for the Upcoming Rebellion
by
Madison, Woke
Global Politics Shitshow: The Dark Policy Implications and Unbelievable Decisions Shaping Our World Today
by
Adler, Eric
Evolving Roles of Chief Information Security Officers and Chief Risk Officers
by
Redmond (Mba), Michael C.
Creation of Postfix Mail Server Based on Virtual Users and Domains
by
Alassouli, Hidaia Mahmood
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology
by
Patterson, Wayne, Winston-Proctor, Cynthia E.
Secret History: The Story of Cryptology
by
Bauer, Craig
Practical Mathematical Cryptography
by
Gjøsteen, Kristian
Methodology to Improve Control Plane Security in SDN Environments
by
Taye, Bayisa, Desalegn, Wendwossen, Shaikh, Javed
Cybersecurity: Ethics, Legal, Risks, and Policies
by
Priyadarshini, Ishaani, Cotton, Chase
Cybersecurity Playbook for Executives
by
Trabelsi, Anis
Cybersecurity Playbook for Executives
by
Trabelsi, Anis
DevSecOps for Azure: End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud
by
Okeyode, David, Kirui, Joylynn
Cybersecurity in Lifestyle & Hobbies: The Unbelievable Truths and Hidden Realities That Are Protecting Our Personal Lives in the Digital Age
by
Kathy, Black Hat
Counter Terrorism Issues: Case Studies in the Courtroom
by
Castagnera, James Ottavio
Counter Terrorism Issues: Case Studies in the Courtroom
by
Castagnera, James Ottavio
Zero Trust Sicherheit: Ein Leitfaden Für Unternehmen
by
Chapman, Jerry W., Garbis, Jason
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
by
Baloch, Rafay
Shores of Okinawa
by
Greenwood, Patrick
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
by
Baloch, Rafay
Cybersecurity Simplified: A Guide for Beginners, Students, and Job Seekers
by
Singh, Inderjit, Aroraa, Gaurav
Safer @ Home with pfSense(R)
by
Lines, Michael
Design for Real Life
by
Wachter-Boettcher, Sara, Meyer, Eric A.
Security and Privacy in Web 3.0
by
Shen, Meng, Tang, Xiangyun, Wang, Wei
Cissp Cert Guide
by
Abernathy, Robin, Hayes, Darren
Understanding Cybersecurity Management in Healthcare: Challenges, Strategies and Trends
by
Parizadeh, Mona, Sharma, DILLI Prasad, Habibi Lashkari, Arash
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles
by
Horst, Carsten, Buckwell, Mark, Daele, Stefaan Van
Information Security - Risk Management Framework: For Social Engineering Attacks and Digital Prevention Techniques
by
Abdullah-Al-Musa Ahmed, Shekh
Geopolitical Cyber Threat Intelligence
by
Dimyanoglu, Robin