Computer Security in 2024
A Comprehensive Guide to the Nist Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
by
Edwards, Jason
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
by
Cucci, Kyle
Microcontroller Exploits
by
Goodspeed, Travis
Crafting Secure Software: An engineering leader's guide to security by design
by
Bulmash, Greg, Segura, Thomas
Data Governance: A Guide
by
Sargiotis, Dimitrios
A Beginner's Compass to Navigating Cyber Security
by
Tank, Jignesh
Cryptographic and Information Security Approaches for Images and Videos
by
Ramakrishnan, S.
IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing
by
Heuermann, Lewis
Zero Trust Security Handbook
by
David, Mark
Cybersecurity in Italy: Governance, Policies and Ecosystem
by
Martino, Luigi
Cybersecurity in Context: Technology, Policy, and Law
by
Hoofnagle, Chris Jay, Richard, Golden G.
Cybercrime: An Encyclopedia of Digital Crime
by
Marion, Nancy E., Twede, Jason
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders
by
Cochran, Kodi A.
A Mechanics Code
by
Sparrow, Jason
Code Work: Hacking Across the Us/México Techno-Borderlands
by
Beltrán, Héctor
Stateless Hash-Based Digital Signature Standard: Federal Information Processing Standards 205
by
U S Dept of Commerce, Nist
Overnight Hercules for Network Security: Become a Security Analyst
by
Tsikerdekis, Michail
Quantum Cryptography: Securing the Future with Quantum Tech
by
Techworth, Alex C.
The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosystem (English Edition)
by
Kumar, Tarun
Foundations and Opportunities of Biometrics: A Guide to Technology, Applications, and Regulations
by
Salice, Dario, Salice, Jennifer
Evolution of Web 3.0 and Blockchain: The world of decentralization and smart contracts
by
Jung, Younchan
Explain Like I'm 5: Blockchains & Cryptocurrencies
by
Tennever, Eric
Exam Ref Az-500 Microsoft Azure Security Technologies
by
Thomas, Orin, Diogenes, Yuri
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to Cis 18 Controls
by
Edwards, Jason
Linux for Hackers: 3 books in 1 - The #1 Hacking Course From Beginner to Advanced. Learn it Well & Fast (2025)
by
Reed, Mark, Press, Cyberedge
Little Hackers
by
Darling, Julie
Offensive Security Using Python: A hands-on guide to offensive tactics and threat mitigation using practical strategies
by
Rehim, Rejah, Mohan, Manindar
Coin Wars: Who will win the cryptocurrency war?
by
Jung, Younchan
Godfathers and Cybersecurity: A Gangster's Take on Cyber Security
by
Harris, Lance
Black Hat Bash: Creative Scripting for Hackers and Pentesters
by
Aleks, Nick, Farhi, Dolev
Faik: A Practical Guide to Living in a World of Deepfakes, Disinformation, and Ai-Generated Deceptions
by
Carpenter, Perry
Program or Be Programmed: Eleven Commands for the AI Future
by
Rushkoff, Douglas
Propaganda: From Disinformation and Influence to Operations and Information Warfare
by
Olejnik, Lukasz
Propaganda: From Disinformation and Influence to Operations and Information Warfare
by
Olejnik, Lukasz
Advances in Information Communication Technology and Computing: Proceedings of Aictc 2024, Volume 1
by
Data Privacy Decoded: Navigating Laws and Regulations
by
Techworth, Alex C.
The Venetian Ciphers of Agostino Amadi: Volumes 4-10: English version
by
Scheers, D. P. J. a.
The Language of Cyber Attacks: A Rhetoric of Deception
by
Mauro, Aaron
The Language of Cyber Attacks: A Rhetoric of Deception
by
Mauro, Aaron
Advanced ASP.NET Core 8 Security: Move Beyond ASP.NET Documentation and Learn Real Security
by
Norberg, Scott
Operational Auditing: Principles and Techniques for a Changing World
by
Murdock, Hernan
Cybersecurity for Reconfigurable Hardware Based Critical Infrastructures
by
Chakrabarti, Amlan, Guha, Krishnendu, Singh, Jyoti Prakash
Leveraging the Potential of Artificial Intelligence in the Real World: Smart Cities and Healthcare
by
The Security Leader's Communication Playbook: Bridging the Gap between Security and the Business
by
Brown, Jeffrey W.
Secure Data Science: Integrating Cyber Security and Data Science
by
Kantarcioglu, Murat, Khan, Latifur, Thuraisingham, Bhavani
Evidence-Based Cybersecurity: Foundations, Research, and Practice
by
Pomerleau, Pierre-Luc, Maimon, David
Auditing Information and Cyber Security Governance: A Controls-Based Approach
by
Davis, Robert E.
Designing Secure Systems
by
Melone, Michael
Cybersecurity Lessons from CoVID-19
by
Slade, Robert
5G Cyber Risks and Mitigation
by
Soni, Sabhyata
Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries
by
Fowler, Bradley, Maranga, Kennedy
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience
by
Osei-Bryson, Kweku-Muata, Donalds, Charlette, Barclay, Corlane
Securing Enterprise Networks with Cisco Meraki
by
Singh, Simerjit, Chaney, Ryan
Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures
by
Lekkala, Seshagirirao, Gurijala, Priyanka
Open-Source Security Operations Center (Soc): A Complete Guide to Establishing, Managing, and Maintaining a Modern Soc
by
Basta, Alfred, Anwar, Waqar, Basta, Nadine
Autonomous Data Security: Creating a Proactive Enterprise Protection Plan
by
Neelakrishnan, Priyanka
Intelligent Mobile Malware Detection
by
Surendran, Roopak, John, Teenu, Thomas, Tony
Information System Audit: How to Control the Digital Disruption
by
Peret, Philippe
Security Issues for Wireless Sensor Networks
by
Bhardwaj, Anuj, Verma, Parag, Dumka, Ankur
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation
by
Lanza, Claudia
Introduction to the Cyber Ranges
by
Pandey, Bishwajeet, Ahmad, Shabeer
Cyber Crime Investigator's Field Guide
by
Middleton, Bruce
Agile Audit Transformation and Beyond
by
Deroche, Toby
Security Awareness Design in the New Normal Age
by
Goucher, Wendy F.
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining
by
Zolfaghari, Behrouz, Bibak, Khodakhast, Koshiba, Takeshi
Phishing Detection Using Content-Based Image Classification
by
Khandelwal, Shekhar, Das, Rik
Spatial Grasp as a Model for Space-Based Control and Management Systems
by
Sapaty, Peter Simon
An Integrated Approach to Home Security and Safety Systems
by
Batra, Neera, Batra, N. K., Goyal, Sonali
Authorization and Access Control: Foundations, Frameworks, and Applications
by
N. Mahalle, Parikshit, S. Bhong, Shashikant, R. Shinde, Gitanjali
Agile Enterprise Risk Management: Risk-Based Thinking, Multi-Disciplinary Management and Digital Transformation
by
Wiener, Howard M.
Ultra-Dense Heterogeneous Networks
by
Wang, Qubeijian, Zhao, Nan, Sun, Wen
Reweaving the Web
by
Whitt, Richard S.
Generative AI: Phishing and Cybersecurity Metrics
by
Das, Ravindra
Generative AI: Phishing and Cybersecurity Metrics
by
Das, Ravindra
Modern Network Observability: A hands-on approach using open source tools such as Telegraf, Prometheus, and Grafana
by
Flores, David, Adell, Christian, Vanderaa, Josh
Beyond Firewalls: Security-at-Scale
by
Garg, Naveen Kumar
Protecting Yourself: How Data Theft can Impact You
by
Spencer, Danielle
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
by
Aumasson, Jean-Philippe
IT Governance: An international guide to data security and ISO 27001/ISO 27002, Eighth edition
by
Watkins, Steve, Calder, Alan
The Ultimate Linux Shell Scripting Guide: Automate, Optimize, and Empower tasks with Linux Shell Scripting
by
Tevault, Donald a.
Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security
by
Giguere, Stephen, Miles, Russ, Smith, Taylor
Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT
by
Pattar, Santosh, K. R., Venugopal, M. S., Roopa
Cryptography
by
Louridas, Panos
Inside Cyber Warfare: Mapping the Cyber Underworld
by
Caruso, Jeffrey
Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network
by
Shipley, Todd G., Bowker, Art
Combating Cyberattacks Targeting the AI Ecosystem: Assessing Threats, Risks, and Vulnerabilities
by
Sood, Aditya K.
It-Forensik: Ein Grundkurs
by
Raab-Düsterhöft, Antje
Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
by
Bhatti, Baber Majid, Ali, Atif
Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
by
Ali, Atif, Bhatti, Baber Majid
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics
by
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics
by
Modern Cryptography: The Practical Guide
by
Dholakia, Sandip