Computer Security in 2024
Modern Cryptography: The Practical Guide
by
Dholakia, Sandip
AWS Security Cookbook - Second Edition: Practical solutions for securing AWS cloud infrastructure with essential services and best practices
by
Kanikathottu, Heartin
Information Security Incident and Data Breach Management: A Step-By-Step Approach
by
Kyriazoglou, John
The Subjective Value of Privacy: Assessing Individuals' Calculus of Costs and Benefits in the Context of State Surveillance
by
Antoine, Lukas
Mathematical Foundations for Side-Channel Analysis of Cryptographic Systems
by
Rioul, Olivier, Cheng, Wei, Guilley, Sylvain
A Reference Manual for Data Privacy Laws and Cyber Frameworks
by
Das, Ravindra
A Reference Manual for Data Privacy Laws and Cyber Frameworks
by
Das, Ravindra
Cybersecurity Tabletop Exercises: From Planning to Execution
by
Hollenberger, John, Lelewski, Robert
Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape
by
Bhardwaj, Akashdeep
Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape
by
Bhardwaj, Akashdeep
Introduction to Biometrics
by
Ross, Arun A., Jain, Anil K., Nandakumar, Karthik
The Intelligence Pyramid: A Comprehensive Guide to Building and Maturing Cyber Intelligence Teams
by
Peeler, Vince
The Intelligence Pyramid: A Comprehensive Guide to Building and Maturing Cyber Intelligence Teams
by
Peeler, Vince
CISA - Certified Information Systems Auditor Study Guide - Third Edition: Ace the CISA exam with practical examples and over 1000 exam-oriented practi
by
Doshi, Hemang
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization
by
Xiao, Huang, Xu, Peng, Kolosnjaji, Bojan
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 1)
by
Marcella, Al, Parisi, Madeline, Moore, Brian
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 1)
by
Marcella, Al, Parisi, Madeline, Moore, Brian
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF
by
Brown, Jason
Burners & Black Markets
by
Henderson, Lance
The Ciso Playbook
by
Andreu, Andres
The Ciso Playbook
by
Andreu, Andres
Futuro Descentralizado: Cómo la inteligencia artificial y la Blockchain transformarán nuestras vidas
by
Fiorillo, Claudio
Online Safety Made Simple: Protecting Yourself on the Internet
by
Mercer, Alex
Phishing for Answers: Risk Identification and Mitigation Strategies
by
Merz, Terry R., Shaw, Lawrence E.
Entity Authentication and Personal Privacy in Future Cellular Systems
by
Koien, Geir M.
Enigma Myth Deciphered: Codebreakers, Commanders and Politicians
by
Grajek, Marek
Informational Privacy for Service Design: An Ethical Framework for Designing Privacy-Oriented Services
by
Parrilli, Davide M.
Homomorphic Encryption for Data Science (He4ds)
by
Drucker, Nir, Adir, Allon, Aharoni, Ehud
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
by
Wolff, Josephine
Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence
by
François, Jérôme, Lahmadi, Abdelkader, Lanza, Claudia
Generative AI and Cyberbullying
by
Das, Ravindra
Generative AI and Cyberbullying
by
Das, Ravindra
There's No Such Thing as Crypto Crime: An Investigative Handbook
by
Furneaux, Nick
Supply Chain Software Security: Ai, Iot, and Application Security
by
Syed, Aamiruddin
Das Standard-Datenschutzmodell (Sdm): Einführung in Die Umsetzung Der Operativen Anforderungen Der Dsgvo
by
Rost, Martin
Generative AI and Digital Forensics
by
Das, Ravindra
Generative AI and Digital Forensics
by
Das, Ravindra
Building Secure PHP Applications: A Comprehensive Guide to Protecting Your Web Applications from Threats
by
Sahu, Satej Kumar
Leveraging Blockchain Technology: Governance, Risk, Compliance, Security, and Benevolent Use Cases
by
Zero to Hero: Your Guide to a Career in Cybersecurity
by
Asare, Felix Kyei
Zero to Hero: Your Guide to a Career in Cybersecurity
by
Asare, Felix Kyei
Web3
by
Zhang, Fan, Huang, Ken, Yang, Youwei
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices
by
Ouaissa, Mariya, Ouaissa, Mariyam
Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices
by
Ouaissa, Mariyam, Ouaissa, Mariya
Open Source Intelligence (Osint) - A Practical Introduction: A Field Manual
by
Prasad, Anand R., Kwanoran, Suksit, Khera, Varin
Information Security Management Principles
by
Green, Jeremy, Taylor, Andy, Alexander, David
Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition)
by
Berlin, Amanda
Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition)
by
Berlin, Amanda
Cyber Certainty
by
Tobok, Daniel
CCNA Certification Study Guide Volume 2: Exam 200-301 V1.1
by
Lammle, Todd, Robb, Donald
The Zero Trust Framework: Threat Hunting & Quantum Mechanics
by
Das, Ravindra
Manuscrypt: Designed for Mankind - Anthropocentric Information Security
by
Upadhyaya, Prashant A.
Manuscrypt: Designed for Mankind - Anthropocentric Information Security
by
Upadhyaya, Prashant A.
It Governance and Information Security: Guides, Standards, and Frameworks
by
Alazab, Mamoun, Maleh, Yassine, Sahid, Abdelkebir
Elliptic Curve Cryptography for Developers
by
Rosing, Michael
Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers
by
Crose, Emily
The Closing of the Auditor's Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Modern Auditing
by
J. O'Regan, David
The Closing of the Auditor's Mind?: How to Reverse the Erosion of Trust, Virtue, and Wisdom in Modern Auditing
by
J. O'Regan, David
Protecting Location Privacy in the Era of Big Data: A Technical Perspective
by
Mahmood, Adnan, Sheng, Quan Z., Yan, Yan
Cyberdynamx: The Art and Science of Building a Simplified Digital Security Program
by
Blais, Curtis L.
Comptia A+ Certification Companion: Hands-On Preparation and Practice for Exams 220-1101 & 220-1102
by
Cochran, Kodi A.
Principles & Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain
by
Wang, Han, Liu, Hui
Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis
by
Garg, Shivi, Baliyan, Niyati
Networking All-In-One for Dummies
by
Lowe, Doug
Surviving the Wild Wild Web: A User's Playbook to Navigating the Internet's Trickiest Terrains
by
Gergely, Marton, Grey, Ian, Saleous, Heba
Surviving the Wild Wild Web: A User's Playbook to Navigating the Internet's Trickiest Terrains
by
Gergely, Marton, Grey, Ian, Saleous, Heba
From Street-smart to Web-wise(R): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 2)
by
Moore, Brian, Parisi, Madeline, Marcella, Al
From Street-smart to Web-wise(R): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 2)
by
Moore, Brian, Parisi, Madeline, Marcella, Al
Web Application Pentesting: A Comprehensive Guide for Professionals
by
Maleh, Yassine
Handbook of Digital Innovation, Transformation, and Sustainable Development in a Post-Pandemic Era
by
Cyber Investigations of Smart Devices
by
Bhardwaj, Akashdeep
Cyber Investigations of Smart Devices
by
Bhardwaj, Akashdeep
Mastering Cybersecurity: A Practical Guide for Professionals (Volume 1)
by
Bhardwaj, Akashdeep
Mastering Cybersecurity: A Practical Guide for Professionals (Volume 1)
by
Bhardwaj, Akashdeep
Public Key Cryptosystems
by
Bas, Esra
Public Key Cryptosystems
by
Bas, Esra
Policing Trends and Issues in America
by
Birzer, Michael L.
Penology: An Introduction to Corrections
by
Yager, Jan
Transnational Policing: Fifa and Its Agreements
by
Nakueira, Sophie