Computer Security in 2025
Universal Threats in Expert Applications and Solutions: Proceedings of 3rd Uni-Teas 2024, Volume 2
by
6g-Enabled Technologies for Next Generation: Fundamentals, Applications, Analysis and Challenges
by
Gupta, Shivani, Tyagi, Amit Kumar, Tiwari, Shrikant
Cisa Certified Information Systems Auditor Study Guide: Covers 2024-2029 Exam Objectives
by
Chapple, Mike, Gregory, Peter H.
Iapp Cipp / Us Certified Information Privacy Professional Study Guide
by
Chapple, Mike, Shelley, Joe
Identification and Mitigation of Fraudulent Online Transactions Using Authentication and Fraud Detection System
by
Kumar Singh, Deepak, Khattri, Vipin, Kumar Nayak, Sandeep
Cybersecurity: Technology and Governance
by
Jøsang, Audun
Principles of AI Governance and Model Risk Management: Master the Techniques for Ethical and Transparent AI Systems
by
Sayles, James
Social Engineering Und Human Hacking: Strategien Zur Prävention Und Abwehr Von Manipulationstechniken in Der It
by
Willer, Michael, Koza, Erfan, Öztürk, Asiye
Cyber Threat Hunting
by
Alfardan, Nadhem
Die Datenverarbeitung Im Modernen Leistungssport: Herausforderungen Für Und Durch Das Datenschutzrecht
by
Pollithy, Alexander
Datensicherung ALS Teil Der It- Und Cybersecurity: Technische, Menschliche Und Betrügerische Risiken Erkennen Und Mit Umfassenden Backup- Und It-Siche
by
Bodenstein, Martin, Müller, Patrick, Chamera, Vanessa
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
by
Shetty, Sachin, Redino, Christopher, Rahman, Abdul
Generative Ai, Cybersecurity, and Ethics
by
Islam, Mohammad Rubyet
Azure-Sicherheitshandbuch: Ein Umfassender Leitfaden Für Den Schutz Ihrer Unternehmens-It
by
Ots, Karl
A Beginner's Guide to Web Application Penetration Testing
by
Abdollahi, Ali
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier
by
Muhlert, Matthias
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier
by
Muhlert, Matthias
Hacking Cryptography: Write, Break, and Fix Real-World Implementations
by
Khan, Kamran, Cox, Bill
Metasploit, 2nd Edition
by
Aharoni, Mati, Kearns, Devon, Kennedy, David
Securing Microsoft Azure OpenAI
by
Ots, Karl
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy
by
Deibert, Ronald J.
Alice and Bob Learn Secure Coding
by
Janca, Tanya
Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam
by
Yiu-Chung Lau, Laurie
Cyber Resilience Index: Mastering Threat-Informed Defense
by
Alevizos, Lampis
The AI ACT and the Agile Safety Plan
by
Stålhane, Tor, Vatn, Dorthea Mathilde Kristin, Myklebust, Thor
Private Intelligence Services: Ein Leitfaden Zum Umgang Im Zeitalter Der Digitalisierung
by
Embacher, Stefan
Privacy in Vehicular Networks: Challenges and Solutions
by
Wang, Xu, Ni, Wei, Ma, Baihe
Privacy in Vehicular Networks: Challenges and Solutions
by
Wang, Xu, Ni, Wei, Ma, Baihe
Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics
by
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer
by
Grindell, Philip
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer
by
Grindell, Philip
The Art of Mac Malware, Volume 2: Detecting Malicious Software
by
Wardle, Patrick
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education
by
Fowler, Bradley, Chaundy, Bruce G.
Threat Modeling Conversations
by
Threat Modeling Manifesto Working Group
Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure
by
Carroll, Brandon
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen
by
Fleischer, Dirk
File System Forensics
by
Toolan, Fergus
Entiende La Tecnología: Desde La Caída de Megaupload Hasta Los Secretos de la in Teligencia Artificial / The Digital Revolution
by
Gentile, Nate
Cyber Security Foundations: Fundamentals, Technology and Society
by
Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Cyber Security Foundations: Fundamentals, Technology and Society
by
Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Differential Privacy
by
Garfinkel, Simson L.
Building a Cybersecurity Program
by
Mir, Ahsan, Houlder, Chris
Applied Satisfiability: Cryptography, Scheduling, and Coalitional Games
by
Liao, Xiaojuan, Koshimura, Miyuki
Technology for Littles: Helping Young Children Navigate the Internet Responsibly
by
Rogers-Whitehead, Carrie
Cybersecurity for Dummies
by
Steinberg, Joseph
Sse, Sase, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies
by
Sabella, Anthony, Shoemaker, Ryan
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam
by
Robb, Donald, Buhagiar, Jon, Lammle, Todd
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture
by
Trojanowski Micha?, Archer, Gary, Kahrer, Judith
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting
by
Santos, Omar, Lazzara, Savannah, Darnell, Barrett
Linux Basics for Hackers, 2nd Edition
by
Occupytheweb
Securing Generative Ai, Llms, and ML Using Zero Trust Architecture
by
Zsiga, Zig, Green-Ortiz, Cindy
Lehrbuch Der Softwaretechnik
by
Balzert, Helmut, Ebert, Christof
Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach
by
Schauer, Stefan, König, Sandra, Rass, Stefan
Listen and Repair: A Guide for Information Security to Meet Future Demands
by
Messdaghi, Chloe
Analysis and Design of Next-Generation Software Architectures: Generative Ai, Cybersecurity, and Cloud Computing
by
Langer, Arthur M.
Efficient Algorithms for Elliptic Curve Cryptosystems Using Endomorphisms
by
Hakuta, Keisuke
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2)
by
Clarke, David
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2)
by
Clarke, David
Computer Security (Third Edition)
by
Du, Wenliang
Modern Cryptography: From Rsa to Zero-Knowledge and Beyond
by
Schwenk, Jörg, Wolfenstetter, Klaus-Dieter, Beutelspacher, Albrecht
Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets
by
Eddings, Ron, Kaufmann, Mj
Security: A Systems Engineering Approach
by
Winstead, Mark
Operationalizing Cybersecurity: Actions, Steps, and Templates to Reduce Cybersecurity Risks
by
Hart, Jason
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications
by
Madurai, Kumar, Ramamurthy, Bina
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications
by
Ramamurthy, Bina, Madurai, Kumar
Securing Cloud Native Apps
by
Pandhare, Shrikant, Anderson, Michael, Reva, Nick
Fighting the Virus: Disease Modeling and Cyber Security
by
Mangel, Marc
Identity Security for Software Development: Building with Identity, Secrets, and Credentials
by
Ailon, Uzi, Walsh, John
Powershell for Security Analysts
by
Grubb, Sam
Introduction to Biometrics
by
Jain, Anil K., Ross, Arun A., Nandakumar, Karthik
Applied Introduction to Cryptography and Cybersecurity
by
Herzberg, Amir
Applied Introduction to Cryptography and Cybersecurity
by
Herzberg, Amir
AWS Certified Security Study Guide: Specialty (Scs-C02) Exam
by
Neto, Marcello Zillo, Santana, Gustavo A. a., Munoz, Mauricio