Computer Security in 2025
AI Versus Cybersecurity: Navigating the Cybersecurity of the Future
by
Chaganti, Krishna Chaitanya
Iapp Cipp / Us Certified Information Privacy Professional Study Guide
by
Chapple, Mike, Shelley, Joe
Cisa Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives
by
Chapple, Mike, Gregory, Peter H.
Principles of AI Governance and Model Risk Management: Master the Techniques for Ethical and Transparent AI Systems
by
Sayles, James
Investing in Cryptos for a Free Future: A complete guide for beginners and enthusiasts, on the path to financial freedom with cryptocurrencies
by
Satoshi, Degen
Phishing verhindern - Psychologisches Wissen und Strategien: Raffinierter als die Phishing-Angreifer sein - 90% der Cyberangriffe gelingen durch Phish
by
Mack, Michael
Forensic Cybersecurity: Protecting and Investigating Digital Data
by
Rochefort, Mylan
Bitcoin, Crypto, Blockchain: Making Sense of It in Small Bytes
by
Griffin, Frederick, Shakir, Sahir
Building a Secure Healthcare Facility: Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Healthcare Facilities
by
Sliger, Derek
Management of Cybersecurity
by
Whitman, Michael, Mattord, Herbert
A Beginner's Guide to Web Application Penetration Testing
by
Abdollahi, Ali
Safeguarding the Digital Frontier: Advanced Strategies for Cybersecurity and Privacy
by
Elmassarawy, Ayman
Ciberseguridad para Todos: Guía Básica para Protegerte en el Mundo Digital
by
Rojas Sarria, Francisco J.
Illuminating the Intricacies of Cryptography and Its Impact on Modern Warfare and Global Security: Weaving Connections Between Earth and Sky
by
Sterling, Jasper
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
by
Nandakumar, Dhruv, Rahman, Abdul, Redino, Christopher
6g-Enabled Technologies for Next Generation: Fundamentals, Applications, Analysis and Challenges
by
Tiwari, Shrikant, Gupta, Shivani, Tyagi, Amit Kumar
Windows Server 2025 Administration Fundamentals - Fourth Edition: A beginner's guide to managing and administering Windows Server environments
by
Dauti, Bekim
Principles and Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain
by
Li, Hui, Wang, Han
Applied Satisfiability: Cryptography, Scheduling, and Coalitional Games
by
Liao, Xiaojuan, Koshimura, Miyuki
Silk Typhoon: The Rise of Chinese Cyber Espionage
by
Park, Steven
Datensicherung ALS Teil Der It- Und Cybersecurity: Technische, Menschliche Und Betrügerische Risiken Erkennen Und Mit Umfassenden Backup- Und It-Siche
by
Bodenstein, Martin, Müller, Patrick, Chamera, Vanessa
Azure-Sicherheitshandbuch: Ein Umfassender Leitfaden Für Den Schutz Ihrer Unternehmens-It
by
Ots, Karl
Cyber Threat Hunting
by
Alfardan, Nadhem
Metasploit, 2nd Edition
by
Kearns, Devon, Kennedy, David, Aharoni, Mati
PCI DSS Version 4.0.1: A Guide to the Payment Card Industry Data Security Standard
by
Hancock, Stephen
Embedded Cryptography 3
by
Prouff, Emmanuel
Software Security: Concepts & Practices
by
Kumar, Rajeev, Ahmad Khan, Raees, Ahmad Khan, Suhel
Embedded Cryptography 2
by
Prouff, Emmanuel
Codebasierte Post-Quanten-Kryptografie: Goppa Codes Und Das McEliece Kryptosystem
by
Paul, Felix Peter
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
by
Wolff, Josephine
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy
by
Deibert, Ronald J.
Embedded Cryptography 1
by
Renault, Guenael, Rivain, Mattieu, Prouff, Emmanuel
Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam
by
Yiu-Chung Lau, Laurie
Social Engineering Und Human Hacking: Strategien Zur Prävention Und Abwehr Von Manipulationstechniken in Der It
by
Öztürk, Asiye, Willer, Michael, Koza, Erfan
Alice and Bob Learn Secure Coding
by
Janca, Tanya
The AI ACT and the Agile Safety Plan
by
Myklebust, Thor, Stålhane, Tor, Vatn, Dorthea Mathilde Kristin
Privacy in Vehicular Networks: Challenges and Solutions
by
Ni, Wei, Ma, Baihe, Wang, Xu
Privacy in Vehicular Networks: Challenges and Solutions
by
Ni, Wei, Ma, Baihe, Wang, Xu
Cybercrime and the Law: An Analysis of Legal Governance in Europe
by
Radoniewicz, Filip
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier
by
Muhlert, Matthias
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier
by
Muhlert, Matthias
Cyber Resilience Index: Mastering Threat-Informed Defense
by
Alevizos, Lampis
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer
by
Grindell, Philip
Personal Threat Management: The Practitioner's Guide to Keeping Clients Safer
by
Grindell, Philip
The Art of Mac Malware, Volume 2: Detecting Malicious Software
by
Wardle, Patrick
Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers
by
Crose, Emily
30-Minute Groups: Online Safety: Spotting Red Flags, Protecting Privacy, and Being a Positive Voice
by
Cassada Lohmann, Raychelle
Practical Post-Quantum Signatures: Falcon and Solmae with Python
by
Kim, Kwangjo
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education
by
Chaundy, Bruce G., Fowler, Bradley
Private Intelligence Services: Ein Leitfaden Zum Umgang Im Zeitalter Der Digitalisierung
by
Embacher, Stefan
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen
by
Fleischer, Dirk
Cybersicherheit in Kritischen Infrastrukturen: Ein Spieltheoretischer Ansatz
by
Schauer, Stefan, König, Sandra, Rass, Stefan
Analysis and Design of Next-Generation Software Architectures: Generative Ai, Cybersecurity, and Cloud Computing
by
Langer, Arthur M.
Hacking Cryptography: Write, Break, and Fix Real-World Implementations
by
Cox, Bill, Khan, Kamran
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 3)
by
Parisi, Madeline, Marcella, Al, Moore, Brian
From Street-Smart to Web-Wise(r): A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 3)
by
Parisi, Madeline, Marcella, Al, Moore, Brian
Fortifying the Future: Harnessing AI for Transformative Cybersecurity Training
by
Rana, Shaila, Chicone, Rhonda
Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics
by
Entiende La Tecnología: Desde La Caída de Megaupload Hasta Los Secretos de la in Teligencia Artificial / The Digital Revolution
by
Gentile, Nate
Cyber Security Foundations: Fundamentals, Technology and Society
by
Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Cyber Security Foundations: Fundamentals, Technology and Society
by
Mersinas, Konstantinos, Schmitz, Guido, Martin, Keith
Differential Privacy
by
Garfinkel, Simson L.
Cybersecurity in Robotic Autonomous Vehicles: Machine Learning Applications to Detect Cyber Attacks
by
Islam, Sardar M. N., Gondal, Iqbal, Alruwaili, Ahmed
Safeguarding the Future: Security and Privacy by Design for Ai, Metaverse, Blockchain, and Beyond
by
Tang, Alan
Safeguarding the Future: Security and Privacy by Design for Ai, Metaverse, Blockchain, and Beyond
by
Tang, Alan
Building a Cybersecurity Program
by
Houlder, Chris, Mir, Ahsan
File System Forensics
by
Toolan, Fergus
Securing Microsoft Azure OpenAI
by
Ots, Karl
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware
by
Grimes, Roger A.
Technology for Littles: Helping Young Children Navigate the Internet Responsibly
by
Rogers-Whitehead, Carrie
Cybersecurity for Dummies
by
Steinberg, Joseph
Human Factors Analysis of 23 Cyberattacks
by
Moallem, Abbas
Digital Resilience, Cybersecurity and Supply Chains
by
Singh, Tarnveer
Digital Resilience, Cybersecurity and Supply Chains
by
Singh, Tarnveer
Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program
by
Parrish, Lee
Security Relationship Management: Leveraging Marketing Concepts to Advance a Cybersecurity Program
by
Parrish, Lee
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture
by
Archer, Gary, Kahrer, Judith, Trojanowski, Michal
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam
by
Robb, Donald, Buhagiar, Jon, Lammle, Todd
Securing the AWS Cloud: A Guide for Learning to Secure AWS Infrastructure
by
Carroll, Brandon
Cybersecurity Culture
by
Bishop, Gulsebnem
Cybersecurity Culture
by
Bishop, Gulsebnem
Quantum Communication and Quantum Internet Applications
by
Ochiogrosso, Benedict, Minoli, Daniel
Quantum Communication and Quantum Internet Applications
by
Ochiogrosso, Benedict, Minoli, Daniel
Security Yearbook 2025: A History and Directory of the It Security Industry
by
Stiennon, Richard
A Cybersecurity Leader's Journey: Speaking the Language of the Board
by
Marchewka, Edward
A Cybersecurity Leader's Journey: Speaking the Language of the Board
by
Marchewka, Edward
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an Ai-Driven World
by
Thurner, Wesley, Santos, Omar, Lazzara, Savannah
Guardians of Data: A Comprehensive Guide to Digital Data Protection
by
Khidzir, Nik Zulkarnaen, Ahmed, Shekh Abdullah-Al-Musa
Guardians of Data: A Comprehensive Guide to Digital Data Protection
by
Ahmed, Shekh Abdullah-Al-Musa, Khidzir, Nik Zulkarnaen
Cryptography: A Very Short Introduction
by
Murphy, Sean, Player, Rachel
Lehrbuch Der Softwaretechnik
by
Ebert, Christof, Balzert, Helmut
Listen and Repair: A Guide for Information Security to Meet Future Demands
by
Messdaghi, Chloe
Crime-Related Events Identification Based on Text Analytics Approach
by
Wójcik, Waldemar, Khairova, Nina, Mamyrbayev, Orken
Cisa Certified Information Systems Auditor Study Guide and Practice Tests Bundle: Covers 2024 Exam Objectives
by
Gregory, Peter H., Chapple, Mike
Efficient Algorithms for Elliptic Curve Cryptosystems Using Endomorphisms
by
Hakuta, Keisuke
Cyber Insecurity: Examining the Past, Defining the Future
by
Leonas, Vladas
Cyber Insecurity: Examining the Past, Defining the Future
by
Leonas, Vladas
Optimizing Iot Networks: Energy-Efficient Resource Management Through Machine Learning
by
Bhende, Manisha, Sharma, Swati, Patil, Suvarna
Introduction to Modern Cryptography: Fourth Edition
by
Katz, Jonathan, Lindell, Yehuda
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2)
by
Clarke, David
Information Security Management: Compliance for Global Data Security Excellence (ISO 27001, ISO 27002 and Soc 2)
by
Clarke, David
Computer Security (Third Edition)
by
Du, Wenliang
Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets
by
Eddings, Ron, Kaufmann, Mj
Linux Basics for Hackers, 2nd Edition
by
Occupytheweb
Zero Trust in Resilient Cloud and Network Architectures
by
Halley, Josh, Saini, Vinay, Prajapati, Dhrumil
Cyber Risk Management in Practice: A Guide to Real-World Solutions
by
Morales, Carlos
Cyber Risk Management in Practice: A Guide to Real-World Solutions
by
Morales, Carlos
Regulierung Von Künstlicher Intelligenz in Der EU: Praxisbezogene Lösungsansätze Für Die Sicherheit Von Ki-Anwendungen
by
Pötsch, Jordan, Bernnat, Rainer
Security: A Systems Engineering Approach
by
Winstead, Mark
Identity Security for Software Development: Building with Identity, Secrets, and Credentials
by
Walsh, John, Ailon, Uzi
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications
by
Ramamurthy, Bina, Madurai, Kumar
Blockchain, Cryptocurrency and Defi Systems: Concepts and Applications
by
Ramamurthy, Bina, Madurai, Kumar
Securing Cloud Native Apps
by
Pandhare, Shrikant, Anderson, Michael, Reva, Nick
From Day Zero to Zero Day
by
Lim, Eugene
Cyber Warfare and Navies
by
Demchak, Christine Cherie, Tangredi, Sam J.
Data Engineering for Cybersecurity
by
Bonifield, James
AWS Certified Security Study Guide: Specialty (Scs-C02) Exam
by
Goldfarb, Dario Lucas, Munoz, Mauricio, Moraes, Alexandre M. S. P.
Onlife Criminology: Virtual Crimes and Real Harms
by
Mark Szakolczai, Janos
Securing Generative Ai, Llms, and ML Using Zero Trust Architecture
by
Zsiga, Zig, Green-Ortiz, Cindy
Modern Cryptography: From Rsa to Zero-Knowledge and Beyond
by
Schwenk, Jörg, Wolfenstetter, Klaus-Dieter, Beutelspacher, Albrecht
Comptia A+ Complete Study Guide 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202
by
Buhagiar, Jon, Docter, Quentin
Fundamentals of Cloud Security
by
Igonor, Andy
Introduction to Biometrics
by
Nandakumar, Karthik, Jain, Anil K., Ross, Arun A.
Applied Introduction to Cryptography and Cybersecurity
by
Herzberg, Amir
Applied Introduction to Cryptography and Cybersecurity
by
Herzberg, Amir