| Number |
Cover |
TextBook for Cyber Security |
Author |
Edition |
| 0 |
|
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts |
Maurizio Martellini, Andrea Malizia (eds.) |
1 |
| 1 |
|
Fundamentals of Network Forensics: A Research Perspective [1 ed.] |
R.C. Joshi, Emmanuel S. Pilli (auth.) |
1 |
| 2 |
|
Fundamentals of network security [1st ed.] |
John E. Canavan |
1 |
| 3 |
|
Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night |
McHale, David |
|
| 4 |
|
Access Control and Security Monitoring of Multimedia Information Processing and Transmission (Computing and Networks) |
Zhihan Lyu (editor), Jaime Lloret (editor), Houbing Herbert Song (editor) |
|
| 5 |
|
Advanced Computer Science Applications. Recent Trends in AI, Machine Learning, and Network Security |
Karan Singh, Latha Banda, Manisha Manjul |
|
| 6 |
|
Advanced Product Management Series: Cybersecurity [1 ed.] |
Alex Cowan |
1 |
| 7 |
|
Advanced Techniques of Artificial Intelligence in IT Security Systems (Studies in Big Data, 146) [1st ed.] |
Marcin Korytkowski |
1 |
| 8 |
|
AI for Peace |
Branka Panic, Paige Arthur |
|
| 9 |
|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I [1 ed.] |
Christina Pöpper, Lejla Batina |
1 |
| 10 |
|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II [1 ed.] |
Christina Pöpper, Lejla Batina |
1 |
| 11 |
|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III [1 ed.] |
Christina Pöpper, Lejla Batina |
1 |
| 12 |
|
Artificial Intelligence for Cyber Defense and Smart Policing |
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand |
|
| 13 |
|
Azure Security [1 ed.] |
Bojan Magusic |
1 |
| 14 |
|
Beyond Digital Distraction: Educating Today's Cyber Student (Digital Education and Learning) [1st ed.] |
Kurt C. Schuett |
1 |
| 15 |
|
Big Data, Emerging Technologies and Intelligence: National Security Disrupted |
Miah Hammond-Errey |
|
| 16 |
|
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals |
Ramakrishnan, Ganesh, Haqanee, Mansoor |
|
| 17 |
|
Blockchain-Based Data Security in Heterogeneous Communications Networks |
Dongxiao Liu, Xuemin (Sherman) Shen |
|
| 18 |
|
Blockchain-based Internet of Things [1 ed.] |
Iraq Ahmad Reshi (editor), Sahil Sholla (editor) |
1 |
| 19 |
|
Cold War 2.0 : Artificial Intelligence in the New Battle between China, Russia, and America |
George S. Takach |
|
| 20 |
|
Building Cybersecurity Applications with Blockchain and Smart Contracts |
Nour El Madhoun, Ioanna Dionysiou, Emmanuel Bertin |
|
| 21 |
|
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003) [3 ed.] |
Mya Heath |
3 |
| 22 |
|
CompTIA Security+ Practice Tests: Exam SY0-701 [3 ed.] |
David Seidl |
3 |
| 23 |
|
CompTIA Security+ SY0-701 Certification Guide, Third Edition (for DUC PHAM) [3 ed.] |
Ian Neil |
3 |
| 24 |
|
CompTIA Security+ SY0-701 Practice Tests & PBQs: Exam SY0-701 |
Nikolaos Gorgotsias |
|
| 25 |
|
CompTIA® Security+ SY0-701 Cert Guide (for True Epub) |
Lewis Heuermann |
|
| 26 |
|
Computer networks. Data communications, Internet and security. |
Ata Elahi, Alex Cushman |
|
| 27 |
|
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings Part 3 |
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor) |
|
| 28 |
|
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science) |
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor) |
|
| 29 |
|
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science) |
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor) |
|
| 30 |
|
Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised ... I (Lecture Notes in Computer Science, 14398) |
Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens-Boulahia (editor), Costas Lambrinoudakis (editor), Joaquin Garcia-Alfaro (editor), Guillermo Navarro-Arribas (editor), Pantaleone Nespoli (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor) |
|
| 31 |
|
CC Certified in Cybersecurity Study Guide (Sybex Study Guide) |
Mike Chapple |
|
| 32 |
|
Children, Young People and Online Harms: Conceptualisations, Experiences and Responses |
Emily Setty (editor), Faith Gordon (editor), Emma Nottingham (editor) |
|
| 33 |
|
Security with Intelligent Computing and Big-data Services |
Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao |
|
| 34 |
|
Security with Intelligent Computing and Big-data Services: Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) |
Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain |
|
| 35 |
|
Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings |
Kai-Di Chang, Chi-Yuan Chen (auth.), Ruay-Shiung Chang, Tai-hoon Kim, Sheng-Lung Peng (eds.) |
|
| 36 |
|
Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy) [1 ed.] |
Ari Takanen, Jared DeMott, Charlie Miller |
1 |
| 37 |
|
Advanced Certificate in Information Security (ACISE) Part-I |
IGNOU |
|
| 38 |
|
Advanced Certificate in Information Security (ACISE) Part-II |
IGNOU |
|
| 39 |
|
Data Security in Internet of Things Based RFID and WSN Systems Applications |
Korhan Cengiz, Rohit Sharma, Rajendra Prasad Mahapatra |
|
| 40 |
|
Post Graduate Diploma in Information Security (PGDIS) Part 1 |
IGNOU |
|
| 41 |
|
Post Graduate Diploma in Information Security (PGDIS) Part 2 |
IGNOU |
|
| 42 |
|
Post Graduate Diploma in Information Security (PGDIS) Part 3 |
IGNOU |
|
| 43 |
|
Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences: PCCDS 2022 |
Rajendra Prasad Yadav, Satyasai Jagannath Nanda, Prashant Singh Rana, Meng-Hiot Lim |
|
| 44 |
|
Transactions on data hiding and multimedia security VI |
Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.) |
|
| 45 |
|
Cyber Dragon: Inside China's Information Warfare and Cyber Operations |
Dean Cheng |
|
| 46 |
|
Cyber Security: Threats and Responses for Government and Business |
Caravelli, Jack,Jones, Nigel,Kozup, John C |
|
| 47 |
|
Cybercrime: Criminal Threats from Cyberspace |
Susan W. Brenner |
|
| 48 |
|
Digital Influence Warfare in the Age of Social Media |
James J. F. Forest |
|
| 49 |
|
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers |
Philip Alexander |
|
| 50 |
|
Myths and Realities of Cyber Warfare: Conflict in the Digital Realm |
Nicholas Michael Sambaluk |
|
| 51 |
|
The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals |
Paul Bocij |
|
| 52 |
|
The Technology Trap: Where Human Error and Malevolence Meet Powerful Technologies |
Lloyd J. Dumas |
|
| 53 |
|
The War on Privacy |
Jacqueline Klosek |
|
| 54 |
|
Weaponizing Cyberspace: Inside Russia's Hostile Activities |
Nicholas Sambaluk |
|
| 55 |
|
Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings |
Rudrapatna K. Shyamasundar,Virendra Singh,Jaideep Vaidya (eds.) |
|
| 56 |
|
Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings |
Sabu M. Thampi,Gregorio Martínez Pérez,Carlos Becker Westphall,Jiankun Hu,Chun I. Fan,Félix Gómez Mármol (eds.) |
|
| 57 |
|
Smart Secure Systems – IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings |
Guru Prasadh Venkataramani,Karthik Sankaranarayanan,Saswati Mukherjee,Kannan Arputharaj,Swamynathan Sankara Narayanan (eds.) |
|
| 58 |
|
A Deep Learning based Approach to Proactive and Reactive Enterprise Security |
Sumit Chakraborty |
|
| 59 |
|
Adaptively Secure Broadcast: Threat Analytics & Security Intelligence |
Sumit Chakraborty |
|
| 60 |
|
Advanced Computing and Systems for Security: Volume 1 |
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.) |
|
| 61 |
|
Advanced Computing and Systems for Security: Volume 2 |
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.) |
|
| 62 |
|
Advanced Informatics for Computing Research: Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II |
Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh |
|
| 63 |
|
Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022 Rajkot, India, November 24–26, 2022 Revised Selected Papers, Part I |
Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat |
|
| 64 |
|
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I |
Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.) |
|
| 65 |
|
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II |
Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.) |
|
| 66 |
|
Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 |
Hiran V. Nath (auth.), David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai (eds.) |
|
| 67 |
|
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection |
S. V. Raghavan, E. Dawson (auth.), S.V. Raghavan, E Dawson (eds.) |
|
| 68 |
|
Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings |
V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li |
|
| 69 |
|
Applied Computation and Security Systems: Volume One |
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.) |
|
| 70 |
|
Applied Computation and Security Systems: Volume Two |
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.) |
|
| 71 |
|
Bioterrorism : Cryptographic Challenges |
Sumit Chakraborty |
|
| 72 |
|
Bioterrorism, Threat Analytics and Secure Multi-party Computation |
Sumit Chakraborty |
|
| 73 |
|
Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe |
John, Nirmal |
|
| 74 |
|
Combating Cyber Threat |
P. K. Singh |
|
| 75 |
|
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers |
Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar |
|
| 76 |
|
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings |
Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan |
|
| 77 |
|
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers |
Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan |
|
| 78 |
|
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 |
Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) |
|
| 79 |
|
Computer Networks and Information Technologies: Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, Bangalore, India, March 10-11, 2011. Proceedings |
Snehlata Mishra, Vandana Neha Tigga, S. N. Singh (auth.), Vinu V Das, Janahanlal Stephen, Yogesh Chaba (eds.) |
|
| 80 |
|
Computer Networks and Intelligent Computing: 5th International Conference on Information Processing, ICIP 2011, Bangalore, India, August 5-7, 2011. Proceedings |
Saritha S., Santhosh Kumar G. (auth.), K. R. Venugopal, L. M. Patnaik (eds.) |
|
| 81 |
|
Cryptography and network security 3rd edition |
Atul Kahate |
3 |
| 82 |
|
Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Series on Asian Criminology and Criminal Justice Research) |
Balsing Rajput |
|
| 83 |
|
Cyber Security in India: Education, Research and Training (IITK Directions, 4) |
Sandeep Kumar Shukla (editor), Manindra Agrawal (editor) |
|
| 84 |
|
Cyber Technological Paradigms and Threat Landscape in India |
Ramnath Reghunadhan |
|
| 85 |
|
Cyber Warfare, Security and Space Research: First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers |
Sandeep Joshi (editor), Amit Kumar Bairwa (editor), Amita Nandal (editor), Milena Radenkovic (editor), Cem Avsar (editor) |
|
| 86 |
|
Cyber Warfare: Its Implications on National Security |
Sanjeev Relia |
|
| 87 |
|
Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science, 1436) |
Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor) |
|
| 88 |
|
Distributed Computing and Networking: 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings |
Sanjit A. Seshia (auth.), Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha (eds.) |
|
| 89 |
|
India Today [April 09, 2018] | Your Privacy is Dead ! |
India Today |
|
| 90 |
|
Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings |
Atul Prakash, Rudrapatna Shyamasundar (eds.) |
|
| 91 |
|
Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings |
Sushil Jajodia, Chandan Mazumdar (eds.) |
|
| 92 |
|
Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings |
Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) |
|
| 93 |
|
Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings |
Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar |
|
| 94 |
|
Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings |
Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar |
|
| 95 |
|
Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings |
Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur |
|
| 96 |
|
Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings (Security and Cryptology) |
Somanath Tripathy (editor), Rudrapatna K. Shyamasundar (editor), Rajiv Ranjan (editor) |
|
| 97 |
|
Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings (Lecture Notes in Computer Science) |
Venkata Ramana Badarla (editor), Surya Nepal (editor), Rudrapatna K. Shyamasundar (editor) |
|
| 98 |
|
Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings (Lecture Notes in Computer Science) |
Vallipuram Muthukkumarasamy (editor), Sithu D. Sudarsan (editor), Rudrapatna K. Shyamasundar (editor) |
|
| 99 |
|
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings |
Sriram K. Rajamani (auth.), Somesh Jha, Anish Mathuria (eds.) |
|
| 100 |
|
Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings |
Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia (auth.), Sushil Jajodia, Chandan Mazumdar (eds.) |
|
| 101 |
|
Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings |
Christopher Kruegel (auth.), Venkat Venkatakrishnan, Diganta Goswami (eds.) |
|
| 102 |
|
Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings |
Chris Clifton, Balamurugan Anandan (auth.), Aditya Bagchi, Indrakshi Ray (eds.) |
|
| 103 |
|
Information theory coding and cryptography |
Mandal, Surajit, Manna, Nilotpal, Saha, Arjit |
|
| 104 |
|
Information Theory Coding And Cryptography |
Ranjan Bose |
|
| 105 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part I |
Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao |
|
| 106 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part II |
Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao |
|
| 107 |
|
Network security essentials: applications and standards |
William Stallings |
|
| 108 |
|
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India |
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal |
|
| 109 |
|
Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India |
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas |
|
| 110 |
|
Progress in Cryptology – INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings |
Roger Dingledine (auth.), Daniel J. Bernstein, Sanjit Chatterjee (eds.) |
|
| 111 |
|
Progress in Cryptology – INDOCRYPT 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings |
Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang (auth.), Goutam Paul, Serge Vaudenay (eds.) |
|
| 112 |
|
Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings |
Orr Dunkelman, Somitra Kumar Sanadhya (eds.) |
|
| 113 |
|
Progress in Cryptology – INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings |
Debrup Chakraborty, Tetsu Iwata |
|
| 114 |
|
Progress in Cryptology – INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings |
Feng Hao, Sushmita Ruj, Sourav Sen Gupta |
|
| 115 |
|
Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings |
Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran |
|
| 116 |
|
Progress in Cryptology – INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings (Security and Cryptology) |
Avishek Adhikari (editor), Ralf Küsters (editor), Bart Preneel (editor) |
|
| 117 |
|
Progress in Cryptology – INDOCRYPT 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11–14, 2022, Proceedings (Lecture Notes in Computer Science) |
Takanori Isobe (editor), Santanu Sarkar (editor) |
|
| 118 |
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers |
Rahul Johari, Neelima Gupta, Sandhya Aneja (auth.), Karan Singh, Amit K. Awasthi (eds.) |
|
| 119 |
|
Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings |
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (auth.), Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (eds.) |
|
| 120 |
|
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings |
Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko, Lei Shu (eds.) |
|
| 121 |
|
Securing India in the Cyber Era |
Sameer Patil |
|
| 122 |
|
Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science) |
Pantelimon Stănică (editor), Sihem Mesnager (editor), Sumit Kumar Debnath (editor) |
|
| 123 |
|
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers |
Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki |
|
| 124 |
|
Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings |
Sanjay Burman (auth.), Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (eds.) |
|
| 125 |
|
Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings |
Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) |
|
| 126 |
|
Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers |
Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero |
|
| 127 |
|
Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers ... in Computer and Information Science, 1208) |
Sabu M. Thampi (editor), Gregorio Martinez Perez (editor), Ryan Ko (editor), Danda B. Rawat (editor) |
|
| 128 |
|
Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (Communications in Computer and Information Science) |
Sabu M. Thampi (editor), Guojun Wang (editor), Danda B. Rawat (editor), Ryan Ko (editor), Chun-I Fan (editor) |
|
| 129 |
|
Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings |
Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.) |
|
| 130 |
|
Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings |
Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (eds.) |
|
| 131 |
|
Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings |
Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.) |
|
| 132 |
|
Security in Computing: 5th Edition |
Charles P. Pfleeger And Shari Lawrence Pfleeger |
5 |
| 133 |
|
Security Intelligence for Broadcast : Threat Analytics |
Sumit Chakraborty |
|
| 134 |
|
Security Intelligence for Broadcast: Algorithmic Complexity |
Sumit Chakraborty |
|
| 135 |
|
Security, Privacy, and Applied Cryptography Engineering. 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings |
Lejla Batina, Stjepan Picek, Mainack Mondal |
|
| 136 |
|
Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings (Security and Cryptology) |
Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor) |
|
| 137 |
|
Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings (Security and Cryptology) |
Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor) |
|
| 138 |
|
Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science) |
Francesco Regazzoni (editor), Bodhisatwa Mazumdar (editor), Sri Parameswaran (editor) |
|
| 139 |
|
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings |
Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont (eds.) |
|
| 140 |
|
Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings |
Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth (eds.) |
|
| 141 |
|
SIVA: Security Intelligence Verification Algorithm for Location based Services |
Sumit Chakraborty |
|
| 142 |
|
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I |
Amos Beimel, Stefan Dziembowski |
|
| 143 |
|
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II |
Amos Beimel, Stefan Dziembowski |
|
| 144 |
|
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings |
Tanja Ažderska (auth.), Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (eds.) |
|
| 145 |
|
Cyber Laundering: International Policies And Practices |
Nathalie Rebe |
|
| 146 |
|
Regulating Cyber Technologies: Privacy Vs Security |
Nathalie Rébé |
|
| 147 |
|
Innovations in Digital Forensics [Team-IRA] |
Suryadipta Majumdar (editor), Paria Shirani (editor), Lingyu Wang (editor) |
|
| 148 |
|
Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory |
Selda Calkavur, Alexis Bonnecaze, Romar Dela Cruz, Patrick Sole |
|
| 149 |
|
Internet of Everything: Key Technologies, Practical Applications and Security of IoT |
Hang Song |
|
| 150 |
|
Cryptography In The Information Society |
Ryabko, Boris, Fionov, Andrey, |
|
| 151 |
|
Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 |
Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor) |
|
| 152 |
|
Dynamically Enabled Cyber Defense |
Lin Yang, Quan Yu |
|
| 153 |
|
Data Analysis for Network Cyber-Security |
Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard |
|
| 154 |
|
Using Science in Cybersecurity |
Leigh Metcalf, Jonathan Spring |
|
| 155 |
|
Computer Viruses: A High-tech Disease [2nd ed.] |
Rolf Burger |
2 |
| 156 |
|
Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings [1st ed.] |
Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
1 |
| 157 |
|
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings |
Shlomi Dolev, Sachin Lodha |
|
| 158 |
|
The Kish Cypher:The Story of KLJN for Unconditional Security |
Laszlo B. Kish |
|
| 159 |
|
Cyberspace and Instability |
Robert Chesney (editor), James Shires (editor), Max Smeets (editor) |
|
| 160 |
|
The Political Mapping of Cyberspace |
Jeremy Crampton |
|
| 161 |
|
Integer Algorithms in Cryptology and Information Assurance |
Boris S Verkhovsky |
|
| 162 |
|
CyberForensics: Understanding Information Security Investigations |
Jennifer Bayuk (editor) |
|
| 163 |
|
Firewall Design and Analysis (Computer and Network Security) |
Alex X. Liu |
|
| 164 |
|
Mind Games |
Richard Thieme |
|
| 165 |
|
Biometrics: identity verification in a networked world [1st ed.] |
Samir Nanavati, Michael Thieme, Raj Nanavati |
1 |
| 166 |
|
Algorithms, architectures and information systems security |
Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy |
|
| 167 |
|
Security in Iot Social Networks [1° ed.] |
Fadi Al-turjman (editor), B. D. Deebak (editor) |
1 |
| 168 |
|
RIoT Control. Understanding and Managing Risks and the Internet of Things [1 ed.] |
Tyson Macaulay |
1 |
| 169 |
|
Computer and Information Security Handbook [3 ed.] |
John R. Vacca (Editor) |
3 |
| 170 |
|
Malware Diffusion Models for Modern Complex Networks: Theory and Applications |
Vasileios Karyotis, M.H.R. Khouzani |
|
| 171 |
|
Emerging trends in ICT security [1 ed.] |
Babak Akhgar, Hamid R. Arabnia (editors) |
1 |
| 172 |
|
Computer and Information Security Handbook [2 ed.] |
John R. Vacca (editor) |
2 |
| 173 |
|
Handbook on Securing Cyber-Physical Critical Infrastructure |
Sajal K. Das, Krishna Kant and Nan Zhang (Auth.) |
|
| 174 |
|
System Assurance: Beyond Detecting Vulnerabilities [1 ed.] |
Nikolai Mansourov, Djenana Campara |
1 |
| 175 |
|
Computer and information security handbook [1 ed.] |
John R. Vacca (editor) |
1 |
| 176 |
|
Disappearing Cryptography: Information Hiding: Steganography and Watermarking [3 ed.] |
Peter Wayner |
3 |
| 177 |
|
Digital watermarking and steganography [2nd ed] |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker |
2 |
| 178 |
|
Network security : know it all |
James B D Joshi, et al |
|
| 179 |
|
Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking) |
Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi |
|
| 180 |
|
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking) |
Jan L. Harrington |
|
| 181 |
|
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking) [1 ed.] |
John Strassner |
1 |
| 182 |
|
Digital Watermarking [1st ed.] |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller |
1 |
| 183 |
|
Virus: Detection and Elimination [Pap/Dskt ed.] |
Rune Skardhamar |
|
| 184 |
|
Security in Ad-hoc and Sensor Networks (Computer and Network Security) |
Raheem Beyah, Janise Mcnair, Cherita Corbett |
|
| 185 |
|
Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) |
Jeffrey Pawlick, Quanyan Zhu |
|
| 186 |
|
Cyber Security Applications for Industry 4.0 |
R Sujatha, G Prakash, Noor Zaman Jhanjhi |
|
| 187 |
|
AI-Based Metaheuristics for Information Security and Digital Media (Advances in Metaheuristics) [1 ed.] |
Apoorva S Shastri (editor), Mangal Singh (editor), Anand J. Kulkarni (editor), Patrick Siarry (editor) |
1 |
| 188 |
|
Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems) |
Bishwajeet Pandey, Shabeer Ahmad |
|
| 189 |
|
Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] |
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia |
1 |
| 190 |
|
Cyber Security Threats and Challenges Facing Human Life [1 ed.] |
Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) |
1 |
| 191 |
|
Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] |
Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) |
1 |
| 192 |
|
Introduction to Machine Learning with Applications in Information Security (Chapman & Hall/CRC Machine Learning & Pattern Recognition) [2 ed.] |
Mark Stamp |
2 |
| 193 |
|
Cybersecurity: A Practical Engineering Approach |
Henrique M. D. Santos |
|
| 194 |
|
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management |
Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh |
|
| 195 |
|
Phishing Detection Using Content-Based Image Classification |
Shekhar Khandelwal, Rik Das |
|
| 196 |
|
Security Analytics: A Data Centric Approach to Information Security [1 ed.] |
Mehak Khurana, Shilpa Mahajan |
1 |
| 197 |
|
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) |
Brent Chapman |
|
| 198 |
|
Zero Trust Security: An Enterprise Guide |
Jason Garbis, Jerry W. Chapman |
|
| 199 |
|
Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (Chapman & Hall/CRC Internet of Things) [1 ed.] |
Chinmay Chakraborty (editor), Sree Ranjani Rajendran (editor), Muhammad Habibur Rehman (editor) |
1 |
| 200 |
|
Cyberspace, Data Analytics, and Policing [1 ed.] |
David Skillicorn |
1 |
| 201 |
|
Cloud Security: Attacks, Techniques, Tools, and Challenges [1 ed.] |
Preeti Mishra, Emmanuel S Pilli, R C Joshi |
1 |
| 202 |
|
Protecting Your Privacy in a Data-Driven World |
Claire McKay Bowen |
|
| 203 |
|
Internet of Things and Secure Smart Environments: Successes and Pitfalls |
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan |
|
| 204 |
|
Security Risk Models for Cyber Insurance |
Caroline Baylon, Jose Vila, David Rios Insua |
|
| 205 |
|
Artificial intelligence safety and security [First edition.] |
Yampolskiy, Roman V. |
|
| 206 |
|
Emerging security algorithms and techniques [1st ed.] |
Ahmad, Khaleel, Doja, M. N., Singh, Manu, Udzir, Nur Izura |
1 |
| 207 |
|
Security for software engineers |
Helfrich, James N |
|
| 208 |
|
Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) |
Maymi, Fernando,Chapman, Brent,Parker, Jeff T |
|
| 209 |
|
The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart Cities |
Termanini, Rocky |
|
| 210 |
|
Data privacy: principles and practice |
Nataraj Venkataramanan, Ashwin Shriram |
|
| 211 |
|
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide |
Fernando Maymi, Brent Chapman |
|
| 212 |
|
Introduction to Machine Learning with Applications in Information Security [1 ed.] |
Mark Stamp |
1 |
| 213 |
|
Network performance and security : testing and analyzing using open source and low-cost tools [1 ed.] |
Chapman, Chris |
1 |
| 214 |
|
Managing Trust in Cyberspace |
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey |
|
| 215 |
|
Implementing Cisco IOS network security (IINS): (CCNA Security Exam 640-553) (Authorized self-study guide) |
Chapman, David W., Whitaker, Andrew, Paquet, Catherine |
|
| 216 |
|
Introduction to Network Security [Online-ausg ed.] |
Jacobson, Douglas |
|
| 217 |
|
Building Internet Firewalls: Internet and Web security [2nd ed] |
Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman |
2 |
| 218 |
|
Building Internet Firewalls |
D. Brent Chapman |
|
| 219 |
|
Privacy for Sale: How Big Brother and Others Are Selling Your Private Secrets for Profit [1 ed.] |
Michael E. Chesbro |
1 |
| 220 |
|
Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition [2 ed.] |
James E Fitzpatrick, Joseph G Morelli |
2 |
| 221 |
|
Fighting Terror in Cyberspace |
Mark Last, Abraham Kandel |
|
| 222 |
|
Cyber Infrastructure for the Smart Electric Grid |
Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser |
|
| 223 |
|
Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security [1 ed.] |
Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot |
1 |
| 224 |
|
Security and Privacy Vision in 6G: A Comprehensive Guide [Team-IRA] [1 ed.] |
Pawani Porambage, Madhusanka Liyanage |
1 |
| 225 |
|
Cybersecurity in Intelligent Networking Systems (IEEE Press) [1 ed.] |
Shengjie Xu, Yi Qian, Rose Qingyang Hu |
1 |
| 226 |
|
Deep Learning Approaches for Security Threats in IoT Environments |
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash |
|
| 227 |
|
Game Theory and Machine Learning for Cyber Security [1 ed.] |
Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) |
1 |
| 228 |
|
Intelligent Security Systems. How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security |
Leon Reznik |
|
| 229 |
|
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program [1 ed.] |
John Jackson |
1 |
| 230 |
|
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity |
Dan Shoemaker, Anne Kohnke, Ken Sigler |
|
| 231 |
|
Assured cloud computing [First edition] |
Campbell, Roy Harold, Kamhoua, Charles A., Kwiat, Kevin A |
|
| 232 |
|
DNS security management |
Michael Dooley: Timothy Rooney |
|
| 233 |
|
Artificial Immune System: Applications in Computer Security [1 ed.] |
Ying Tan |
1 |
| 234 |
|
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures |
Houmansadr, Amir, Mazurczyk, Wojciech, Szczypiorski, Krzysztof, Wendzel, Steffen, Zander, Sebastian |
|
| 235 |
|
Secure Messaging on the Internet |
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Avrum Goldberg, Matthew Smith |
|
| 236 |
|
Vehicular Ad Hoc Network Security and Privacy [1 ed.] |
Xiaodong Lin, Rongxing Lu |
1 |
| 237 |
|
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [2nd ed] |
Jacobs, Stuart |
2 |
| 238 |
|
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [1 ed.] |
Stuart Jacobs |
1 |
| 239 |
|
Network Security: Current Status and Future Directions |
|
|
| 240 |
|
Electronic watermarking the first 50 years |
Cox Miller |
|
| 241 |
|
Practical Cryptography for Internetworks [1 ed.] |
William Stallings |
1 |
| 242 |
|
Information security : an integrated collection of essays [[2. Dr.] ed.] |
Marshall D. Abrams (editor),Sushil Jajodia (editor), Harold J. Podell (editor) |
2 |
| 243 |
|
Stealing the Network: How to Own an Identity |
Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Timothy Mullen |
|
| 244 |
|
Information security management handbook [7, 6 ed.] |
Richard O'Hanley, James S. Tiller (editor) |
6 |
| 245 |
|
Weaponizing Cyberspace |
Nicholas Michael Sambaluk |
|
| 246 |
|
Cyber Warfare |
Rosenzweig, Paul |
|
| 247 |
|
Mobile and Wireless Networks Security |
Maryline Laurent-Maknavickius, Hakima Chaouchi |
|
| 248 |
|
Ethical hacking and countermeasures. Book 4 of 4, Secure network operating systems and infrastructures [2nd edition] |
EC-Council Press,, International Council of E-Commerce Consultants |
2 |
| 249 |
|
Hands-On Ethical Hacking and Network Defense (MindTap Course List) [4 ed.] |
Rob Wilson |
4 |
| 250 |
|
Principles of Information Security [7 ed.] |
Michael E. Whitman, Herbert J. Mattord |
7 |
| 251 |
|
Comptia Security+ Guide to Network Security Fundamentals [7 ed.] |
Mark Ciampa |
7 |
| 252 |
|
Principles of Incident Response & Disaster Recovery (MindTap Course List) [3 ed.] |
Michael E. Whitman, Herbert J. Mattord |
3 |
| 253 |
|
Guide to Firewalls and VPNs [3rd ed.] |
Michael E. Whitman, Herbert J. Mattord, Andrew Green |
3 |
| 254 |
|
Management of Information Security [6 ed.] |
Michael E. Whitman, Herbert J. Mattord |
6 |
| 255 |
|
Principles of Information Security [6 ed.] |
Whitman, Michael, Mattord, Herbert |
6 |
| 256 |
|
Hands-On Ethical Hacking and Network Defense [Third ed.] |
Michael T. Simpson, Nicholas Antill |
|
| 257 |
|
Guide to computer forensics and investigations : processing digital evidence [Fifth edition] |
Nelson, Bill, Phillips, Amelia, Steuart, Christopher |
|
| 258 |
|
Principles of Information Security [5 ed.] |
Michael E. Whitman, Herbert J. Mattord |
5 |
| 259 |
|
Management of Information Security [5 ed.] |
Michael E. Whitman, Herbert J. Mattord |
5 |
| 260 |
|
CompTIA Security+ Guide to Network Security Fundamentals [5th ed.] |
Mark Ciampa |
5 |
| 261 |
|
Guide to Network Defense and Countermeasures [3 ed.] |
Randy Weaver, Dawn Weaver, Dean Farwood |
3 |
| 262 |
|
Hands-On Ethical Hacking and Network Defense [1 ed.] |
Backman, Kent, Corley, James E., Simpson, Michael T |
1 |
| 263 |
|
Management of Information Security [4 ed.] |
Michael E. Whitman, Herbert J. Mattord |
4 |
| 264 |
|
Guide to Network Security [1st ed.] |
Michael E. Whitman et al. |
1 |
| 265 |
|
EIS: Inspection Testing and Commissioning [Applied Mathematics] |
Malcolm Doughton, John Hooper |
|
| 266 |
|
Readings and cases in information security : law and ethics |
Michael E Whitman, Herbert J Mattord |
|
| 267 |
|
Guide to Computer Forensics and Investigations |
Bill Nelson, Amelia Phillips, Christopher Steuart |
3 |
| 268 |
|
CISSP Guide to Security Essentials |
P. Gregory |
|
| 269 |
|
Access controlled: the shaping of power, rights, and rule in cyberspace [1 ed.] |
Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti |
1 |
| 270 |
|
Computer forensics: investigating wireless networks and devices |
EC-Council Press |
|
| 271 |
|
Computer Evidence: Collection And Preservation [2nd Edition] |
Christopher LT Brown |
2 |
| 272 |
|
Security awareness: applying practical security in your world [3. ed] |
Ciampa, Mark D |
3 |
| 273 |
|
Computer Forensics: Investigating Network Intrusions and Cybercrime [1 ed.] |
EC-Council |
1 |
| 274 |
|
Security+ Guide to Network Security Fundamentals |
Mark D Ciampa |
3 |
| 275 |
|
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms [1 ed.] |
EC-Council |
1 |
| 276 |
|
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems [1 ed.] |
EC-Council |
1 |
| 277 |
|
Secure Network Infrastructures |
EC-Council |
1 |
| 278 |
|
Web 2.0 Security: defending Ajax, Ria, and Soa [1 ed.] |
Shreeraj (Shreeraj Shah) Shah |
1 |
| 279 |
|
A Practical Guide to Managing Information Security (Artech House Technology Management Library) [illustrated edition] |
Steve Purser |
|
| 280 |
|
Access Contested: Security, Identity, and Resistance in Asian Cyberspace |
Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain |
|
| 281 |
|
An Information Security Handbook [1 ed.] |
John M. D. Hunter BA (Hons), FBCS, CEng (auth.) |
1 |
| 282 |
|
Borders in Cyberspace: Information Policy and the Global Information Infrastructure [1 ed.] |
Brian Kahin, Charles R. Nesson |
1 |
| 283 |
|
Computer and intrusion forensics |
George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rodney McKemmish |
|
| 284 |
|
Contemporary Cryptography |
Rolf Oppliger |
|
| 285 |
|
Coordinating the Internet |
edited by Brian Kahin and James H. Keller. |
|
| 286 |
|
Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks |
Josephine Wolff |
|
| 287 |
|
Cybersecurity [1 ed.] |
Duane C. Wilson |
1 |
| 288 |
|
International Relations in the Cyber Age: The Co-Evolution Dilemma |
Nazli Choucri, David D. Clark |
|
| 289 |
|
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings [v. 22, 1 ed.] |
Steve Barker (auth.), Vijay Atluri (eds.) |
1 |
| 290 |
|
Data Security Breaches and Privacy in Europe [1 ed.] |
Rebecca Wong (auth.) |
1 |
| 291 |
|
EC2ND 2005: Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK [1 ed.] |
Liwen He, Nikolai Bode (auth.), Andrew Blyth BSc, MSc, PhD (eds.) |
1 |
| 292 |
|
EC2ND 2006: Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK [1 ed.] |
Andrew Blyth BSc, MSc, PhD, Iain Sutherland BSc, MSc, PhD (auth.) |
1 |
| 293 |
|
End-to-End Encrypted Messaging |
Rolf Oppliger |
|
| 294 |
|
Governing Global Electronic Networks: International Perspectives on Policy and Power |
William J. Drake, Ernest J. Wilson III |
|
| 295 |
|
Hacker States [First Edition] |
Follis, Luca, Fish, Adam,, Adam Fish |
|
| 296 |
|
High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace |
Peter Ludlow, Loyd Blankenship |
|
| 297 |
|
Implementing the ISO / IEC 27001 ISMS Standard [2 ed.] |
Edward Humphreys |
2 |
| 298 |
|
Information Assurance: Security in the Information Environment [2 ed.] |
Andrew Blyth BSc, MSc, PhD, Gerald L. Kovacich MA, MSc, D.Crim (auth.) |
2 |
| 299 |
|
Introduction to Identity-Based Encryption (Information Security and Privacy Series) [1 ed.] |
Luther Martin |
1 |
| 300 |
|
Lifecycle IoT Security for Engineers |
Kaustubh Dhondge |
|
| 301 |
|
Medical Device Cybersecurity for Engineers and Manufacturers |
Axel Wirth, Christopher Gates, Jason Smith |
|
| 302 |
|
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) |
Michael Roytman and Ed Bellis |
|
| 303 |
|
Multicast and Group Security (Artech House Computer Security Series) |
Thomas Hardjono, Lakshminath R. Dondeti, |
|
| 304 |
|
Networks and states: the global politics of Internet governance [First MIT Pbk. ed] |
Mueller, Milton |
|
| 305 |
|
New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) |
Howard Shrobe, David L. Shrier, Alex Pentland |
|
| 306 |
|
Outsourcing Information Security |
C. Warren Axelrod |
|
| 307 |
|
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems [1 ed.] |
Javier Herranz, Jordi Nin (auth.), Jordi Nin, Javier Herranz (eds.) |
1 |
| 308 |
|
Computer Forensics and Privacy |
Michael A. Caloyannides |
2 |
| 309 |
|
Privacy vs. Security [1 ed.] |
Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan (auth.) |
1 |
| 310 |
|
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues [1 ed.] |
Sanjib Sinha |
1 |
| 311 |
|
Researching Internet Governance: Methods, Frameworks, Futures [1 ed.] |
Laura DeNardis, Derrick Cogburn, Nanette S. Levinson, Francesca Musiani |
1 |
| 312 |
|
Resistance To The Current: The Dialectics Of Hacking [1 ed.] |
Johan Söderberg, Maxigas |
1 |
| 313 |
|
Ruling the root: Internet governance and the taming of cyberspace |
Mueller, Milton |
|
| 314 |
|
Secure Data Networking |
Michael Purser |
|
| 315 |
|
Secure Information Management Using Linguistic Threshold Approach [1 ed.] |
Marek R. Ogiela, Urszula Ogiela (auth.) |
1 |
| 316 |
|
Secure Messaging On The Internet |
Rolf Oppliger |
|
| 317 |
|
Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers [1 ed.] |
Zhiyun Qian, Z. Morley Mao, Ammar Rayes, David Jaffe (auth.), Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis (eds.) |
1 |
| 318 |
|
Security for mobile networks and platforms |
Selim Aissi, Nora Dabbous, Anand R. Prasad |
|
| 319 |
|
Smart Grid Security [1 ed.] |
Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou, Dariusz Kloza (auth.) |
1 |
| 320 |
|
Social Engineering: How Crowdmasters, Phreaks, Hackers, And Trolls Created A New Form Of Manipulative Communication [1 ed.] |
Robert W. Gehl, Sean T Lawson |
1 |
| 321 |
|
CEHV8 - Module 03 - Labs Scanning Networks.pdf |
|
|
| 322 |
|
CEHv8 Module 03 Scanning Networks.pdf |
|
|
| 323 |
|
SSL and TLS: Theory and Practice (Information Security and Privacy) |
Rolf Oppliger |
|
| 324 |
|
SSL and TLS: Theory and Practice [2 ed.] |
Rolf Oppliger |
2 |
| 325 |
|
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf |
|
|
| 326 |
|
Cisco ASA Firewall Fundamentals, 3rd Edition |
Harris Andrea |
|
| 327 |
|
Fundamentals of Network Security |
John E. Canavan |
|
| 328 |
|
The New Hacker's Dictionary - 3rd Edition [3 ed.] |
Eric S. Raymond |
3 |
| 329 |
|
Co-ordinated Port Scans |
|
|
| 330 |
|
The official PGP user's guide |
Zimmermann, Philip R. |
|
| 331 |
|
Tor Darknet series: Master the Art of Invisibility |
Lance Henderson |
|
| 332 |
|
The secure information society: ethical, legal and political challenges [1 ed.] |
Chris Bronk (auth.), Jörg Krüger, Bertram Nickolay, Sandro Gaycken (eds.) |
1 |
| 333 |
|
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing |
Arun Vishwanath |
|
| 334 |
|
Critical Infrastructures State of the Art in Research and Application [1 ed.] |
P. M. Herder, W. A. H. Thissen (auth.), W. A. H. Thissen, P. M. Herder (eds.) |
1 |
| 335 |
|
We, the Data : Human Rights in the Digital Age |
Wendy H. Wong |
|
| 336 |
|
Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P |
Robert W. Gehl |
|
| 337 |
|
You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy) |
Josephine Wolff, Sandra Braman, Paul T. Jaeger |
|
| 338 |
|
Your Computer Is on Fire |
Thomas S. Mullaney, Benjamin Peters, Mar Hicks, Kavita Philip |
|
| 339 |
|
CEHV8 - Module 03 - Scanning Networks.pdf |
|
|
| 340 |
|
Ethical Hacking and Countermeasures: Secure Network Infrastructures |
EC-Council |
|
| 341 |
|
Privacy, Regulations, And Cybersecurity: The Essential Business Guide [1st Edition] |
Chris Moschovitis |
1 |
| 342 |
|
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit |
Sagar Rahalkar |
|
| 343 |
|
Rtfm: Red Team Field Manual |
Ben Clark |
|
| 344 |
|
Scanning Applications 2.0 Next generation scan, attacks and tools |
|
|
| 345 |
|
Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide |
|
|
| 346 |
|
SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention |
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Xun Yi |
|
| 347 |
|
Secure connected objects |
Huon, Jean-Paul, Paret, Dominique |
|
| 348 |
|
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition [3 ed.] |
David R. Miller, Michael Gregg |
3 |
| 349 |
|
Security engineering: a guide to building dependable distributed systems |
Ross J. Anderson |
2 |
| 350 |
|
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges |
Qing Li, Gregory Clark |
|
| 351 |
|
Applied Incident Response [1 ed.] |
Steve Anson |
1 |
| 352 |
|
Beyond cybersecurity: protecting your digital business |
Kaplan, James M,Bailey, Tucker,O'Halloran, Derek,Marcus, Alan J |
|
| 353 |
|
Carry On: Sound Advice from Schneier on Security |
Schneier, Bruce |
|
| 354 |
|
CEH Certified Ethical Hacker Study Guide |
Graves, Kimberly |
|
| 355 |
|
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions |
Ric Messier |
|
| 356 |
|
CEHv8: Certified Ethical Hacker Version 8 Study Guide |
Oriyano, Sean-Philip |
|
| 357 |
|
Cehv9: Certified Ethical Hacker Version 9 [3rd ed] |
Oriyano, Sean-Philip |
3 |
| 358 |
|
CISSP for Dummies [6th edition] |
Gregory, Peter H.,Miller, Lawrence C |
6 |
| 359 |
|
CISSP official (ISC)² practice tests |
Chapple, Mike,Seidl, David |
|
| 360 |
|
CISSP Official (ISC)2 Practice Tests |
Mike Chapple, David Seidl |
2 |
| 361 |
|
CISSP: Certified Information Systems Security Professional Study Guide [5th ed.] |
James M. Stewart, Ed Tittel, Mike Chapple |
5 |
| 362 |
|
Communications and Information Infrastructure Security |
John G. Voeller |
1 |
| 363 |
|
CompTIA CySA+ Study Guide: Exam CS0-001 |
Mike Chapple, David Seidl |
|
| 364 |
|
CompTIA Security+ Deluxe Study Guide [1st edition] |
Dulaney, Emmett |
1 |
| 365 |
|
CompTIA Security+ Review Guide: Sy0-201 |
Stewart, James M. |
|
| 366 |
|
Computer Fraud Casebook: The Bytes That Bite [1. ed.] |
Joseph T. Wells (editor) |
1 |
| 367 |
|
Computer Security Handbook [1, Sixth edition] |
Seymour Bosworth, Michel E. Kabay, Eric Whyne |
1 |
| 368 |
|
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk [1. ed.] |
Andrew Gorecki |
1 |
| 369 |
|
Cyber Security |
Voeller, John G. |
|
| 370 |
|
Cyber Security Policy Guidebook |
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt |
|
| 371 |
|
Cyber smart: five habits to protect your family, money, and identity from cyber criminals |
McDonough, Bart R |
|
| 372 |
|
Cyber-risk informatics: engineering evaluation with data science |
Sahinoglu, Mehmet |
|
| 373 |
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting |
Gregory C. Rasner |
|
| 374 |
|
Cybersecurity In Humanities And Social Sciences: A Research Methods Approach [1, 1st Edition] |
Hugo Loiseau, Daniel Ventre, Hartmut Aden |
1 |
| 375 |
|
Cybersecurity in Our Digital Lives |
Mowbray, Thomas J, LeClair, Jane |
|
| 376 |
|
Cybersecurity of Industrial Systems |
Jean-Marie Flaus |
|
| 377 |
|
Cybersecurity Program Development for Business: The Essential Planning Guide [1 ed.] |
Moschovitis, Christos J. P |
1 |
| 378 |
|
Data Security For Dummies®, Immuta Special Edition [1 ed.] |
Steve Kaelble |
1 |
| 379 |
|
Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States |
Matthew Webster |
|
| 380 |
|
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing |
Roger A. Grimes, Dr. John N. Just |
|
| 381 |
|
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming [1. ed.] |
Matthew Hickey |
1 |
| 382 |
|
Industrial Cyber Security for Dummies. |
David Meltzer and Jeff Lund |
|
| 383 |
|
Information security governance: a practical development and implementation approach |
Brotby, W. Krag |
|
| 384 |
|
Information Security: Principles and Practice |
Mark Stamp |
2 |
| 385 |
|
Access Control Systems: Security, Identity Management and Trust Models [1 ed.] |
Dr. Messaoud Benantar (auth.) |
1 |
| 386 |
|
Network Attacks and Exploitation: A Framework |
Matthew Monte |
|
| 387 |
|
Network Forensics |
John Wiley and Sons,Messier, Ric |
|
| 388 |
|
Next-Generation Firewalls For Dummies [2 ed.] |
Lawrence Miller |
2 |
| 389 |
|
Phishing dark waters the offensive and defensive sides of malicious e-mails |
Dreeke, Robin,Fincher, Michele,Hadnagy, Christopher |
|
| 390 |
|
Privacy Means Profit: Prevent identity theft and secure you and your bottom line [1 ed.] |
John D. Sileo |
1 |
| 391 |
|
Schneier on Security |
Schneier, Bruce |
|
| 392 |
|
Secrets and Lies: Digital Security in a Networked World [15th Anniversary Edition] |
Schneier, Bruce |
15 |
| 393 |
|
Security 2020: reduce security risks this decade |
Schneier, Bruce, Howard, Doug, Prince, Kevin &, Kevin Prince |
|
| 394 |
|
Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack |
Wallace, Matthew,Ottenheimer, Davi |
|
| 395 |
|
Security and privacy in the digital era Volume 1 |
Guerrier, Claudine |
|
| 396 |
|
Security designs for the cloud, IoT, and social networking [First edition] |
Bhatt, Chintan M., Le, Dac-Nhuong, Madhukar, Mani |
|
| 397 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems [3° ed.] |
Ross Anderson |
3 |
| 398 |
|
Security Fundamentals |
Crystal Panek |
|
| 399 |
|
Security Technologies and Social Implications |
Markarian, Garik,Karlovic, Ruza,Nitsch, Holger,Chandramouli, Krishna,, Ru?a Karlovi?, Holger Nitsch, Krishna Chandramouli |
|
| 400 |
|
Security, privacy and digital forensics in the cloud |
Chen, Lei, Le-Khac, Nhien-An, Takabi, Hassan |
|
| 401 |
|
Social Engineering |
Christopher Hadnagy |
|
| 402 |
|
Social Engineering The Science of Human Hacking [2nd Edition] |
Christopher Hadnagy |
2 |
| 403 |
|
Social engineering: the art of human hacking |
Hadnagy, Christopher, Wilson, Paul |
|
| 404 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers |
Simon, William L., Mitnick, Kevin D. |
|
| 405 |
|
The death of the internet |
Markus Jakobsson |
|
| 406 |
|
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity |
Phil Quade |
|
| 407 |
|
The Official (ISC)2 Guide to the SSCP CBK |
Gordon, Adam,Hernandez, Steven |
4 |
| 408 |
|
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer |
Perry Carpenter, Kai Roer |
|
| 409 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors [1. ed.] |
Perry Carpenter |
1 |
| 410 |
|
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity [1. ed.] |
Marcus J. Carey, Jennifer Jin |
1 |
| 411 |
|
Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity Leadership [1st Edition] |
Marcus J. Carey, Jennifer Jin |
1 |
| 412 |
|
Tribe Of Hackers: Cybersecurity Advice From The Best Hackers In The World |
Marcus J. Carey, Jennifer Jin |
|
| 413 |
|
Vulnerability management for dummies |
Qualys |
|
| 414 |
|
We Have Root: Even More Advice From Schneier On Security [1st Edition] |
Bruce Schneier |
1 |
| 415 |
|
WHOIS running the Internet : protocol, policy, and privacy [1 ed.] |
Garth O. Bruen |
1 |
| 416 |
|
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework |
Bullock, Jessey,Kadijk, Jan |
|
| 417 |
|
Advances in Information Security Management & Small Systems Security [1 ed.] |
Les Labuschagne (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon (eds.) |
1 |
| 418 |
|
Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium [1 ed.] |
Hideki Sakurada, Yasuyuki Tsukada (auth.), Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen (eds.) |
1 |
| 419 |
|
Disseminating Security Updates at Internet Scale |
Jun Li, Peter Reiher, Gerald J. Popek (auth.) |
1 |
| 420 |
|
Critical Information Infrastructures: Resilience and Protection [1 ed.] |
Director Maitland Hyslop (auth.) |
1 |
| 421 |
|
Critical Infrastructure Protection [1 ed.] |
Neil Robinson, Lorenzo Valeri (auth.), Associate Director Eric Goetz, Professor Sujeet Shenoi (eds.) |
1 |
| 422 |
|
Critical Infrastructure Protection II [1 ed.] |
Scott Dynes (auth.), Mauricio Papa, Sujeet Shenoi (eds.) |
1 |
| 423 |
|
Cyber Situational Awareness: Issues and Research [1 ed.] |
Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) |
1 |
| 424 |
|
Data and Application Security: Developments and Directions [1 ed.] |
Gio Wiederhold (auth.), Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari (eds.) |
1 |
| 425 |
|
Data Warehousing and Data Mining Techniques for Cyber Security [1 ed.] |
Anoop Singhal (auth.) |
1 |
| 426 |
|
Economics of information security and privacy [1 ed.] |
Tyler Moore, David Pym, Christos Ioannidis (auth.), Tyler Moore, David Pym, Christos Ioannidis (eds.) |
1 |
| 427 |
|
Electronic Healthcare Information Security [1 ed.] |
Professor Charles A. Shoniregun, Dr. Kudakwashe Dube, Dr. Fredrick Mtenzi (auth.) |
1 |
| 428 |
|
Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA [1 ed.] |
Colin J. Armstrong (auth.), Lynn Futcher, Ronald Dodge (eds.) |
1 |
| 429 |
|
Global Initiatives to Secure Cyberspace: An Emerging Landscape [1 ed.] |
Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) |
1 |
| 430 |
|
Hop Integrity in the Internet [1 ed.] |
Prof. Chin-Tser Huang, Dr. Mohamed G. Gouda (auth.) |
1 |
| 431 |
|
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES) [1 ed.] |
Charles A. Shoniregun (auth.) |
1 |
| 432 |
|
Information Security -the Next Decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95 |
Jan H. P. Eloff, Sebastiaan H. von Solms (eds.) |
|
| 433 |
|
Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China [1 ed.] |
Kai Rannenberg (auth.), Sihan Qing, Jan H. P. Eloff (eds.) |
1 |
| 434 |
|
Information Security Governance [1 ed.] |
S.H. Solms, Rossouw Solms (auth.) |
1 |
| 435 |
|
Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark [1 ed.] |
A. K. Stanley (auth.), Louise Yngström, Jan Carlsen (eds.) |
1 |
| 436 |
|
Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands [1 ed.] |
Rüdiger Weis (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren (eds.) |
1 |
| 437 |
|
Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France |
Johan Van Niekerk, Rossouw Von Solms (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) |
1 |
| 438 |
|
Information Systems Security: Facing the information society of the 21st century |
Sokratis K. Katsikas, Dimitris Gritzalis (eds.) |
|
| 439 |
|
Insider Threats in Cyber Security [1 ed.] |
Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) |
1 |
| 440 |
|
Intelligence and Security Informatics for International Security: Information Sharing and Data Mining [1 ed.] |
Hsinchun Chen Ph.D. (auth.) |
1 |
| 441 |
|
Malware Detection [1 ed.] |
Brian Witten, Carey Nachenberg (auth.), Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (eds.) |
1 |
| 442 |
|
Managing Information Risk and the Economics of Security [1 ed.] |
M. Eric Johnson (auth.), M. Eric Johnson (eds.) |
1 |
| 443 |
|
Network Infrastructure Security [1 ed.] |
Alan Yeung, Angus Wong (auth.) |
1 |
| 444 |
|
Network Intrusion Detection and Prevention: Concepts and Techniques [1 ed.] |
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee (auth.) |
1 |
| 445 |
|
Network Security [1 ed.] |
Carlo Blundo, Stelvio Cimato, Barbara Masucci (auth.), Scott C.-H. Huang, David MacCallum, Ding-Zhu Du (eds.) |
1 |
| 446 |
|
Network Security Policies and Procedures [1 ed.] |
Douglas W. Frye (auth.) |
1 |
| 447 |
|
Network-Aware Security for Group Communications [1 ed.] |
Yan Sun, Wade Trappe, K. J. R. Liu (auth.) |
1 |
| 448 |
|
Networking Security and Standards [1 ed.] |
Weidong Kou (auth.) |
1 |
| 449 |
|
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa [1 ed.] |
John Haggerty, Mark Taylor (auth.), Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms (eds.) |
1 |
| 450 |
|
Online Business Security Systems [1 ed.] |
Godfried B. Williams (auth.) |
1 |
| 451 |
|
Open Source Software for Digital Forensics [1 ed.] |
Stefano Zanero, Ewa Huebner (auth.), Ewa Huebner, Stefano Zanero (eds.) |
1 |
| 452 |
|
Practical Internet Security [1 ed.] |
John R. Vacca (auth.) |
1 |
| 453 |
|
Preserving Privacy in Data Outsourcing [1 ed.] |
Sara Foresti (auth.) |
1 |
| 454 |
|
Preserving Privacy in On-Line Analytical Processing (OLAP) [1 ed.] |
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (auth.) |
1 |
| 455 |
|
Principles of Data Security [1 ed.] |
Ernst L. Leiss (auth.) |
1 |
| 456 |
|
Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy [1 ed.] |
Karsten Nohl, David Evans (auth.), Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (eds.) |
1 |
| 457 |
|
Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain |
Lawrence H. Cox (auth.), Csilla Farkas, Pierangela Samarati (eds.) |
1 |
| 458 |
|
Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |
András Belokosztolszki, David Eyers (auth.), Ehud Gudes, Sujeet Shenoi (eds.) |
1 |
| 459 |
|
Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden [1 ed.] |
Inger Anne Tøndel (auth.), Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog (eds.) |
1 |
| 460 |
|
Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece [1 ed.] |
Brian Toone, Michael Gertz, Premkumar Devanbu (auth.), Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas (eds.) |
1 |
| 461 |
|
Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France |
Mohamed Hamdi, Noureddine Boudriga (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) |
1 |
| 462 |
|
Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA |
Dorothy E. Denning (auth.), Cynthia Irvine, Helen Armstrong (eds.) |
1 |
| 463 |
|
Security of Data and Transaction Processing [1 ed.] |
Vijay Atluri, Pierangela Samarati (auth.), Vijay Atluri, Pierangela Samarati (eds.) |
1 |
| 464 |
|
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security [1 ed.] |
Edna Reid, Dr. Hsinchun Chen (auth.), Dr. Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor (eds.) |
1 |
| 465 |
|
Vulnerability Analysis and Defense for the Internet [1 ed.] |
Abhishek Singh, Baibhav Singh, Hirosh Joseph (auth.), Abhishek Singh, Baibhav Singh, Hirosh Joseph (eds.) |
1 |
| 466 |
|
Wireless Network Security [1 ed.] |
Jonathan Lutz, M. Anwarul Hasan (auth.), Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du (eds.) |
1 |
| 467 |
|
The Information Security Dictionary Defining The Terms That Define Security For E-Business, Internet, Information And Wireless Technology |
Urs E. Gattiker |
|
| 468 |
|
Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA |
Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray |
|
| 469 |
|
Striking Back: The End of Peace in Cyberspace - And How to Restore It [1 ed.] |
Lucas Kello |
1 |
| 470 |
|
Listening In: Cybersecurity in an Insecure Age |
Susan Landau |
|
| 471 |
|
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices [1 ed.] |
William Stallings |
1 |
| 472 |
|
Database and Application Security: A Practitioner's Guide [1 ed.] |
R. Sarma Danturthi |
1 |
| 473 |
|
Network Security: PRIVATE Communication in a PUBLIC World, Third Edition |
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner |
|
| 474 |
|
Ransomware and Cyber Extortion: Response and Prevention [1 ed.] |
Sherri Davidoff, Matt Durrin, Karen Sprenger |
1 |
| 475 |
|
Securing 5G and Evolving Architectures [1 ed.] |
Pramod Nair |
1 |
| 476 |
|
Modern Security Operations Center, The [1 ed.] |
Joseph Muniz |
1 |
| 477 |
|
Data Breaches: Crisis and Opportunity [1 ed.] |
Sherri Davidoff |
1 |
| 478 |
|
Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services [1 ed.] |
Silvano Gai |
1 |
| 479 |
|
Computer Security [Art and Science] [2nd ed.] |
Matthew Bishop |
2 |
| 480 |
|
Effective Cybersecurity: A Guide to Using Best Practices and Standards [1 ed.] |
William Stallings |
1 |
| 481 |
|
Cyber Security Engineering A Practical Approach for Systems and Software Assurance |
Carol Woody, Nancy R. Mead |
|
| 482 |
|
Extrusion detection: security monitoring for internal intrusions |
Bejtlich, Richard |
|
| 483 |
|
Troubleshooting Linux Firewalls |
Michael Shinn, Scott Shinn |
|
| 484 |
|
The Executive Guide to Information Security: Threats, Challenges, and Solutions [1 ed.] |
Mark Egan, Tim Mather |
1 |
| 485 |
|
Firewalls and Internet Security: Repelling the Wily Hacker [2 ed.] |
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
2 |
| 486 |
|
Managing information security risks: the OCTAVE approach |
Christopher Alberts, Audrey Dorofee |
|
| 487 |
|
Inside Internet Security: What Hackers Don't Want You To Know [1 ed.] |
Jeff Crume |
1 |
| 488 |
|
Linux Firewalls: Enhancing Security with nftables and Beyond [4th ed.] |
Steve Suehring |
4 |
| 489 |
|
SSL and TLS: Designing and Building Secure Systems |
Eric Rescorla |
|
| 490 |
|
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn Step by Step How to Professionally Code and Protect Your Data. This Book Includes: Python, Java, C ++ and Cybersecurity |
Grid, Alan |
|
| 491 |
|
Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe |
Shira Rubinoff |
|
| 492 |
|
CompTIA CySA+ Practice Exams |
Dion, Jason |
|
| 493 |
|
Next Generation Red Teaming |
Henry Dalziel |
|
| 494 |
|
Build Your Own Cybersecurity Testing Lab |
Ric Messier |
|
| 495 |
|
Agile Application Security |
Laura Bell |
|
| 496 |
|
Developing Cybersecurity Programs and Policies, Third Edition (Christopher Mandelaris' Library) |
Omar Santos |
3 |
| 497 |
|
Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative |
|
|
| 498 |
|
Computer Networking First-Step: An introductory guide to understanding wireless and cloud technology, basic communications services and network security for beginners |
Laurence, Norman |
|
| 499 |
|
Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and |
Cody, Isaac D |
|
| 500 |
|
Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to Hack Websites, Smartphones, Wireless Networks) + Linux Basic for Hackers (Command line and all the essentials) + Hacking with Kali Linux |
Julian James McKinnon |
|
| 501 |
|
Penetration Testing For Dummies |
Robert Shimonski |
|
| 502 |
|
The Pocket Guide to Cyber Security |
James H &, Usha D |
|
| 503 |
|
HAZ CLIC AQUÍ PARA MATARLOS A TODOS |
Bruce Schneier |
|
| 504 |
|
Basic Security Testing with Kali Linux |
Dieterle, Daniel |
|
| 505 |
|
CEH - Ethical Hacking and Countermeasures v11 (CEH11) |
EC-Council |
|
| 506 |
|
CEH v11 - Appendix A |
F3thinker ! |
|
| 507 |
|
CEH v11 - Appendix B |
F3thinker ! |
|
| 508 |
|
CEH v11 - Module 1 |
F3thinker ! |
|
| 509 |
|
CEH v11 - Module 10 |
F3thinker ! |
|
| 510 |
|
CEH v11 - Module 11 |
F3thinker ! |
|
| 511 |
|
CEH v11 - Module 12 |
F3thinker ! |
|
| 512 |
|
CEH v11 - Module 13 |
F3thinker ! |
|
| 513 |
|
CEH v11 - Module 14 |
F3thinker ! |
|
| 514 |
|
CEH v11 - Module 15 |
F3thinker ! |
|
| 515 |
|
CEH v11 - Module 16 |
F3thinker ! |
|
| 516 |
|
CEH v11 - Module 17 |
F3thinker ! |
|
| 517 |
|
CEH v11 - Module 18 |
F3thinker ! |
|
| 518 |
|
CEH v11 - Module 19 |
F3thinker ! |
|
| 519 |
|
CEH v11 - Module 2 |
F3thinker ! |
|
| 520 |
|
CEH v11 - Module 20 |
F3thinker ! |
|
| 521 |
|
CEH v11 - Module 3 |
F3thinker ! |
|
| 522 |
|
CEH v11 - Module 4 |
F3thinker ! |
|
| 523 |
|
CEH v11 - Module 5 |
F3thinker ! |
|
| 524 |
|
CEH v11 - Module 6 |
F3thinker ! |
|
| 525 |
|
CEH v11 - Module 7 |
F3thinker ! |
|
| 526 |
|
CEH v11 - Module 8 |
F3thinker ! |
|
| 527 |
|
CEH v11 - Module 9 |
F3thinker ! |
|
| 528 |
|
CND - Exam 312-38 - Module 0 |
F3thinker ! |
|
| 529 |
|
CND - Exam 312-38 - Module 1 |
F3thinker ! |
|
| 530 |
|
CND - Exam 312-38 - Module 10 |
F3thinker ! |
|
| 531 |
|
CND - Exam 312-38 - Module 11 |
F3thinker ! |
|
| 532 |
|
CND - Exam 312-38 - Module 12 |
F3thinker ! |
|
| 533 |
|
CND - Exam 312-38 - Module 13 |
F3thinker ! |
|
| 534 |
|
CND - Exam 312-38 - Module 14 |
F3thinker ! |
|
| 535 |
|
CND - Exam 312-38 - Module 2 |
F3thinker ! |
|
| 536 |
|
CND - Exam 312-38 - Module 3 |
F3thinker ! |
|
| 537 |
|
CND - Exam 312-38 - Module 4 |
F3thinker ! |
|
| 538 |
|
CND - Exam 312-38 - Module 5 |
F3thinker ! |
|
| 539 |
|
CND - Exam 312-38 - Module 6 |
F3thinker ! |
|
| 540 |
|
CND - Exam 312-38 - Module 7 |
F3thinker ! |
|
| 541 |
|
CND - Exam 312-38 - Module 8 |
F3thinker ! |
|
| 542 |
|
CND - Exam 312-38 - Module 9 |
F3thinker ! |
|
| 543 |
|
Cybersecurity Blue Team Toolkit |
Nadean H. Tanner |
|
| 544 |
|
Ghost in the Wires |
Kevin Mitnick |
|
| 545 |
|
How to Hack a Hacker |
Sherwood, AJ |
|
| 546 |
|
Incident Response & Computer Forensics |
Prosise, Chris., Mandia, Kevin. |
|
| 547 |
|
Kali Linux CTF Blueprints |
Buchanan, Cam |
|
| 548 |
|
Kali Linux: Assuring Security by Penetration Testing |
Lee Allen,Tedi Heriyanto,Shakeel Ali |
|
| 549 |
|
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware |
K A, Monnappa |
|
| 550 |
|
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides |
Cameron H. Malin, Eoghan Casey, James M. Aquilina |
|
| 551 |
|
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides |
Casey, Eoghan,Malin, Cameron H.,Aquilina, James M. |
|
| 552 |
|
Mastering Kali Linux Wireless Pentesting |
|
|
| 553 |
|
Penetration Testing with Kali Linux 1 1 |
F3thinker ! |
|
| 554 |
|
Social Engineer |
Sutherland, Ian |
|
| 555 |
|
The Network |
Bateman, E. G. |
|
| 556 |
|
Untangle Network Security |
El-Bawab, Abd El-Monem A. |
|
| 557 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance |
Chuvakin, Anton &, Williams, Branden R. |
|
| 558 |
|
Bots: How to Detect and Prevent Them |
Dalziel, Max &, Bradley, Jaron |
|
| 559 |
|
Turning BYOD Risk Into Mobile Security Strength |
Dalziel, Max &, Bradley, Jaron |
|
| 560 |
|
Cyber Policy in China |
Greg Austin |
|
| 561 |
|
Information Governance and Security |
Iannarelli, John G., OShaughnessy, Michael |
|
| 562 |
|
Inside Anonymous |
Olson, Parmy |
|
| 563 |
|
Core Software Security: Security at the Source |
James Ransome &, Anmol Misra |
|
| 564 |
|
Multi-dimensional summarization in cyber-physical society |
Gregory S. Makowski |
1 |
| 565 |
|
PCI Compliance. Implementing Effective PCI Data Security Standards |
Tony Bradley, James D. Burton, Jr., Anton Chuvakin, Dr., Anatoly Elberg, Brian Freedman, David King, Scott Paladino and Paul Shcooping (Eds.) |
|
| 566 |
|
Guide to Computer Network Security |
Kizza, Joseph Migga |
|
| 567 |
|
Seven Deadliest Microsoft Attacks |
Kraus, Rob &, Barber, Brian &, Borkin, Mike &, Alpern, Naomi |
|
| 568 |
|
IoT Security: Advances in Authentication [1 ed.] |
An Braeken (editor), Pardeep Kumar (editor), Mika Ylianttila (editor), Madhusanka Liyanage (editor) |
1 |
| 569 |
|
Python Passive Network Mapping |
Hosmer, Chet |
|
| 570 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory |
Michael Hale Ligh &, Andrew Case &, Jamie Levy &, Aaron Walters |
|
| 571 |
|
Wi Fi Security |
Miller, Stewart |
|
| 572 |
|
Violent Python: a cookbook for hackers, forensic analysts, penetration testers, and security engineers |
O &, #39,Connor, TJ |
|
| 573 |
|
What Is Computer Science?: An Information Security Perspective |
Page, Daniel &, Smart, Nigel |
|
| 574 |
|
Cyber Adversary Characterization: Auditing the Hacker Mind |
Parker, Tom &, Sachs, Marcus &, Shaw, Eric &, Stroz, Ed |
|
| 575 |
|
Safety of Computer Control Systems 1992 (Safecomp ' 92). Computer Systems in Safety-Critical Applications [1st ed.] |
H.H. Frey |
1 |
| 576 |
|
Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals [1 ed.] |
Randy Harrison |
1 |
| 577 |
|
Security Careers. Skills, Compensation, and Career Paths |
Stephen W. Walker and James E. Foushée (Auth.) |
|
| 578 |
|
Mobile Data Loss: Threats and Countermeasures |
Raggo, Michael T. |
|
| 579 |
|
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects |
Shavers, Brett |
|
| 580 |
|
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace |
Shipley, Todd &, Bowker, Art &, Selby, Nick |
|
| 581 |
|
Cisco Software-Defined Access |
Srilatha Vemula, Jason Gooley, Roddie Hasan |
|
| 582 |
|
La cryptologie au coeur du numérique |
Stern, Jacques |
|
| 583 |
|
Security Risk Management: Building an Information Security Risk Management Program From the Ground Up |
Wheeler, Evan |
|
| 584 |
|
Integrated Security Technologies and Solutions - Volume I 1 1 |
Aaron Woland, Vivek Santuka, Mason Harris, Jamie Sanbower |
|
| 585 |
|
GRC 300 SAP ACCESS CONTROL IMPLEMENTATION AND CONFIGURATION |
SAP TRAINING |
|
| 586 |
|
Modern Cryptography. |
|
|
| 587 |
|
IT-Sicherheitsmanagement - Das umfassende Praxis-Handbuch für IT-Security und technischen Datenschutz nach ISO 27001 |
Thomas W. Harich |
|
| 588 |
|
Guide to Computer Network Security, Fourth Edition |
Joseph Migga Kizza |
4 |
| 589 |
|
SASE For Dummies®, Versa Networks Special Edition 1 |
Kumar Mehta &, Apurva Mehta |
|
| 590 |
|
Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial Intelligence |
Callaway, Jason |
|
| 591 |
|
COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing |
Dylan Mach |
|
| 592 |
|
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro |
HOFFMAN, HUGO &, HOFFMAN, HUGO |
|
| 593 |
|
Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking with Kali Linux |
Jim Kou |
|
| 594 |
|
A Machine-Learning Approach to Phishing Detection and Defense |
Akanbi, O.A., Amiri, Iraj Sadegh, Fazeldehkordi, E. |
|
| 595 |
|
Ciberseguridad para la i-generación: Usos y riesgos de las redes sociales y sus aplicaciones |
Giant, Nikki |
|
| 596 |
|
Educar niños y adolescentes en la era digital: El reto de la educación en el siglo XXI |
Rodríguez, Nora |
|
| 597 |
|
Cybersecurity Readiness |
Chatterjee, Dave |
|
| 598 |
|
Ciberleviatán |
Lassalle, José María |
|
| 599 |
|
Identity 5 |
Mar-Gerrison, Heather |
|
| 600 |
|
Penetration Testing mit mimikatz |
Brabetz, Sebastian |
|
| 601 |
|
Internet, Hackers y Software Libre |
Varios |
|
| 602 |
|
Breaking into Information Security |
Josh More &, Anthony J. Stieber &, Chris Liu |
|
| 603 |
|
Hacking: How to Make Your Own Keylogger in C++ Programming Language |
Norman, Alan T. |
|
| 604 |
|
HACKING GMAIL: How to Hack Gmail |
HAT, BLACK |
|
| 605 |
|
Black Hat Go |
Dan Kottmann &, Chris Patten &, Tom Steele |
|
| 606 |
|
Black Ice |
Valmore James &, John Gallagher |
|
| 607 |
|
Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow |
Karnel, Erickson |
|
| 608 |
|
Cryptography & Network Security : Express Learning |
ITL Education Solutions Limited |
|
| 609 |
|
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying |
Henderson, Lance |
|
| 610 |
|
Digitale Diktatur · Totalüberwachung Cyberkrieg Datenmissbrauch |
Aust, Stefan |
|
| 611 |
|
Spurlos & Verschlüsselt! · Von sicherer Kommunikation und anonymem Surfen |
Gillen, Tobias |
|
| 612 |
|
Transforming Information Security: Optimizing Five Concurrent Data Trends to Reduce Resource Drain |
Moriarty, Kathleen M. |
|
| 613 |
|
Das Phantom im Netz: Die Autobiographie des meistgesuchten Hackers der Welt |
Mitnick, Kevin &, Simon, William M. |
|
| 614 |
|
World Wide War: Angriff aus dem Internet |
Clarke, Richard A. &, Knake, Robert A. |
|
| 615 |
|
The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack |
Levi West |
|
| 616 |
|
Hacking: Fundamentals for Absolute Beginners |
Bell, Alexander |
|
| 617 |
|
Infinity Ethical Hacking: Learn basic to advance hacks |
Sapp, Arthur S |
|
| 618 |
|
The Hacker Playbook: Practical Guide To Penetration Testing |
Kim, Peter |
|
| 619 |
|
Applied network security monitoring collection, detection, and analysis |
Bianco, David J.,Sanders, Chris,Smith, Jason |
|
| 620 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android |
Andrew Hoog |
|
| 621 |
|
Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework [1 ed.] |
Abraham, Ajin, Dalziel, Henry |
1 |
| 622 |
|
Automating open source intelligence : algorithms for OSINT [1 ed.] |
Layton, Robert, Watters, Paul A |
1 |
| 623 |
|
Becoming a global chief security executive officer : a how to guide for next generation security leaders [1 ed.] |
Cloutier, Roland |
1 |
| 624 |
|
Building a corporate culture of security : strategies for strengthening organizational resiliency [1 ed.] |
Sullivant, John |
1 |
| 625 |
|
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency |
Sullivant, John |
|
| 626 |
|
Breakdowns in Computer Security. Commentary and Analysis |
Michael E Rentell and Peter M Jenner (Auth.) |
|
| 627 |
|
Building an information security awareness program: defending against social engineering and technical threats |
Gardner, Bill G.,Thomas, Valerie |
|
| 628 |
|
Building an information security awareness program : defending against social engineering hacks [1 ed.] |
Bill Gardner |
1 |
| 629 |
|
Cloud storage security : a practical guide [1 ed.] |
Wheeler, Aaron, Winburn, Michael |
1 |
| 630 |
|
Cloud storage security a practical guide [Online-Ausg ed.] |
Wheeler, Aaron,Winburn, Michael |
|
| 631 |
|
CISSP Study Guide [2nd ed] |
Feldman, Joshua, Misenar, Seth, Conrad, Eric,Seth Misenar,Joshua Feldman,Kevin Riggins |
2 |
| 632 |
|
Computer Fraud & Security Journel |
|
|
| 633 |
|
Computer Security in Financial Organisations |
J. Essinger (Auth.) |
|
| 634 |
|
Computer Security |
David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick and Robert L. Ashenhurst (Auth.) |
|
| 635 |
|
Computer Security [2nd ed.] |
John M. Carroll (Auth.) |
2 |
| 636 |
|
Computers, Business, and Security. The New Role for Security |
James A Schweitzer (Auth.) |
|
| 637 |
|
Cybersecurity and Applied Mathematics |
Casey, William,Metcalf, Leigh,William Casey |
|
| 638 |
|
Cyber Security Awareness for CEOs and Management [1 ed.] |
Dalziel, Henry, Willson, David |
1 |
| 639 |
|
Data Breach Preparation and Response |
Fowler, Kevvie |
|
| 640 |
|
Data Protection and Security for Personal Computers. A Manager's Guide to Improving the Confidentiality, Availability and Integrity of Data on Personal Computers and Local Area Networks |
R. Schifreen (Auth.) |
|
| 641 |
|
Data breach preparation and response - breaches are certain, impact is not |
Fowler, Kevvie (partner And National Cyber Response Leader |
|
| 642 |
|
Data hiding fundamentals and applications : content security in digital media |
Husrev T Sencar, Ramkumar Mahalingam., Ali N Akansu |
|
| 643 |
|
Cyber Security Awareness for Corporate Directors and Board Members |
Willson, David, Dalziel, Henry |
|
| 644 |
|
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols |
Hosmer, Chet,Raggo, Michael T.,McGrew, Wesley |
|
| 645 |
|
Detecting and Combating Malicious Email [1 ed.] |
Julie JCH Ryan, Cade Kamachi |
1 |
| 646 |
|
Digital forensics : threatscape and best practices [1 ed.] |
Sammons, John |
1 |
| 647 |
|
Digital Forensics with Open Source Tools |
Altheide, Cory,Carvey, Harlan A.,Davidson, Ray |
|
| 648 |
|
Digital Identity Management [1 ed.] |
Maryline Laurent, Samia Bouzefrane |
1 |
| 649 |
|
Digital.Investigation.February |
|
|
| 650 |
|
Dissecting the hack : the v3rb0ten network [1 ed.] |
Baskin, Brian, Martin, Brian, Sims, Kristin, Street, Jayson E |
1 |
| 651 |
|
Firewalls: jumpstart for network and systems administrators |
John R Vacca, Scott Ellis |
|
| 652 |
|
Eleventh Hour CISSP Study Guide [2 ed.] |
Conrad, Eric,Misenar, Seth,Feldman, Joshua,Riggins, Kevin |
2 |
| 653 |
|
Eleventh Hour CISSP [3rd edition] |
Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman |
3 |
| 654 |
|
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques |
Sudhanshu Chauhan, Nutan Kumar Panda |
|
| 655 |
|
Handbook of Social Media Use Online Relationships, Security, Privacy, and Society Volume 2 |
John McAlaney, |
|
| 656 |
|
How to Cheat at Configuring Open Source Security Tools [1 ed.] |
Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson |
1 |
| 657 |
|
How to Cheat at Configuring Open Source Security Tools |
Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty |
|
| 658 |
|
Implementing digital forensic readiness: from reactive to proactive process |
Ivtchenko, Dmitri,Sachowski, Jason |
|
| 659 |
|
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors |
Ron Ben-Natan |
|
| 660 |
|
Insider threat: prevention, detection, mitigration, and deterrence |
Turner, James,Gelles, Michael G |
|
| 661 |
|
Information security science: measuring the vulnerability to data compromises |
Young, Carl S |
|
| 662 |
|
Information Security. Playbook [1 ed.] |
Greg Kane and Lorna Koppel (Eds.) |
1 |
| 663 |
|
Infosec Management Fundamentals [1 ed.] |
Dalziel, Henry |
1 |
| 664 |
|
Information Security [First Edition] |
Marvin Zelkowitz |
|
| 665 |
|
Introduction to cyber-warfare: a multidisciplinary approach [1 ed.] |
Paulo Shakarian, Jana Shakarian, Andrew Ruef |
1 |
| 666 |
|
Introduction to US Cybersecurity Careers |
Dalziel, Max |
|
| 667 |
|
Job reconnaissance: using hacking skills to win the job hunt game [1 ed.] |
Josh More |
1 |
| 668 |
|
Elsevier's Dictionary of Information Security [Mul ed.] |
G. Manoilov, B. Radichkova |
|
| 669 |
|
How to defeat advanced malware new tools for protection and forensics |
Crosby, Simon,Dalziel, Henry |
|
| 670 |
|
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis |
Baird, John,Shavers, Brett |
|
| 671 |
|
Low Tech Hacking: Street Smarts for Security Professionals |
Gudaitis, Terry,Jabbusch, Jennifer,Lowther, Sean,Rogers, Russ,Wiles, Jack |
|
| 672 |
|
Lossless Information Hiding in Images [1 ed.] |
Zhe-Ming Lu, Shi-Ze Guo |
1 |
| 673 |
|
Managing online risk : apps, mobile, and social media security [1 ed.] |
Deborah Gonzalez |
1 |
| 674 |
|
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare |
Joel Brenner |
|
| 675 |
|
Mobile Malware Attacks and Defense |
Ken Dunham |
|
| 676 |
|
Network and System Security [2nd ed] |
Vacca, John R |
2 |
| 677 |
|
No Tech Hacking |
Long, Johnny, Mitnick, Kevin D. |
|
| 678 |
|
Ninja Hacking Unconventional Penetration Testing Tactics and Techniques |
Thomas Wilhelm, Jason Andress, Bryan (con) Garner |
|
| 679 |
|
PCI Compliance [3rd edition] |
Chuvakin, Anton,Williams, Branden |
3 |
| 680 |
|
PCI DSS 3.1. The Standard That Killed SSL [1 ed.] |
Williams, Branden R |
1 |
| 681 |
|
Penetration tester's open source toolkit |
Faircloth, Jeremy |
3 |
| 682 |
|
PCI Compliance [4th edition] |
Williams, Branden R.,Chuvakin, Anton.,Anton A. Chuvakin,Derek Milroy |
4 |
| 683 |
|
Penetration Tester's Open Source Toolkit [4th edition] |
Faircloth, Jeremy,Rogers, T. Michael |
4 |
| 684 |
|
Physical Security for IT |
Michael Erbschloe |
|
| 685 |
|
Physical Security Guidelines. Template [1 ed.] |
Bob Hayes (Eds.) |
1 |
| 686 |
|
Practical anonymity: hiding in plain sight online [1 ed.] |
Peter Loshin |
1 |
| 687 |
|
Practical anonymity hiding in plain sight online |
Loshin, Peter |
|
| 688 |
|
Preparing for Next Generation Security Leader Opportunities. Proven Practices |
Bob Hayes (Auth.) |
|
| 689 |
|
Professional Penetration Testing. Creating and Operating a Formal Hacking Lab |
Thomas Wilhelm |
|
| 690 |
|
Professional penetration testing: creating and learning in a hacking lab [2 ed.] |
Thomas Wilhelm |
2 |
| 691 |
|
Protecting Information on Local Area Networks |
James A Schweitzer (Auth.) |
|
| 692 |
|
Professional Penetration Testing [1st edition] |
Wilhelm, Thomas |
1 |
| 693 |
|
Securing the Cloud: Cloud Computer Security Techniques and Tactics [1st ed.] |
Graham Speake, Patrick Foxhoven |
1 |
| 694 |
|
Securing the cloud : cloud computer security techniques and tactics |
J R Winkler |
|
| 695 |
|
Securing Social Media in the Enterprise [1 ed.] |
Dalziel, Henry |
1 |
| 696 |
|
Security operations center guidebook - a practical guide for a successful s |
Mccoy, Scott (cpp Cissp Asis International (isc)2) |
|
| 697 |
|
Security Leader Insights for Information Protection. Lessons and Strategies from Leading Security Professionals [1 ed.] |
Bob Fahy |
1 |
| 698 |
|
Security controls evaluation, testing, and assessment handbook |
Johnson, Leighton |
|
| 699 |
|
Securing SQL Server [3rd edition] |
Cherry, Denny |
3 |
| 700 |
|
Security Leadership of the Future. Article Collection [1 ed.] |
Bob Hayes (Eds.) |
1 |
| 701 |
|
Securing the Smart Grid: Next Generation Power Grid Security |
Tony Flick, Justin Morehouse |
|
| 702 |
|
Seven Deadliest USB Attacks |
|
|
| 703 |
|
Seven Deadliest Wireless Technologies Attacks |
Brad Haines (Auth.) |
|
| 704 |
|
Seven deadliest social networks attacks |
Perez, Richard,Timm, Carl |
|
| 705 |
|
Simple steps to data encryption: a practical guide to secure computing |
Loshin, Peter |
|
| 706 |
|
Smart Grid Security. Innovative Solutions for a Modernized Grid [1 ed.] |
Florian Skopik, Paul Dr. Smith |
1 |
| 707 |
|
Smart Cities Cybersecurity and Privacy |
Danda B. Rawat (editor), Kayhan Zrar Ghafoor (editor) |
|
| 708 |
|
Smart Security : Proven Practices |
Quilter, J. David |
|
| 709 |
|
Smart Security: Practices That Increase Business Profits. Proven Practices |
J. David Quilter (Auth.) |
|
| 710 |
|
Social engineering penetration testing executing social engineering pen tests, assessments and defense |
Ackroyd, Richard,Mason, Andrew,Watson, Gavin |
|
| 711 |
|
SQL injection attacks and defense Description based on print version record |
Clarke, Justin |
|
| 712 |
|
The Basics of Information Security [2nd edition] |
Andress, Jason |
2 |
| 713 |
|
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy [2nd Edition] |
Engebretson, Patrick,David Kennedy |
2 |
| 714 |
|
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy |
Broad, James, Engebretson, Patrick Henry |
|
| 715 |
|
The Basics of Information Security. Understanding the Fundamentals of Infosec in Theory and Practice [2 ed.] |
Jason Andress (Auth.) |
2 |
| 716 |
|
Trojans, Worms, And Spyware A Computer Security Professional's Guide To Malicious Code |
|
|
| 717 |
|
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments |
Diane Barrett, Greg Kipper |
|
| 718 |
|
Voice over Internet Protocol (VoIP) Security |
PhD, CISM, CISSP, James F. Ransome, PhD, CISM, John Rittinghouse |
|
| 719 |
|
Wireless reconnaissance in penetration testing [recurso electrónico] |
Hamerstone, Alex,Neely, Matthew,Sanyk, Chris |
|
| 720 |
|
Wireless reconnaissance in penetration testing [1 ed.] |
Neely, Matthew, Sanyk, Chris, Hamerstone, Alex |
1 |
| 721 |
|
The History of Information Security: A Comprehensive Handbook |
Karl Maria Michael de Leeuw, Jan Bergstra |
|
| 722 |
|
The Manager's Handbook for Business Security [2 ed.] |
George Campbell (Eds.) |
2 |
| 723 |
|
Theoretical and Experimental Methods for Defending Against DDOS Attacks [1 ed.] |
Amiri, Iraj Sadegh, Soltanian, Mohammad Reza Khalifeh |
1 |
| 724 |
|
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals |
Paul Mungo |
|
| 725 |
|
Prying Eyes : Protect Your Privacy From People Who Sell to You, Snoop on You, or Steal From You |
Eric Gertler |
|
| 726 |
|
The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats |
Clarke, Richard Alan,Knake, Robert K |
|
| 727 |
|
Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility |
Andrew Jones, Craig Valli |
|
| 728 |
|
Cyber-Attacks and the Exploitable Imperfections of International Law [1 ed.] |
Yaroslav Radziwill |
1 |
| 729 |
|
Cybersecurity (Computer Science Fundamentals) |
Edet, Theophilus |
|
| 730 |
|
Cyber Attacks: Protecting National Infrastructure [1 ed.] |
Edward Amoroso |
1 |
| 731 |
|
From Lambda calculus to cybersecurity through program analysis |
|
|
| 732 |
|
Hacker: Hack The System: The "Ethical" Python Hacking Guide [4 ed.] |
Takehiro Kanegi, Alice Schwartz |
4 |
| 733 |
|
Information Assurance: Managing Organizational IT Security Risks [1st ed.] |
Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security Manager European Command (EUCOM) |
1 |
| 734 |
|
Information Governance and Security: Protecting and Managing Your Company's Proprietary Information |
John G. Iannarelli, Michael O'Shaughnessy |
|
| 735 |
|
Managing Online Risk Apps, Mobile, and Social Media Security |
Deborah Gonzalez |
|
| 736 |
|
Networked Control Systems: Cloud Control and Secure Control |
Magdi S. Mahmoud, Yuanqing Xia |
|
| 737 |
|
Risk management for computer security : Protecting your network and information assets |
Andy Jones, Debi Ashenden |
|
| 738 |
|
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program [2 ed.] |
Gerald L. Kovacich CFE CPP CISSP |
2 |
| 739 |
|
Seven Deadliest Web Application Attacks |
Shema, Mike |
|
| 740 |
|
Hackers. au cœur de la résistance numérique |
Guiton Amaelle |
|
| 741 |
|
The darkening web: the war for cyberspace |
Klimburg, Alexander |
|
| 742 |
|
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats [Original retail ed.] |
Richard A. Clarke, Robert K. Knake |
|
| 743 |
|
The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War |
Geoff White |
|
| 744 |
|
The Trust Manifesto: What you Need to do to Create a Better Internet |
Damian Bradfield |
|
| 745 |
|
Cyber Arms; Security in Cyberspace |
Martellini, Stanislav Abaimov, Maurizio |
|
| 746 |
|
Cyber Wars |
Charles Arthur |
|
| 747 |
|
Hackear al hacker |
Roger A. Grimes |
|
| 748 |
|
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us |
Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra |
|
| 749 |
|
Linux Firewalls |
Michael Rash |
|
| 750 |
|
Next Level Cybersecurity: Detect the Signals, Stop the Hack |
Huda, Sai |
|
| 751 |
|
Next Level Cybersecurity: Detect the Signals, Stop the Hack |
Sai Huda |
|
| 752 |
|
Tout ce qu'il faut savoir pour protéger votre vie privée sur Internet |
David, Daniel-Jean |
|
| 753 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook [2nd edition] |
Safari, an O'Reilly Media Company., Eagle, Chris, Harper, Allen, Harris, Shon, Ness, Jonathan |
2 |
| 754 |
|
AI Assurance: Towards Trustworthy, Explainable, Safe, and Ethical AI |
Feras A. Batarseh, Laura Freeman |
|
| 755 |
|
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) [1 ed.] |
Andrew A. Bochman, Sarah Freeman |
1 |
| 756 |
|
Network Security with OpenSSL: Cryptography for Secure Communications |
John Viega, Matt Messier, Pravir Chandra |
|
| 757 |
|
Practical Unix & Internet Security, 3rd Edition [3 ed.] |
Simson Garfinkel, Gene Spafford, Alan Schwartz |
3 |
| 758 |
|
Managing Security with Snort & IDS Tools |
Gerg, Christopher,Cox, Kerry J |
|
| 759 |
|
Network Security Tools [1 ed.] |
Nitesh Dhanjani, Justin Clarke |
1 |
| 760 |
|
Internet Forensics |
R Jones |
|
| 761 |
|
Network Security Assessment: Know Your Network |
Chris McNab |
|
| 762 |
|
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks [1 ed.] |
Chris Fry, Martin Nystrom |
1 |
| 763 |
|
Snort Cookbook |
Biles, Simon,Orebaugh, Angela,Babbin, Jacob |
|
| 764 |
|
Network Security Hacks [Second Edition] |
Andrew Lockhart |
|
| 765 |
|
97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts [1 ed.] |
Christina Morillo |
1 |
| 766 |
|
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware [1 ed.] |
Cassie Crossley |
1 |
| 767 |
|
Policy as Code: Improving Cloud Native Security [1 ed.] |
Jimmy Ray |
1 |
| 768 |
|
Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security [1 ed.] |
Russ Miles, Stephen Giguere, Taylor Smith |
1 |
| 769 |
|
Cloud Native Security Cookbook: Recipes for a Secure Cloud [1 ed.] |
Josh Armitage |
1 |
| 770 |
|
Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications |
Brendan Creane |
|
| 771 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure [2 ed.] |
Amanda Berlin, Lee Brotherston, William Reyor III |
2 |
| 772 |
|
Adversary Emulation with MITRE ATT&CK: Bridging the Gap between the Red and Blue Teams |
Drinor Selmanaj |
|
| 773 |
|
Intelligence-Driven Incident Response: Outwitting the Adversary [2 ed.] |
Rebekah Brown, Scott Roberts |
2 |
| 774 |
|
Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking [2 ed.] |
Ric Messier |
2 |
| 775 |
|
Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust [1 ed.] |
Ev Kontsevoy, Sakshyam Shah, Peter Conrad |
1 |
| 776 |
|
Web Application Security: Exploitation and Countermeasures for Modern Web Applications [2 ed.] |
Andrew Hoffman |
2 |
| 777 |
|
Building a Cyber Risk Management Program: Evolving Security for the Digital Age [1 ed.] |
Brian Allen, Brandon Bapst, Terry Allan Hicks |
1 |
| 778 |
|
Network Security Through Data Analysis: Building Situational Awareness [1 ed.] |
Michael Collins |
1 |
| 779 |
|
JUNOS Security [1 ed.] |
Rob Cameron, Brad Woodberg, Timothy Eberhard, Patricio Giecco, James Quinn |
1 |
| 780 |
|
Junos Security: A Practical Guide to Junos Enterprise Services Gateways, Software, and Certification |
Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn |
|
| 781 |
|
Network Security Assessment: Know Your Network [3 ed.] |
Chris McNab |
3 |
| 782 |
|
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems [Paperback ed.] |
Josiah Dykstra |
|
| 783 |
|
Intelligence-Driven Incident Response: Outwitting the Adversary [1 ed.] |
Scott J. Roberts, Rebekah Brown |
1 |
| 784 |
|
In Search of Certainty: The Science of Our Information Infrastructure [2 ed.] |
Mark Burgess |
1 |
| 785 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure [1 ed.] |
Lee Brotherston, Amanda Berlin |
1 |
| 786 |
|
Network Security Through Data Analysis: From Data to Action [2 ed.] |
Michael Collins |
2 |
| 787 |
|
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line [Original retail ed.] |
Paul Troncone, Carl Albing |
|
| 788 |
|
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan [1 ed.] |
Jeff Bollinger, Brandon Enright, Matthew Valites |
1 |
| 789 |
|
The Cybersecurity Manager's Guide: The Art of Building Your Security Program [1 ed.] |
Todd Barnum |
1 |
| 790 |
|
Zero Trust Networks [2 ed.] |
Razi Rais, Christina Morillo, Evan Gilman, Doug Barth |
2 |
| 791 |
|
Cyber Sovereignty: The Future of Governance in Cyberspace [1 ed.] |
Lucie Kadlecová |
1 |
| 792 |
|
Protecting Networks with SATAN [1st English ed.] |
Martin Freiss |
1 |
| 793 |
|
Practical Unix and Internet Security, 2nd Edition [Second Edition] |
Simson Garfinkel, Gene Spafford PH.D. |
|
| 794 |
|
Sicherheit im Internet 3. Auflage - O'Reilly Basics [3 ed.] |
Krzysztof Janowicz |
3 |
| 795 |
|
Hacking Exposed 7, 7th Edition [7th edition] |
Safari, an O'Reilly Media Company., Kurtz, George, McClure, Stuart, Scambray, Joel |
7 |
| 796 |
|
Kenne deinen Feind. Fortgeschrittene Sicherheitstechniken |
Anton Chuvakin |
|
| 797 |
|
Computer Security Fundamentals, 4th Edition [1st edition] |
Safari, an O'Reilly Media Company., Easttom, Chuck |
1 |
| 798 |
|
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [2nd edition] |
Safari, an O'Reilly Media Company., Engebretson, Patrick |
2 |
| 799 |
|
Network Security Hacks [1st ed.] |
Andrew Lockhart |
1 |
| 800 |
|
Network Security Assessment [1st ed.] |
Chris McNab |
1 |
| 801 |
|
Network Security Assessment (2007)(2nd)(en)(478s) [2 ed.] |
Chris McNab |
2 |
| 802 |
|
Network security assessment [2nd ed] |
Chris McNab |
2 |
| 803 |
|
Inside cyber warfare: mapping the cyber underworld |
Carr, Jeffrey |
|
| 804 |
|
CompTIA PenTest+ Cert Guide, First Edition [1st edition] |
Safari, an O'Reilly Media Company., Santos, Omar, Taylor, Ron |
1 |
| 805 |
|
Defensive Security Handbook, 2nd Edition |
Lee Brotherston, Amanda Berlin |
|
| 806 |
|
Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) [3 ed.] |
Kim Crawley |
3 |
| 807 |
|
Building a Cyber Risk Management Program |
Brian Allen |
|
| 808 |
|
The Developer's Playbook for Large Language Model Security |
Steve Wilson |
|
| 809 |
|
Ransomware and Data Extortion |
Ryan Golden, Anthony M. Freed |
|
| 810 |
|
Intelligence-Driven Incident Response, 2nd Edition (5th Early Release) [2 ed.] |
Rebekah Brown and Scott J. Roberts |
2 |
| 811 |
|
Software Supply Chain Security (First Early Release) [1 ed.] |
Cassie Crossley |
1 |
| 812 |
|
Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (2nd Early Release) |
Kim Crawley |
|
| 813 |
|
Ransomware and Data Extortion (for True Epub) |
Ryan Golden, Anthony M. Freed |
|
| 814 |
|
Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition [3 ed.] |
Jeffrey Caruso |
3 |
| 815 |
|
Managing the Insider Threat: No Dark Corners [1st edition] |
Safari, an O'Reilly Media Company., Catrantzos, Nick |
1 |
| 816 |
|
Network Security Assessment: Know Your Network [3rd ed.] |
Chris McNab |
3 |
| 817 |
|
Identity and data security for web development: best practices [First edition] |
LeBlanc, Jonathan,Messerschmidt, Tim |
|
| 818 |
|
Network Security Tools |
Clarke, Justin,Dhanjani, Nitesh |
|
| 819 |
|
Sharing big data safely managing data security [First edition (Online-Ausg.)] |
Dunning, Ted,Friedman, B. Ellen |
|
| 820 |
|
Practical Cloud Security, 2nd Edition (Third Early Release) [2 ed.] |
Chris Dotson |
2 |
| 821 |
|
Ransomware. Defending Against Digital Extortion |
Allan Liska, Timothy Gallo |
|
| 822 |
|
Tyrants on Twitter: Protecting Democracies from Information Warfare |
David L. Sloss |
|
| 823 |
|
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition [2nd edition] |
O'Reilly for Higher Education (Firm), Bryce, Chapin, Miller, Preston |
2 |
| 824 |
|
Cybercrime: Wie Sie Gefahren im Internet erkennen und sich schützen |
Jürgen Schuh |
|
| 825 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA [1 ed.] |
Denise Nicholson (eds.) |
1 |
| 826 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition [5th edition.] |
Matt Walker, Safari, an O'Reilly Media Company. |
5 |
| 827 |
|
Is Someone Watching You Online NOW?: Online Surveillance |
Ng, Freeman |
|
| 828 |
|
Blocking Spam & Spyware For Dummies [1 ed.] |
Peter H. Gregory, Mike Simon |
1 |
| 829 |
|
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings [1st ed.] |
Simon N. Foley |
1 |
| 830 |
|
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers [1 ed.] |
Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgerald (eds.) |
1 |
| 831 |
|
Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World [2 ed.] |
Simon Chesterman |
2 |
| 832 |
|
Configuring Check Point NGX VPN-1 Firewall-1 [1 ed.] |
Robert Stephens, Barry Stiefel, Stephen Watkins, Simon Desmeules, Eli Faskha |
1 |
| 833 |
|
Digital Forensic Investigation of Internet of Things (IoT) Devices [1st ed.] |
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson |
1 |
| 834 |
|
Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level [1 ed.] |
Robert M. Clark, Simon Hakim (eds.) |
1 |
| 835 |
|
Hacking Hacking Practical Guide for Beginners (Hacking With Python) |
Jeff Simon |
|
| 836 |
|
El arte de la intrusión: cómo ser un hacker o evitarlos |
Kevin D Mitnick, William L Simon |
|
| 837 |
|
Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach [1st ed.] |
Simon Parkinson, Andrew Crampton, Richard Hill |
1 |
| 838 |
|
L’art de la supercherie |
Kevin Mitnick, William L. Simon |
|
| 839 |
|
Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers [1 ed.] |
Simon Meurer, Roland Wismüller (auth.), Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian (eds.) |
1 |
| 840 |
|
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation |
David Routin, Simon Thoores, Samuel Rossier |
|
| 841 |
|
The art of deception: controlling the human element of security [1 ed.] |
Kevin D. Mitnick, William L. Simon, Steve Wozniak |
1 |
| 842 |
|
The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers |
Kevin D Mitnick, William L Simon |
|
| 843 |
|
The Art of Deception: Controlling the Human Element of Security |
Kevin D. Mitnick, William L. Simon, Steve Wozniak |
|
| 844 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers [1 ed.] |
Kevin D. Mitnick, William L. Simon |
1 |
| 845 |
|
Becoming an Ethical Hacker |
Gary Rivlin |
|
| 846 |
|
Application Security Program Handbook |
Derek Fisher, |
|
| 847 |
|
Cybersecurity in Finance: Getting the Policy Mix Right |
Sylvain Bouyon, Simon Krause |
|
| 848 |
|
Techo-Security in an Age of Globalization: Perspectives From the Pacific Rim |
Denis Fred Simon |
|
| 849 |
|
The Art of Deception: Controlling the Human Element of Security |
Kevin David Mitnick &, William L. Simon |
|
| 850 |
|
The NSA Hack and its Implications |
Simon Luria |
|
| 851 |
|
Net Neutrality: Towards a Co-regulatory Solution |
Christopher T. Marsden |
|
| 852 |
|
Security in Cyberspace: Targeting Nations, Infrastructures, Individuals |
Giampiero Giacomello (editor) |
|
| 853 |
|
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future |
Aaron Mauro |
|
| 854 |
|
The Hidden Potential of DNS in Security |
Joshua M. Kuo, Ross Gibson |
|
| 855 |
|
Cyber Operations Building, Defending, and Attacking Modern Computer Networks [2nd edition] |
O'Leary, Mike |
2 |
| 856 |
|
Professional Red Teaming: Conducting Successful Cybersecurity Engagements |
Oakley, Jacob G |
|
| 857 |
|
Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program [2 ed.] |
Ryan Leirvik |
2 |
| 858 |
|
DNS Security for Dummies [Infoblox special edition] |
Joshua M. Kuo, Robert Nagy, Cricket Liu |
|
| 859 |
|
Personal Cybersecurity. How to avoid and recover from Cybercrime |
Marvin Waschke |
|
| 860 |
|
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence |
Kevin Cardwell |
|
| 861 |
|
Managing Risk and Information Security: Protect to Enable [2 ed.] |
Malcolm W. Harkins (auth.) |
2 |
| 862 |
|
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies [3 ed.] |
Carey Parker |
3 |
| 863 |
|
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide |
Luis Ayala (auth.) |
|
| 864 |
|
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks [1 ed.] |
Mike O'Leary |
1 |
| 865 |
|
The New School of Information Security [1 ed.] |
Adam Shostack, Andrew Stewart |
1 |
| 866 |
|
Managing Risk and Information Security: Protect to Enable |
Malcolm Harkins |
|
| 867 |
|
Security and Privacy for Modern Networks : Strategies and Insights for Safeguarding Digital Infrastructures |
Seshagirirao Lekkala, Priyanka Gurijala |
|
| 868 |
|
Beginning Ethical Hacking with Python |
Sinha, Sanjib |
|
| 869 |
|
Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed |
Yuri Diogenes |
|
| 870 |
|
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment [1st ed.] |
Dan Blum |
1 |
| 871 |
|
Practical Information Security Management A Complete Guide to Planning and Implementation |
Tony Campbell |
|
| 872 |
|
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats [1 ed.] |
Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
1 |
| 873 |
|
Cybersecurity for Space: Protecting the Final Frontier [1st ed.] |
Jacob G. Oakley |
1 |
| 874 |
|
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents [Paperback ed.] |
Eric C. Thompson |
|
| 875 |
|
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails [1 ed.] |
Nicholas Oles |
1 |
| 876 |
|
Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines |
Abhishek Chopra, Mukund Chaudhary |
|
| 877 |
|
The Manager’s Guide to Web Application Security:: A Concise Guide to the Weaker Side of the Web [1 ed.] |
Ron Lepofsky (auth.) |
1 |
| 878 |
|
Linux Firewalls mit iptables & Co. |
Ralf Spenneberg |
|
| 879 |
|
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources [1 ed.] |
Morey J. Haber, Brian Chappell, Christopher Hills |
1 |
| 880 |
|
Honeypots for Windows [1 ed.] |
Roger A. Grimes (auth.) |
1 |
| 881 |
|
The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team |
Jacob G. Oakley, Michael Butler |
|
| 882 |
|
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls |
Jason Edwards |
|
| 883 |
|
The InfoSec Handbook: An Introduction to Information Security [1st ed.] |
Umesha Nayak, Umesh Rao |
1 |
| 884 |
|
Protective Security: Creating Military-Grade Defenses For Your Digital Business [1st Edition] |
James Seaman |
1 |
| 885 |
|
The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things [1 ed.] |
Aditya Gupta |
1 |
| 886 |
|
Managing risk and information security [2nd edition] |
Malcolm W. Harkins |
2 |
| 887 |
|
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level [1 ed.] |
Jordan Schroeder (auth.) |
1 |
| 888 |
|
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies [5 ed.] |
Carey Parker |
5 |
| 889 |
|
Handbuch IT-Sicherheit : Strategien, Grundlagen und Projekte |
Walter Gora |
|
| 890 |
|
Android Apps Security |
Sheran Gunasekera |
|
| 891 |
|
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server [1 ed.] |
Robert La Lau |
1 |
| 892 |
|
Penetration Testing Basics: a Quick-Start Guide to Breaking into Systems |
Messier, Ric |
|
| 893 |
|
Cube Farm [1 ed.] |
Bill Blunden (auth.) |
1 |
| 894 |
|
iOS Penetration Testing A Definitive Guide to iOS Security |
Kunal Relan |
|
| 895 |
|
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time |
Chet Hosmer |
|
| 896 |
|
Abenteuer Kryptologie : Methoden, Risiken und Nutzen der Datenverschlüsselung [3., überarb. Aufl] |
Reinhard Wobst |
3 |
| 897 |
|
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders |
Kodi A. Cochran |
|
| 898 |
|
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations [1 ed.] |
Morey J. Haber,Brad Hibbert (auth.) |
1 |
| 899 |
|
Cryptography and Data Security |
Dorothy Elizabeth Robling Denning |
|
| 900 |
|
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security [2nd ed.] |
Marshall Copeland, Matthew Jacobs |
2 |
| 901 |
|
Pci Dss: An Integrated Data Security Standard Guide [1 ed.] |
Jim Seaman |
1 |
| 902 |
|
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [2 ed.] |
Tyler Wall, Jarrett Rodrick |
2 |
| 903 |
|
Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed Systems) [3 ed.] |
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner |
3 |
| 904 |
|
The No-Nonsense Guide for CISOs and Security Managers |
Aaron Roberts |
|
| 905 |
|
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program [1 ed.] |
Ryan Leirvik |
1 |
| 906 |
|
Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers [1st ed.] |
Sreejith Keeriyattil |
1 |
| 907 |
|
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions [1st ed.] |
Paul Rohmeyer, Jennifer L. Bayuk |
1 |
| 908 |
|
Digital Archaeology: The Art and Science of Digital Forensics [1 ed.] |
Michael W. Graves |
1 |
| 909 |
|
Enterprise Cybersecurity Study Guide [1st ed.] |
Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
1 |
| 910 |
|
10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy [1 ed.] |
Daniel G. Bachrach, Eric J. Rzeszut (auth.) |
1 |
| 911 |
|
Privacy in the Age of Innovation: AI Solutions for Information Security |
Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala |
|
| 912 |
|
Enterprise Cyber Risk Management as a Value Creator : Leverage Cybersecurity for Competitive Advantage |
Bob Chaput |
|
| 913 |
|
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment [1st ed.] |
Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler |
1 |
| 914 |
|
Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide |
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu |
|
| 915 |
|
Cybersecurity Lexicon [1 ed.] |
Luis Ayala (auth.) |
1 |
| 916 |
|
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks [1 ed.] |
Gunikhan Sonowal |
1 |
| 917 |
|
PCI DSS: An Integrated Data Security Standard Guide |
Jim Seaman |
|
| 918 |
|
Identity Attack Vectors: Strategically Designing And Implementing Identity Security [2 ed.] |
Morey J. Haber, Darran Rolls |
2 |
| 919 |
|
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records [1 ed.] |
Bernard Peter Robichau |
1 |
| 920 |
|
70 Tips and Tricks for Mastering the CISSP Exam [1st ed.] |
R. Sarma Danturthi |
1 |
| 921 |
|
Cybersecurity for Space: A Guide to Foundations and Challenges [2 ed.] |
Jacob G. Oakley |
2 |
| 922 |
|
Securing PHP Apps [1 ed.] |
Ben Edmunds (auth.) |
1 |
| 923 |
|
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information [1 ed.] |
Eric C. Thompson (auth.) |
1 |
| 924 |
|
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing [1 ed.] |
Ahmed Sheikh |
1 |
| 925 |
|
Snowflake Security: Securing Your Snowflake Data Cloud [1 ed.] |
Ben Herzberg, Yoav Cohen |
1 |
| 926 |
|
Linux® firewalls: enhancing security with nftables and beyond [4th edition] |
Addison-Wesley.,Suehring, Steve |
4 |
| 927 |
|
Theoretical Cybersecurity: Principles and Advanced Concepts |
Jacob G. Oakley, Michael Butler, Matthew Puckett, J. Louis Sewell, Wayne York |
|
| 928 |
|
Lesson-Based Review of Ethical Hacking and Penetration Testing |
Ahmed Sheikh |
|
| 929 |
|
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention [1 ed.] |
Luis Ayala (auth.) |
1 |
| 930 |
|
Certified Ethical Hacker (CEH) Foundation Guide [1 ed.] |
Sagar Ajay Rahalkar (auth.) |
1 |
| 931 |
|
Big Breaches: Cybersecurity Lessons for Everyone |
Neil Daswani, Moudy Elbayadi |
|
| 932 |
|
Discovering Cybersecurity: A Technical Introduction For The Absolute Beginner [1 ed.] |
Seth James Nielson |
1 |
| 933 |
|
Privileged Attack Vectors: Building Effective Cyber-defense Strategies to Protect Organizations [2 ed.] |
Morey J. Haber |
2 |
| 934 |
|
The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management |
Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke |
|
| 935 |
|
NTP Security: A Quick-Start Guide [1 ed.] |
Allan Liska (auth.) |
1 |
| 936 |
|
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center [1 ed.] |
Marshall Copeland (auth.) |
1 |
| 937 |
|
Algebra for Secure and Reliable Communication Modeling |
Mustapha Lahyane, Edgar Martinez-moro |
|
| 938 |
|
The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War [1 ed.] |
Steve Grobman, Allison Cerra (auth.) |
1 |
| 939 |
|
Pirates de l’informatique : enquête sur les hackers français |
Blanchard, Philippe |
|
| 940 |
|
Firewall Policies And VPN Configurations [1 ed.] |
Laura E. Hunter |
1 |
| 941 |
|
Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations [1 ed.] |
Iwan Hoogendoorn |
1 |
| 942 |
|
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know |
John Viega |
|
| 943 |
|
Android Apps Security: Mitigate Hacking Attacks and Security Breaches [2nd ed.] |
Sheran Gunasekera |
2 |
| 944 |
|
Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners [1 ed.] |
Alexander J. Roxon |
1 |
| 945 |
|
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [1 ed.] |
Tyler Wall, Jarrett Rodrick |
1 |
| 946 |
|
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities [1st ed.] |
Sagar Rahalkar |
1 |
| 947 |
|
Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services |
Puthiyavan Udayakumar |
|
| 948 |
|
Mastering Cybersecurity: Strategies, Technologies, and Best Practices [1 ed.] |
Jason Edwards |
1 |
| 949 |
|
Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway [1 ed.] |
Greg Holden (auth.) |
1 |
| 950 |
|
Firewalls Don’t Stop Dragons: A Step-by-Step Guide To Computer Security And Privacy For Non-Techies [4th Edition] |
Carey Parker |
4 |
| 951 |
|
Ransomware Revealed: A Beginner’s Guide To Protecting And Recovering From Ransomware Attacks |
Nihad A. Hassan |
|
| 952 |
|
System Administration Ethics: Ten Commandments For Security And Compliance In A Modern Cyber World |
Igor Ljubuncic, Tom Litterer |
|
| 953 |
|
The Passion of Bradley Manning: The Story of the Suspect Behind the Largest Security Breach in U.S. History |
Chase Madar |
|
| 954 |
|
Full Stack Python Security: Cryptography, TLS, and attack resistance |
Dennis Byrne |
|
| 955 |
|
CCNA cyber ops SECOPS #210-255 official cert guide |
Santos, Omar,Joseph Muniz,Stefano De Crescenzo |
|
| 956 |
|
Network defense and countermeasures principles and practices [2nd ed] |
Easttom, Chuck |
2 |
| 957 |
|
Linux Essentials for Cybersecurity (for True EPUB) |
William “Bo” Rothwell, Denise Kinsey |
|
| 958 |
|
Democracy in danger. How hackers and activists exposed fatal flaws in the election system |
Jake Braun |
|
| 959 |
|
Self-Sovereign Identity: Decentralized digital identity and verifiable credentials [1 ed.] |
Alex Preukschat, Drummond Reed |
1 |
| 960 |
|
Cybersecurity Career Guide |
Alyssa Miller |
|
| 961 |
|
Hacked: The Inside Story Of America's Struggle To Secure Cyberspace [1 ed.] |
Charlie Mitchell |
1 |
| 962 |
|
The Unhackable Internet |
Thomas P. Vartanian, |
|
| 963 |
|
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam - The How To Pass on Your First Try Certification Study Guide |
William Manning |
|
| 964 |
|
Facing Cyber Threats Head on: Protecting Yourself and Your Business |
Brian Minick |
|
| 965 |
|
Personal Firewalls for Administrators and Remote Users [1st ed.] |
Lisa Yeo |
1 |
| 966 |
|
Securing Devops: Safe Services in the Cloud [1 ed.] |
Julien Vehent |
1 |
| 967 |
|
CCIE Security Exam Certification Guide |
Henry Benjamin |
|
| 968 |
|
Building Secure and Reliable Network Applications [1st ed.] |
Kenneth P Birman |
1 |
| 969 |
|
CCNA Cyber Ops SECFND 210-250 official cert guide |
De Crescenzo, Stefano,Muniz, Joseph,Santos, Omar |
|
| 970 |
|
Secure By Design |
Daniel Deogun, Dan Bergh Johnsson, Daniel Sawano |
|
| 971 |
|
CCNA Security Portable Command Guide |
Bob Vachon |
|
| 972 |
|
Constructing cybersecurity: Power, expertise and the internet security industry (Manchester University Press) |
Andrew Whiting |
|
| 973 |
|
The Art of Network Penetration Testing: Taking over any company in the world |
Royce Davis |
|
| 974 |
|
Information Security Management [2 ed.] |
Michael Workman |
2 |
| 975 |
|
Cryptography In The Database: The Last Line Of Defense |
Kevin Kenan |
|
| 976 |
|
Managing Information Risks: Threats, Vulnerabilities, and Responses |
Saffady, William |
|
| 977 |
|
Cybersecurity and Information Security Analysts: A Practical Career Guide |
Kezia Endsley |
|
| 978 |
|
50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them [2nd Edition] |
Weisman, Steve |
2 |
| 979 |
|
CISSP Cert Guide [3rd ed.] |
ROBIN ABERNATHY, TROY McMILLAN |
3 |
| 980 |
|
Governing Cyberspace: Behavior, Power, and Diplomacy |
Dennis Broeders (editor), Bibi van den Berg (editor) |
|
| 981 |
|
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family |
Theresa M. Payton, Ted Claypoole |
|
| 982 |
|
Cybersecurity And Human Rights In The Age Of Cyberveillance [1 ed.] |
Joanna Kulesza, Roy Balleste |
1 |
| 983 |
|
Making Sense of Cybersecurity |
Thomas Kranz |
|
| 984 |
|
Protecting Student Data Privacy: Classroom Fundamentals |
Linnette Attai |
|
| 985 |
|
Exploring Careers in Cybersecurity and Digital Forensics |
Lucy K. Tsado, Robert Osgood |
|
| 986 |
|
Hack by Dmitry Samarov [1ST ed.] |
Dmitry Samarov |
1 |
| 987 |
|
Data Privacy: A runbook for engineers |
NISHANT BHAJARIA |
|
| 988 |
|
The Art of Network Penetration Testing: How to take over any company in the world [1 ed.] |
Royce Davis |
1 |
| 989 |
|
End-To-End Network Security: Defense-In-Depth |
Santos, Omar |
|
| 990 |
|
API Security in Action [1 ed.] |
Neil Madden |
1 |
| 991 |
|
Information security: principles and practices [2nd edition] |
Breithaupt, Jim,Merkow, Mark S |
2 |
| 992 |
|
Application Security Program Handbook: A guide for software engineers and team leaders |
Derek Fisher |
|
| 993 |
|
Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System |
Jake Braun |
|
| 994 |
|
Cyber insecurity: navigating the perils of the next information age |
Harrison, Richard M.,Herr, Trey |
|
| 995 |
|
Pearson Education: Certified Ethical Hacker (CEH) Version 10 (Certification Guide) [3 ed.] |
Pearson Education, Omar Santos, Michael Gregg |
3 |
| 996 |
|
Casting Light On The Dark Web: A Guide For Safe Exploration |
Matthew Beckstrom, Brady Lund |
|
| 997 |
|
Microsoft Azure Security Center |
Yuri Diogenes, Tom Shinder |
|
| 998 |
|
Privacy in the age of big data: recognizing threats, defending your rights, and protecting your family [1st paperback ed] |
Claypoole, Theodore,Payton, Theresa M |
1 |
| 999 |
|
Computer Security: Principles and Practice [Fourth Global edition] |
Stallings, William, Brown, Lawrie |
|
| 1000 |
|
Cisco ASA All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition) |
Jazib Frahim, Omar Santos, Andrew Ossipov |
|
| 1001 |
|
The Black Box Society: The Secret Algorithms That Control Money and Information |
Frank Pasquale |
|
| 1002 |
|
The Hacker And The State: Cyber Attacks And The New Normal Of Geopolitics [1st Edition] |
Ben Buchanan |
1 |
| 1003 |
|
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics |
Ben Buchanan |
|
| 1004 |
|
A Leader’s Guide to Cybersecurity: Why Boards Need to Lead–and How to Do It |
Thomas J. Parenty, Jack J. Domet |
|
| 1005 |
|
TECHNOLOGY AS SECURITY |
Declan McCullagh |
|
| 1006 |
|
Cybersecurity: The Insights You Need from Harvard Business Review |
Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg, Roman V. Yampolskiy |
|
| 1007 |
|
The U.S. Cybersecurity and Intelligence Analysis Challenges |
John Michael Weaver |
|
| 1008 |
|
Digitalisation and Human Security: A Multi-Disciplinary Approach to Cybersecurity in the European High North [1st ed.] |
Mirva Salminen, Gerald Zojer, Kamrul Hossain |
1 |
| 1009 |
|
Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices |
Joseph MacMillan |
|
| 1010 |
|
Digital Platform Regulation: Global Perspectives on Internet Governance (Palgrave Global Media Policy and Business) |
Terry Flew (editor), Fiona R. Martin (editor) |
|
| 1011 |
|
Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative Perspectives |
Gertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo |
|
| 1012 |
|
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry: A Comparative Study within the G-20 |
Felix I. Lessambo |
|
| 1013 |
|
The Turn to Infrastructure in Internet Governance |
Francesca Musiani, Derrick L. Cogburn, Laura DeNardis, Nanette S. Levinson (eds.) |
|
| 1014 |
|
A Closer Look at Cybersecurity and Cryptanalysis |
C. Rupa (editor), Sirajuddin (editor) |
|
| 1015 |
|
Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism |
Michael Miller |
|
| 1016 |
|
Cyberwarfare: Threats to Critical Infrastructure |
Kristan Stoddart |
|
| 1017 |
|
Cyber Attack |
Margaret J. Goldstein,Martin Gitlin |
|
| 1018 |
|
Computer Security Within Organizations |
Adrian R. Warman (auth.) |
|
| 1019 |
|
Living With Hacktivism: From Conflict to Symbiosis [1 ed.] |
Vasileios Karagiannopoulos (auth.) |
1 |
| 1020 |
|
Countering Cyber Threats to Financial Institutions: A Private and Public Partnership Approach to Critical Infrastructure Protection [1st ed.] |
Pierre-Luc Pomerleau, David L. Lowery |
1 |
| 1021 |
|
Human Privacy In Virtual And Physical Worlds: Multidisciplinary Perspectives [1 ed.] |
Mary C. Lacity, Lynda Coon |
1 |
| 1022 |
|
Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance: Analyzing IANA Transition [1st ed.] |
Nicola Palladino, Mauro Santaniello |
1 |
| 1023 |
|
Cybercrime in the Pandemic Digital Age and Beyond (Palgrave Studies in Cybercrime and Cybersecurity) |
Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), Laurie Yiu-Chung Lau (editor) |
|
| 1024 |
|
Cyber war versus cyber realities : cyber conflict in the international system [1 ed.] |
Maness, Ryan C., Valeriano, Brandon |
1 |
| 1025 |
|
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain |
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron |
|
| 1026 |
|
Binary bullets : the ethics of cyberwarfare [1 ed.] |
Allhoff, Fritz, Henschke, Adam, Strawser, Bradley Jay |
1 |
| 1027 |
|
The cybersecurity dilemma : hacking, trust, and fear between nations [1 ed.] |
Buchanan, Ben |
1 |
| 1028 |
|
Bulk Collection: Systematic Government Access To Private-Sector Data |
Fred H. Cate, James X. Dempsey |
|
| 1029 |
|
Inside the Enemy's Computer: Identifying Cyber Attackers [1 ed.] |
Clement Guitton |
1 |
| 1030 |
|
Cyberwar. How Russian hackers and trolls helped elect a president - what we don’t, can’t, and do know. |
Jamieson, Kathleen Hall |
|
| 1031 |
|
Breached!: Why Data Security Law Fails and How to Improve It |
Daniel J. Solove, Woodrow Hartzog |
|
| 1032 |
|
Internet governance: infrastructure and institutions |
Lee A. Bygrave, Jon Bing (editors) |
|
| 1033 |
|
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity |
Gregory J. Falco, Eric Rosenbach |
|
| 1034 |
|
Escalation Dynamics in Cyberspace |
Erica D. Lonergan,Shawn W. Lonergan, |
|
| 1035 |
|
Escalation Dynamics in Cyberspace |
Erica D. Lonergan, Shawn W. Lonergan |
|
| 1036 |
|
Semi-State Actors in Cybersecurity |
Florian J. Egloff |
|
| 1037 |
|
Data Sovereignty: From the Digital Silk Road to the Return of the State |
Anupam Chander (editor), Haochen Sun (editor) |
|
| 1038 |
|
Cyber Persistence Theory: Redefining National Security in Cyberspace |
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett |
|
| 1039 |
|
Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power |
Charles D. Freilich, Matthew S. Cohen, Gabi Siboni |
|
| 1040 |
|
The Oxford Handbook of Cyber Security |
Paul Cornish (ed.) |
|
| 1041 |
|
Negotiating Internet Governance |
Roxana Radu |
|
| 1042 |
|
Cyber War Will Not Take Place |
Thomas Rid |
|
| 1043 |
|
Lessons From The Identity Trail: Anonymity, Privacy And Identity In A Networked Society [1st Edition] |
Ian Kerr, Carole Lucock, Valerie Steeves |
1 |
| 1044 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know® [1 ed.] |
P.W. Singer, Allan Friedman |
1 |
| 1045 |
|
Cybersecurity and cyberwar : what everyone needs to know |
Singer, Peter Warren, Friedman, Allan |
|
| 1046 |
|
Cyber-attacks: Effects on UK Companies |
anon. |
|
| 1047 |
|
Access Control and Identity Management (Information Systems Security & Assurance) [3 ed.] |
Mike Chapple |
3 |
| 1048 |
|
Advanced persistent threat : understanding the danger and how to protect your organization [1 ed.] |
Cole, Eric |
1 |
| 1049 |
|
Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies [1st Edition] |
Ira Winkler and Araceli Treu Gomes (Auth.) |
1 |
| 1050 |
|
Advanced Persistent Threat |
|
|
| 1051 |
|
Aggressive Network Self-defense [1 ed.] |
Neil R. Wyler, Bruce Potter, Chris Hurley |
1 |
| 1052 |
|
Aggressive Network Self-Defense [1st ed.] |
Chris Hurley |
1 |
| 1053 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android |
Hoog, Andrew |
|
| 1054 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android [1 ed.] |
Andrew Hoog |
1 |
| 1055 |
|
Antivirus Engines : From Methods to Innovations, Design, and Applications |
Paul A. Gagniuc |
|
| 1056 |
|
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure [1 ed.] |
Eric D. Knapp, Raj Samani |
1 |
| 1057 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis [1 ed.] |
Chris Sanders, Jason Smith |
1 |
| 1058 |
|
Applied network security monitoring : collection, detection, and analysis |
Chris Sanders, Jason Smith |
|
| 1059 |
|
AVIEN Malware Defense Guide for the Enterprise |
David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja |
|
| 1060 |
|
Audio Content Security. Attack Analysis on Audio Watermarking [1 ed.] |
Sogand Ghorbani, Iraj Sadegh Amiri |
1 |
| 1061 |
|
Black Hat Physical Device Security: Exploiting Hardware and Software [1 ed.] |
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services |
1 |
| 1062 |
|
Botnets- The Killer Web App |
|
|
| 1063 |
|
Botnets: The Killer Web App |
Craig Schiller, Jim Binkley, Gadi Evron, Carsten Willems, Tony Bradley, David Harley, Michael Cross |
|
| 1064 |
|
Buffer Overflow Attacks: Detect, Exploit, Prevent |
James C. Foster &, Vitaly Osipov &, Nish Bhalla,Deckard, Jason |
|
| 1065 |
|
Building a Practical Information Security Program [1 ed.] |
Jason Andress, Mark Leary |
1 |
| 1066 |
|
Building an Intelligence-Led Security Program [1 ed.] |
Allan Liska |
1 |
| 1067 |
|
Buffer Overflow Attacks: Detect, Exploit, Prevent |
James C. Foster |
|
| 1068 |
|
Building a Practical Information Security Program |
Jason Andress, Mark Leary |
|
| 1069 |
|
Check Point Next Generation Security Administration [1 ed.] |
Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon |
1 |
| 1070 |
|
Check Point NGX R65 Security Administration |
Ralph Bonnell |
|
| 1071 |
|
Check Point™ Next Generation with Application Intelligence Security [1st ed.] |
Chris Tobkin, Daniel Kligerman |
1 |
| 1072 |
|
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting [1 ed.] |
Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon |
1 |
| 1073 |
|
Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting |
|
|
| 1074 |
|
Check Point NG/AI: Next Generation with Application Intelligence Security Administration [1st ed.] |
Chris Tobkin, Daniel Kligerman |
1 |
| 1075 |
|
CheckPoint NG Security Administration [2 ed.] |
Dan Kaminsky |
2 |
| 1076 |
|
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity [1st ed.] |
Dale Liu |
1 |
| 1077 |
|
CISSP Study Guide [1 ed.] |
Eric Conrad, Seth Misenar, Joshua Feldman |
1 |
| 1078 |
|
Cisco Security Professional's Guide to Secure Intrusion Detection Systems |
Baumrucker C.T., Burton J.D., Dentler S. |
|
| 1079 |
|
Cisco Security Professionals Guide To Secure Intrusion Detection Systems Ebook [1 ed.] |
Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky |
1 |
| 1080 |
|
CISSP® Study Guide [4 ed.] |
Eric Conrad, Seth Misenar, Joshua Feldman |
4 |
| 1081 |
|
Cisco PIX Firewall Einrichtung und Betrieb einer sicheren Firewall |
|
|
| 1082 |
|
Cisco security specialist's guide to PIX Firewall [1 ed.] |
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver |
1 |
| 1083 |
|
CISSP Study Guide [3rd edition] |
Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman |
3 |
| 1084 |
|
Client-Side Attacks and Defense [1 ed.] |
Oriyano Sean-Philip, Robert Shimonski |
1 |
| 1085 |
|
Client-side Attacks and Defense |
Oriyano, Sean-Philip,Shimonski, Robert |
|
| 1086 |
|
Cisco PIX Firewalls: configure / manage / troubleshoot [2 ed.] |
Charles Riley (Editor) |
2 |
| 1087 |
|
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E [3 ed.] |
Ido Dubrawsky, Jeremy Faircloth |
3 |
| 1088 |
|
Configuring Juniper Networks NetScreen & SSG Firewalls |
Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin |
|
| 1089 |
|
Configuring SonicWALL firewalls |
Chris Lathem, Daniel H Bendell, Benjamin W Fortenberry, Kevin Lynn, Joshua Reed |
|
| 1090 |
|
Configuring ISA Server 2000 Building Firewalls for Windows 2000 [1 ed.] |
Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal |
1 |
| 1091 |
|
Configuring Net: Screen Firewalls [1 ed.] |
Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell and Kenneth Tam (Auth.) |
1 |
| 1092 |
|
Configuring Sonicwall Firewalls [2 ed.] |
Charles Riley (Editor) |
2 |
| 1093 |
|
Configuring Check Point NGX VPN-1/FireWall-1 [2 ed.] |
Charles Riley (Editor) |
2 |
| 1094 |
|
Configuring NetScreen Firewalls [1 ed.] |
Rob Cameron |
1 |
| 1095 |
|
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation |
Ted G. Lewis |
|
| 1096 |
|
Cross Site Scripting Attacks [2nd ed.] |
Jay Beale |
2 |
| 1097 |
|
Cyber adversary characterization : auditing the hacker mind |
Tom Parker, et al |
|
| 1098 |
|
Cyber Security and IT Infrastructure Protection |
John R. Vacca |
|
| 1099 |
|
Cyber Security and IT Infrastructure Protection [1 ed.] |
John R. Vacca |
1 |
| 1100 |
|
Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners [2 ed.] |
Jason Andress and Steve Winterfeld (Auth.) |
2 |
| 1101 |
|
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners [1 ed.] |
Jason Andress, Steve Winterfeld |
1 |
| 1102 |
|
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard [1 ed.] |
Brett Shavers |
1 |
| 1103 |
|
Cyberwarfare: Information Operations in a Connected World [2 ed.] |
Mike Chapple, David Seidl |
2 |
| 1104 |
|
Cya Securing Exchange Server 2003 & Outlook Web Access |
|
|
| 1105 |
|
CYA Securing IIS 6.0. Cover Your A** by Getting It Right the First Time |
Chun Hai (Bernard) Cheah, Ken Schaefer and Chris Peiris (Auth.) |
|
| 1106 |
|
CYA: Securing Exchange Server 2003 & Outlook Web Access [1st ed.] |
Henrik Walther, Patrick Santry |
1 |
| 1107 |
|
Cyberspaces and Global Affairs |
Perry, Jake, Costigan, Sean S, Professor |
|
| 1108 |
|
Cyber Security Awareness for Accountants and CPAs [1 ed.] |
David Willson, Henry Dalziel |
1 |
| 1109 |
|
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives [1st ed.] |
Ted Fair, Michael Nordfelt, Sandra Ring |
1 |
| 1110 |
|
Cyber Security Awareness for Lawyers [1 ed.] |
David Willson, Henry Dalziel |
1 |
| 1111 |
|
Cybersecurity and Applied Mathematics [1 ed.] |
Leigh Metcalf, William Casey |
1 |
| 1112 |
|
Detecting and Combating Malicious Email |
Cade Kamachi, Julie JCH Ryan |
|
| 1113 |
|
Dictionary of Information Security |
Robert Slade |
|
| 1114 |
|
Digital Forensics, Investigation, and Response [4 ed.] |
Chuck Easttom |
4 |
| 1115 |
|
Digital Forensics Processing and Procedures [1 ed.] |
|
1 |
| 1116 |
|
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data [1 ed.] |
Terrence V. Lillard |
1 |
| 1117 |
|
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition [Revised] |
Jayson E Street, Kent Nabors, Dustin L. Fritz |
|
| 1118 |
|
Dissecting the hack the V3rb0ten network [Online-Ausg ed.] |
Baskin, Brian,Martin, Brian,Sims, Kristin,Street, Jayson E |
|
| 1119 |
|
DNS Security. Defending the Domain Name System [1 ed.] |
Allan Liska, Geoffrey Stowe |
1 |
| 1120 |
|
Dr Tom Shinder's ISA Server and Beyond : Real World Security Solutions for Microsoft Enterprise Networks |
Syngress |
|
| 1121 |
|
Dr. Tom Shinder's ISA Server 2006 Migration Guide |
Thomas W Shinder, Debra Littlejohn Shinder, Adrian F. Dimcev, James Eaton-Lee, Jason Jones, Steve Moffat |
|
| 1122 |
|
Dr. Tom Shinder's ISA Server and Beyond. Real World Security Solutions for Microsoft Enterprise Networks |
M.D. Thomas W. Shinder, Debra Littlejohn Shinder and Martin Grasdal (Auth.) |
|
| 1123 |
|
Elementary Information Security [2 ed.] |
Richard E. Smith |
2 |
| 1124 |
|
Elementary Information Security [3 ed.] |
Richard E. Smith |
3 |
| 1125 |
|
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures [1 ed.] |
Brian Contos, Dave Kleiman |
1 |
| 1126 |
|
E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets |
Michael R. Overly |
|
| 1127 |
|
Essential Skills for Hackers [1 ed.] |
Kevin Cardwell, Henry Dalziel |
1 |
| 1128 |
|
Ethical Hacking: Techniques, Tools, and Countermeasures [4 ed.] |
Michael G. Solomon, Sean-Philip Oriyano |
4 |
| 1129 |
|
Ethereal Packet Sniffing [1 ed.] |
Syngress |
1 |
| 1130 |
|
Executing Windows Command Line Investigations. While Ensuring Evidentiary Integrity [1 ed.] |
Chet Hosmer, Joshua Bartolomie, Rosanne Pelli |
1 |
| 1131 |
|
Firewall policies and VPN configurations |
Anne Henmi, Mark Lucas, Abhishek Singh, Chris Cantrell |
|
| 1132 |
|
FISMA Certification & Accreditation Handbook [1 ed.] |
Laura P. Taylor, L. Taylor |
1 |
| 1133 |
|
FISMA Compliance Handbook: Second Edition [1 ed.] |
Laura P. Taylor |
1 |
| 1134 |
|
FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security |
Stephen D. Gantz and Daniel R. Philpott (Eds.) |
|
| 1135 |
|
FISMA certification & accreditation handbook |
Laura Taylor, Matthew Shepherd |
|
| 1136 |
|
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security [1 ed.] |
Stephen D. Gantz, Daniel R. Philpott |
1 |
| 1137 |
|
Fundamentals of information systems security [3 ed.] |
Kim, David, Solomon, Michael G |
3 |
| 1138 |
|
GFI Network Security and PCI Compliance Power Tools [1st ed.] |
Brien Posey |
1 |
| 1139 |
|
Google Hacking for Penetration Testers [3 ed.] |
Johnny Long, Bill Gardner, Justin Brown |
3 |
| 1140 |
|
Google hacking for penetration testers. / Volume 2 |
Long, Johnny |
|
| 1141 |
|
Hack Proofing Sun Solaris 8 [1 ed.] |
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress |
1 |
| 1142 |
|
Hack Proofing Windows 2000 Server |
Syngress, Syngress Publishing, Ryan Russell |
|
| 1143 |
|
HACK PROOFING XML [1 ed.] |
Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis, Jr. Franklin |
1 |
| 1144 |
|
Hack Proofing Your E-commerce Site [1 ed.] |
Ryan Russell |
1 |
| 1145 |
|
Hack Proofing Your Identity [1 ed.] |
Teri Bidwell |
1 |
| 1146 |
|
Hack proofing your network |
David R Mirza Ahmad, Ryan Russell, et al |
|
| 1147 |
|
Hack Proofing Your Network: Internet Tradecraft [1 ed.] |
Ryan Russell |
1 |
| 1148 |
|
Hack proofing your wireless network |
Christian Barnes, Neal O'Farrell, et al |
|
| 1149 |
|
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network |
Michael Gregg |
|
| 1150 |
|
Hacking Web Apps: Detecting and Preventing Web Application Security Problems [1 ed.] |
Mike Shema |
1 |
| 1151 |
|
Hackproofing Your Wireless Network [1 ed.] |
Syngress, Eric Ouellet, Neal O'Farrell |
1 |
| 1152 |
|
Hacking a Terror Network: The Silent Threat of Covert Channels [1 ed.] |
Ryan Russell |
1 |
| 1153 |
|
Hack Proofing Your Network [1 ed.] |
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress |
1 |
| 1154 |
|
Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems [1 ed.] |
Edward Griffor |
1 |
| 1155 |
|
HCISPP Study Guide [1 ed.] |
Timothy Virtue, Justin Rainey |
1 |
| 1156 |
|
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis [1 ed.] |
Bair, John, Shavers, Brett |
1 |
| 1157 |
|
Host and Network Security for Microsoft, UNIX, and Oracle |
Chris Adams |
|
| 1158 |
|
How to Cheat at Managing Information Security |
Mark Osborne |
|
| 1159 |
|
How to cheat at securing your network |
Ido Dubrawsky |
|
| 1160 |
|
How to Define and Build an Effective Cyber Threat Intelligence Capability [1 ed.] |
Henry Dalziel, Eric Olson, James Carnall |
1 |
| 1161 |
|
i: Phone and i: OS Forensics. Investigation, Analysis and Mobile Security for Apple i: Phone, i: Pad and i: OS Devices [1 ed.] |
Andrew Hoog And Katie Strzempka (Auth.) |
1 |
| 1162 |
|
Implementing digital forensic readiness : from reactive to proactive process [1 ed.] |
Ivtchenko, Dmitri, Sachowski, Jason |
1 |
| 1163 |
|
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |
Eric Knapp |
|
| 1164 |
|
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [1 ed.] |
Eric D. Knapp |
1 |
| 1165 |
|
Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [2 ed.] |
Eric D. Knapp, Joel Thomas Langill |
2 |
| 1166 |
|
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data [1 ed.] |
Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin |
1 |
| 1167 |
|
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis |
Mark Talabis, Jason Martin |
|
| 1168 |
|
Information Security Principles and Practice |
Mark Stamp |
|
| 1169 |
|
InfoSec Career Hacking Sell Your Skillz, Not Your Soul |
Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley |
|
| 1170 |
|
InfoSec Career Hacking [1 ed.] |
Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley, James C. Foster, Christopher W. Klaus |
1 |
| 1171 |
|
InfoSecurity 2008 Threat Analysis [1 ed.] |
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg |
1 |
| 1172 |
|
Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders |
Susan E. McGregor |
|
| 1173 |
|
Information Security Illuminated [1 ed.] |
Michael G. Solomon, Mike Chapple |
1 |
| 1174 |
|
Insider Threat. Protecting the Enterprise from Sabotage, Spying, and Theft |
Eric Cole and Sandra Ring (Auth.) |
|
| 1175 |
|
Internet and Web Application Security [3 ed.] |
Mike Harwood, Ron Price |
3 |
| 1176 |
|
Introduction to Information Security. A Strategic-Based Approach [1 ed.] |
Timothy Shimeall and Jonathan Spring (Auth.) |
1 |
| 1177 |
|
Intrusion Prevention and Active Response [1 ed.] |
Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin |
1 |
| 1178 |
|
Intrusion Prevention and Active Response. Deploying Network and Host IPS |
Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard and Jake Babbin (Eds.) |
|
| 1179 |
|
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices [1 ed.] |
Andrew Hoog, Katie Strzempka |
1 |
| 1180 |
|
JavaScript for hackers: Learn to think like a hacker |
Gareth Heyes |
|
| 1181 |
|
Legal and Privacy Issues in Information Security |
Grama, Joanna Lyn, |
|
| 1182 |
|
Legal and Privacy Issues in Information Security [3 ed.] |
Joanna Lyn Grama |
3 |
| 1183 |
|
Legal Issues in Information Security, 2nd Edition [2 ed.] |
Joanna Lyn Grama |
2 |
| 1184 |
|
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems [1 ed.] |
Cameron H. Malin, Eoghan Casey BS MA, James M. Aquilina |
1 |
| 1185 |
|
Managing Cisco Network Security [2 ed.] |
|
2 |
| 1186 |
|
Managing Information Security [2 ed.] |
John R. Vacca (editor) |
2 |
| 1187 |
|
Managing Risk in Information Systems, 3rd Edition [3 ed.] |
Darril Gibson, Andy Igonor |
3 |
| 1188 |
|
Managing Cisco Network Security [1 ed.] |
Florent Parent, Oliver Steudler |
1 |
| 1189 |
|
Managing Information Security [1 ed.] |
John R. Vacca |
1 |
| 1190 |
|
Managing Cisco Network Security Building Rock-Solid Networks |
|
|
| 1191 |
|
MCSE (Exam 70-298) Study Guide. Designing security for a Windows Server 2003 network: Exam 70-298 |
Elias N. Khnaser, Susan Snedaker, Chris Peiris, Rob Amini and Laura E. Hunter (Eds.) |
|
| 1192 |
|
MCSE Designing Security for a Windows Server 2003 Network [1st ed.] |
Elias Khasner, Laura E. Hunter |
1 |
| 1193 |
|
MCSE Implementing and Administering Security in a Windows 2000 Network Study Guide [1 ed.] |
Will Schmied, Thomas W. Shinder |
1 |
| 1194 |
|
Mission Critical Internet Security [1 ed.] |
Bradley Dunsmore |
1 |
| 1195 |
|
Mobile Security and Privacy. Advances, Challenges and Future Research Directions [1 ed.] |
Man Ho Au, Raymond Choo |
1 |
| 1196 |
|
Mobile Data Loss: Threats and Countermeasures [1 ed.] |
Michael T. Raggo |
1 |
| 1197 |
|
Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series) [1 ed.] |
Neil Archibald, Gilbert Ramirez, Noam Rathaus |
1 |
| 1198 |
|
Network performance and security: testing and analyzing using open source and low-cost tools |
Chapman, Chris |
|
| 1199 |
|
Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance) [1 ed.] |
J. Stewart |
1 |
| 1200 |
|
Nessus Network Auditing [1 ed.] |
Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson |
1 |
| 1201 |
|
Nessus Network Auditing [2 ed.] |
Russ Rogers |
2 |
| 1202 |
|
Netcat Power Tools [1 ed.] |
Jan Kanclirz, Brian Baskin, Thomas Wilhelm |
1 |
| 1203 |
|
Netcat Power Tools |
Jan Kanclirz, Brian Baskin, Thomas Wilhelm |
|
| 1204 |
|
Network and System Security |
John R. Vacca |
|
| 1205 |
|
Network Security Assessment: From Vulnerability to Patch [1 ed.] |
Steve Manzuik, Andre Gold, Chris Gatford |
1 |
| 1206 |
|
Network and System Security [2nd Edition] |
John R. Vacca |
2 |
| 1207 |
|
Network Intrusion Analysis |
|
|
| 1208 |
|
Network Security, Firewalls, and VPNs, 3rd Edition |
J. Michael Stewart, Denise Kinsey |
|
| 1209 |
|
Network security firewalls and VPNs [2nd ed.] |
Stewart, James Michael |
2 |
| 1210 |
|
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques |
Thomas Wilhelm, Jason Andress |
|
| 1211 |
|
No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing |
Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick |
|
| 1212 |
|
Nokia Firewall, VPN, and IPSO Configuration Guide |
Andrew Hay, Keli Hay, Peter Giannoulis |
|
| 1213 |
|
Nmap in the Enterprise: Ваше руководство к сети Сканирование |
Angela Orebaugh, Becky Pinkard |
|
| 1214 |
|
Nmap in the Enterprise: Your Guide to Network Scanning |
Angela Orebaugh, Becky Pinkard |
|
| 1215 |
|
Nokia network security : solutions handbook |
Doug Maxwell, Cherie Amon |
|
| 1216 |
|
Nokia Network Security Solutions Handbook [1 ed.] |
Syngress, Doug Maxwell |
1 |
| 1217 |
|
OSSEC Host-Based Intrusion Detection Guide |
Andrew Hay, Daniel Cid, Rory Bray |
|
| 1218 |
|
PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance [4 ed.] |
Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY |
4 |
| 1219 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [3° ed.] |
Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY. |
3 |
| 1220 |
|
PCI Compliance |
Bradley T. (ed.) |
|
| 1221 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [2 ed.] |
Anton Chuvakin, Branden R. Williams |
2 |
| 1222 |
|
Perfect Password: Selection, Protection, Authentication |
Mark Burnett |
|
| 1223 |
|
Perfect Password: Selection, Protection, Authentication [1 ed.] |
Mark Burnett, Dave Kleiman |
1 |
| 1224 |
|
Perfect Passwords. Selection, Protection, Authentication |
Mark Burnett and Dave Kleiman (Auth.) |
|
| 1225 |
|
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft [1 ed.] |
Markus Jakobsson, Steven Myers |
1 |
| 1226 |
|
Phishing Exposed |
Lance James, (Auth.) |
|
| 1227 |
|
Physical and logical security convergence: powered by enterprise security management [1 ed.] |
Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole |
1 |
| 1228 |
|
Power and security in the information age: investigating the role of the state in cyberspace [1 ed.] |
Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) |
1 |
| 1229 |
|
Practical Deployment of Cisco Identity Services Engine [1 ed.] |
Andy Richter, Jeremy Wood |
1 |
| 1230 |
|
Protecting Patient Information. A Decision-Maker's Guide to Risk, Prevention, and Damage Control [1 ed.] |
Paul Cerrato |
1 |
| 1231 |
|
Publishing IT Security Project Management Handbook |
|
|
| 1232 |
|
Research Methods for Cyber Security [1st Edition] |
Thomas Edgar and David Manz (Auth.) |
1 |
| 1233 |
|
Rogue Code: A Jeff Aiken Novel |
Mark Russinovich |
|
| 1234 |
|
HACKING: Become The Ultimate Hacker - Computer Virus, Cracking, Malware, IT Security |
Joseph Connor |
|
| 1235 |
|
Hacking: Hacking for Beginners - Computer Virus, Cracking, Malware, IT Security - 2nd Edition (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security) |
Connor, Joseph |
|
| 1236 |
|
The little black book of computer viruses Volume 1 |
Mark A. Ludwig |
|
| 1237 |
|
Scene of the Cybercrime: Computer Forensics Handbook |
Debra Littlejohn Shinder, Ed Tittel (editor) |
|
| 1238 |
|
Scene of the CyberCrime - Computer Forensics Handbook |
|
|
| 1239 |
|
Scene of the Cybercrime, Second Edition [2 ed.] |
Debra Littlejohn Shinder, Michael Cross |
2 |
| 1240 |
|
Scene of the Cybercrime: Computer Forensics Handbook [1 ed.] |
Debra Littlejohn Shinder, Ed Tittel |
1 |
| 1241 |
|
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century |
Christopher Burgess, Richard Power |
|
| 1242 |
|
Securing the Smart Grid: Next Generation Power Grid Security |
Tony Flick, Justin Morehouse |
|
| 1243 |
|
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT |
Eric Seagren |
|
| 1244 |
|
Securing SQL Server, Third Edition: Protecting Your Database from Attackers [3 ed.] |
Denny Cherry |
3 |
| 1245 |
|
Securing SQL Server: Protecting Your Database from Attackers [2 ed.] |
Denny Cherry |
2 |
| 1246 |
|
Securing the Internet of Things [1st Edition] |
Shancang Li and Li Da Xu (Auth.) |
1 |
| 1247 |
|
Securing VoIP: Keeping Your VoIP Network Safe [1 ed.] |
Regis J. Jr (Bud) Bates |
1 |
| 1248 |
|
Securing Windows Server 2008: Prevent Attacks from Outside |
Aaron Tiensivu |
|
| 1249 |
|
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization |
Aaron Tiensivu |
|
| 1250 |
|
Security Assessment: Case Studies for Implementing the NSA IAM [2 ed.] |
Sean Thurston |
2 |
| 1251 |
|
Security Assessment [1st ed.] |
Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra |
1 |
| 1252 |
|
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts |
Derrick Rountree |
|
| 1253 |
|
Security sage's guide to hardening the network infrastructure |
Steven Andrés, et al |
|
| 1254 |
|
Security+ study guide |
Michael Cross, Norris L Jr Johnson, Tony Piltzecker, Robert J Shimonski, Debra Littlejohn Shinder |
|
| 1255 |
|
Security+ Study Guide and DVD Training System [1 ed.] |
Norris L. Johnson, Michael Cross, Tony Piltzecker, Robert J. Shimonski, Debra Littlejohn Shinder |
1 |
| 1256 |
|
Security+ Study Guide and DVD Training System [1 ed.] |
Norris L. Johnson, Michael Cross, Tony Piltzecker |
1 |
| 1257 |
|
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks) |
Dan York |
|
| 1258 |
|
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks) |
Stacy Prowell, Rob Kraus, Mike Borkin |
|
| 1259 |
|
Seven Deadliest USB Attacks |
Brian Anderson, Barbara Anderson |
|
| 1260 |
|
Seven Deadliest Wireless Technologies Attacks |
Haines, Brad |
|
| 1261 |
|
Simple Steps to Data Encryption: A Practical Guide to Secure Computing |
Pete Loshin |
|
| 1262 |
|
Smart Technologies And The End(s) Of Law: Novel Entanglements Of Law And Technology [1st Edition] |
Mireille Hildebrandt |
1 |
| 1263 |
|
Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense [1 ed.] |
Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.) |
1 |
| 1264 |
|
Snort 2.0 Intrusion Detection [1 ed.] |
Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth |
1 |
| 1265 |
|
Snort 2.1 Intrusion Detection, Second Edition [1 ed.] |
Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin |
1 |
| 1266 |
|
Snort 2.1 Intrusion Detection [1 ed.] |
Johnny Long, Ed Skoudis, Alrik van Eijkelenborg |
1 |
| 1267 |
|
Smart Technologies and the End(s) of Law: Novel Entanglements of Law and Technology |
Mireille Hildebrandt |
|
| 1268 |
|
Snort IDS and IPS Toolkit |
Brian Caswell, Jay Beale, Andrew Baker |
|
| 1269 |
|
Sniffer Pro Network Optimization and Troubleshooting Handbook [1 ed.] |
Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko |
1 |
| 1270 |
|
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle [1 ed.] |
Erik Pace Birkholz, Stuart McClure |
1 |
| 1271 |
|
SQL Injection Attacks and Defense [2 ed.] |
Justin Clarke |
2 |
| 1272 |
|
SSCP Systems Security Certified Practitioner Study Guide |
Syngress |
|
| 1273 |
|
SSCP Study Guide [1 ed.] |
Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth |
1 |
| 1274 |
|
SSCP Systems Security Certified Practitioner Study Guide and DVD Training System [1 ed.] |
Syngress |
1 |
| 1275 |
|
SSCP : study guide and & DVD training system |
Josh Jacobs |
|
| 1276 |
|
SQL injection attacks and defense [2nd ed.] |
Clarke, Justin |
2 |
| 1277 |
|
SQL Injection Attacks and Defense [2nd Edition] |
Justin Clarke, Kevvie Fowler, Erlend Oftedal, Rodrigo Marcos Alvarez |
2 |
| 1278 |
|
Stealing the Network: How to Own a Continent [1st ed.] |
FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale |
1 |
| 1279 |
|
Stealing the Network: How to Own a Shadow. The Chase for Knuth |
Johnny Long, Timothy (Thor) Mullen and Ryan Russell (Auth.) |
|
| 1280 |
|
State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law |
Eliza Watt |
|
| 1281 |
|
Stealing The Network How To Own A Continent |
|
|
| 1282 |
|
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD [1 ed.] |
Johnny Long, Ryan Russell, Timothy Mullen |
1 |
| 1283 |
|
Syngress force emerging threat analysis : from mischief to malicious |
David Maynor, et al |
|
| 1284 |
|
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious |
Michael Gregg, Brian Baskin |
|
| 1285 |
|
System Forensics, Investigation, and Response [3rd ed.] |
Chuck Easttom |
3 |
| 1286 |
|
Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware [1 ed.] |
Aditya Sood and Richard Enbody (Auth.) |
1 |
| 1287 |
|
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook [Pap/DVD ed.] |
Jack Wiles |
|
| 1288 |
|
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators |
Wiles J., Long J., Rogers R. |
|
| 1289 |
|
Techno Security's Guide to Securing SCADA. A Comprehensive Handbook On Protecting The Critical Infrastructure |
Jack Wiles (Auth.) |
|
| 1290 |
|
Techno Securitys Guide to Managing Risks for IT Managers, Auditors and Investigators |
Jack Wiles, Johnny Long, Russ Rogers, Ron Green |
|
| 1291 |
|
Terrorism in cyberspace : the next generation |
Weimann, Gabriel |
|
| 1292 |
|
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online [1 ed.] |
Denny Cherry |
1 |
| 1293 |
|
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice [1 ed.] |
Jason Andress |
1 |
| 1294 |
|
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [1 ed.] |
Patrick Engebretson |
1 |
| 1295 |
|
The Best Damn Firewall Book Period [1 ed.] |
Syngress Media Inc |
1 |
| 1296 |
|
The Best Damn Firewall Book Period [2 ed.] |
Thomas W Shinder |
2 |
| 1297 |
|
The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age [1st ed.] |
Mark S. Merkow CCP, James Breithaupt |
1 |
| 1298 |
|
The History of Information Security: A Comprehensive Handbook [1 ed.] |
Karl M. M. de Leeuw, Jan Bergstra, Karl Maria Michael de Leeuw |
1 |
| 1299 |
|
The international handbook of computer security |
Jae K. Shim |
|
| 1300 |
|
Trojan Horse: A Jeff Aiken Novel |
Mark Russinovich, Kevin Mitnick |
|
| 1301 |
|
War: Driving and Wireless Penetration Testing [1 ed.] |
Chris Hurley, Russ Rogers, Frank Thornton, Daniel Connelly and Brian Baker (Auth.) |
1 |
| 1302 |
|
CISSP Practice Exams [3e edition] |
Harris, Shon |
3 |
| 1303 |
|
Advanced malware analysis [1 ed.] |
Elisan, Christopher C |
1 |
| 1304 |
|
CompTIA security+ (exam SY0-401) [4th ed] |
Dunkerley, Dawn, Meyers, Mike, Samuelle, T. J |
4 |
| 1305 |
|
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments [1 ed.] |
Ric Messier |
1 |
| 1306 |
|
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) [5th ed.] |
Wm. Arthur Conklin, Gregory White |
5 |
| 1307 |
|
CompTIA Security+ All-in-One Exam Guide [2 ed.] |
Gregory White, Wm. Arthur Conklin, Dwayne Williams, Roger Davis, Chuck Cothren |
2 |
| 1308 |
|
CompTIA Security+ (Exam SY0-501) [5 ed.] |
Dawn Dunkerley |
5 |
| 1309 |
|
Hacking Exposed Linux, 3rd Edition [3 ed.] |
ISECOM |
3 |
| 1310 |
|
Anti-Hacker Tool Kit [2 ed.] |
Mike Shema, Bradley C. Johnson |
2 |
| 1311 |
|
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions |
Bodungen, Clint E.,Hilt, Stephen,Shbeeb, Aaron,Singer, Bryan L.,Wilhoit, Kyle |
|
| 1312 |
|
CompTIA security+ all-in-one exam guide, (Exam SY0-501) [Fifth edition] |
Conklin, W. Arthur,White, Greg,Williams, Dwayne,Cothren, Chuck,Davis, Roger L |
|
| 1313 |
|
Network Security: A Beginner’s Guide [2 ed.] |
Maiwald, Eric |
2 |
| 1314 |
|
Anti-Hacker Tool Kit [Fourth edition /] |
Shema, Mike |
|
| 1315 |
|
Network security: the complete reference |
Bragg, Roberta,Strassberg, Keith,Rhodes-Ousley, Mark |
|
| 1316 |
|
Securing the Clicks Network Security in the Age of Social Media |
Gary Bahadur, Jason Inasi, Alex de Carvalho |
|
| 1317 |
|
Network Security: A Beginners Guide |
Eric Maiwald |
|
| 1318 |
|
Anti-Spam Tool Kit [1 ed.] |
Paul Wolfe, Charlie Scott, Mike Erwin |
1 |
| 1319 |
|
CompTIA Security+ Certification Practice Exams (Exam SY0-501) [3 ed.] |
Daniel Lachance, Glen E. Clarke |
3 |
| 1320 |
|
CompTIA Security+ Certification Bundle (Exam SY0-601) |
Glen E. Clarke |
|
| 1321 |
|
Gray Hat Hacking: The Ethical Hacker’s Handbook [4 ed.] |
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims |
4 |
| 1322 |
|
The Law and Economics of Cybersecurity |
Mark F. Grady, Francesco Parisi |
|
| 1323 |
|
Data Analytics for Cybersecurity |
Vandana P. Janeja |
|
| 1324 |
|
Wireless Internet Security: Architecture and Protocols [1 ed.] |
James Kempf |
1 |
| 1325 |
|
The Net And The Nation State: Multidisciplinary Perspectives On Internet Governance [1 ed.] |
Uta Kohl |
1 |
| 1326 |
|
Privacy And Power: A Transatlantic Dialogue In The Shadow Of The NSA-Affair [1 ed.] |
Russell A. Miller |
1 |
| 1327 |
|
Cyber Security And The Politics Of Time [1st Edition] |
Tim Stevens |
1 |
| 1328 |
|
Cyber Mercenaries: The State, Hackers, and Power |
Tim Maurer |
|
| 1329 |
|
Cyber Peace: Charting A Path Toward A Sustainable, Stable, And Secure Cyberspace [1 ed.] |
Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen |
1 |
| 1330 |
|
Governing New Frontiers In The Information Age: Toward Cyber Peace [1st Edition] |
Scott J. Shackelford |
1 |
| 1331 |
|
Network Security: A Decision and Game-Theoretic Approach [1 ed.] |
Tansu Alpcan, Tamer Baar |
1 |
| 1332 |
|
Information Theoretic Security and Privacy of Information Systems [1 ed.] |
Rafael F. Schaefer, Holger Boche, Ashish Khisti, H. Vincent Poor |
1 |
| 1333 |
|
Hacking exposed, network security secrets and solutions [Notations ed.] |
Joel Scambray |
|
| 1334 |
|
Wireless security |
Merritt Maxim, David Pollino |
|
| 1335 |
|
Wi-Fi security |
Miller, Stewart S |
|
| 1336 |
|
IT Auditing Using Controls to Protect Information Assets, 2nd Edition [2 ed.] |
Chris Davis, Mike Schiller, Kevin Wheeler |
2 |
| 1337 |
|
IT Auditing: Using Controls to Protect Information Assets [1 ed.] |
Chris Davis, Mike Schiller, Kevin Wheeler |
1 |
| 1338 |
|
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) |
Jonathan S. Weissman |
|
| 1339 |
|
IT Auditing Using Controls to Protect Information Assets [3rd ed.] |
Mike Kegerreis,Mike Schiller,Chris Davis |
3 |
| 1340 |
|
Hacking Exposed: Mobile Security Secrets & Solutions |
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
|
| 1341 |
|
Certification and Security in Health-Related Web Applications: Concepts and Solutions |
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis |
|
| 1342 |
|
Medical Device Cybersecurity for Engineers and Manufacturers [2 ed.] |
Axel Wirth |
2 |
| 1343 |
|
Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT) |
Sunil Gupta, Hitesh Kumar Sharma, Monit Kapoor |
|
| 1344 |
|
Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States [1 ed.] |
Matthew Webster |
1 |
| 1345 |
|
Cybersecurity for Connected Medical Devices [1 ed.] |
Arnab Ray |
1 |
| 1346 |
|
Future Trends in Biomedical and Health Informatics and Cybersecurity in Medical Devices: Proceedings of the International Conference on Biomedical and Health Informatics, ICBHI 2019, 17-20 April 2019, Taipei, Taiwan [1st ed. 2020] |
Kang-Ping Lin, Ratko Magjarevic, Paulo de Carvalho |
1 |
| 1347 |
|
How HIPAA Can Crush Your Medical Practice: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It |
Craig a Petronella |
|
| 1348 |
|
Health Data in the Information Age : Use, Disclosure, and Privacy [1 ed.] |
Institute of Medicine, Committee on Regional Health Data Networks, Kathleen N. Lohr, Molla S. Donaldson |
1 |
| 1349 |
|
Biometrics: Theory, Applications, and Issues : Theory, Applications, and Issues [1 ed.] |
Ellen R. Nichols |
1 |
| 1350 |
|
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security |
John Medicine |
|
| 1351 |
|
Decrypting the Encryption Debate: A Framework for Decision Makers [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Law Enforcement and Intelligence Access to Plaintext Information |
1 |
| 1352 |
|
Recoverability As a First-Class Security Objective: Proceedings of a Workshop [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Frances Johnson |
1 |
| 1353 |
|
Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Peter J. Weinberger, Baruch Fischhoff, Lynette I. Millett |
1 |
| 1354 |
|
Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop [1 ed.] |
and Medicine Engineering National Academies of Sciences, Forum on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Johnson |
1 |
| 1355 |
|
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Planning Committee for a Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext, Jon Eisenberg, Emily Grumbling, Anne Johnson |
1 |
| 1356 |
|
Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies [1 ed.] |
Alessandro Parisi |
1 |
| 1357 |
|
AI in Cybersecurity |
Leslie F. Sikos (Editor) |
|
| 1358 |
|
Confluence of AI, Machine, and Deep Learning in Cyber Forensics |
Sanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (editor) |
|
| 1359 |
|
Cyber defense mechanisms security, privacy, and challenges |
Kumar, Gautam(Editor),Saini, Dinesh Kumar(Editor),Cuong, Nguyen Ha Huy(Editor) |
|
| 1360 |
|
AI-Enabled Threat Detection and Security Analysis for Industrial IoT |
Hadis Karimipour, Farnaz Derakhshan |
|
| 1361 |
|
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications) |
Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Nishan Chelvachandran (editor), Jaime Ibarra (editor) |
|
| 1362 |
|
Policing In The Era Of AI And Smart Societies [1st Edition] |
Hamid Jahankhani, Babak Akhgar, Peter Cochrane, Mohammad Dastbaz |
1 |
| 1363 |
|
Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making |
Hamid Jahankhani, Liam M. O’Dell, Gordon Bowen, Daniel Hagan, Arshad Jamal |
|
| 1364 |
|
AI in the Age of Cyber-Disorder. Actors, Trends, and Prospects |
Fabio Rugge |
|
| 1365 |
|
The NICE Cyber Security Framework: Cyber Security Management |
Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh |
|
| 1366 |
|
The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms |
Raj Badhwar |
|
| 1367 |
|
Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |
Parisi, Alessandro |
|
| 1368 |
|
Practical AI for Cybersecurity [1 ed.] |
Ravi Das |
1 |
| 1369 |
|
Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications [1 ed.] |
Gautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor) |
1 |
| 1370 |
|
Secure and Smart Internet of Things (IoT) Using Blockchain and AI |
Ahmed Banafa |
|
| 1371 |
|
Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) [1 ed.] |
Gautam Kumar (editor), Dinesh Kumar Saini (editor), Nguyen Ha Huy Cuong (editor) |
1 |
| 1372 |
|
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence, 1030) |
Nadia Nedjah (editor), Ahmed A. Abd El-Latif (editor), Brij B. Gupta (editor), Luiza M. Mourelle (editor) |
|
| 1373 |
|
Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21 |
Yassine Maleh, Mamoun Alazab, Noreddine Gherabi, Lo’ai Tawalbeh, Ahmed A. Abd El-Latif |
|
| 1374 |
|
AI, Machine Learning and Deep Learning: A Security Perspective |
Fei Hu, Xiali Hei |
|
| 1375 |
|
Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers |
Chunhua Su, Kouichi Sakurai |
|
| 1376 |
|
Explainable AI for Cybersecurity [1st ed. 2023] |
Zhixin Pan, Prabhat Mishra |
1 |
| 1377 |
|
Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things) |
Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor) |
|
| 1378 |
|
Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies |
Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat |
|
| 1379 |
|
10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques |
Rajvardhan Oak |
|
| 1380 |
|
Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing) [1 ed.] |
Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor) |
1 |
| 1381 |
|
Emerging Role of AI Based Expert Systems in Cyber Defense and Security |
Kirti Raj Bhatele, Astitwa Bhargava, Anand Jha |
|
| 1382 |
|
Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments |
Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu |
|
| 1383 |
|
Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) [1 ed.] |
Ravindra Das |
1 |
| 1384 |
|
Adversarial AI Attacks, Mitigations, and Defense Strategies [1 ed.] |
John Sotiropoulos |
1 |
| 1385 |
|
Combating Cyberattacks Targeting the AI Ecosystem |
Aditya K. Sood |
|
| 1386 |
|
Next-Generation Cybersecurity: AI, ML, and Blockchain (Blockchain Technologies) [2024 ed.] |
Keshav Kaushik (editor), Ishu Sharma (editor) |
2024 |
| 1387 |
|
AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability [2024 ed.] |
Iqbal H. Sarker |
2024 |
| 1388 |
|
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills [1 ed.] |
Clint Bodungen |
1 |
| 1389 |
|
AI Embedded Assurance for Cyber Systems |
Cliff Wang, S. S. Iyengar, Kun Sun |
|
| 1390 |
|
Adaptive Anomalies: AI in Intrusion Detection Systems |
amie Flux |
|
| 1391 |
|
Mastering AI, Machine Learning and Cyber Security |
Rahul Vadisetty |
|
| 1392 |
|
Supply Chain Software Security: AI, IoT, and Application Security |
Aamiruddin Syed |
|
| 1393 |
|
Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions [1 ed.] |
Ahmed A. Abd El-Latif (editor), Lo'ai Tawalbeh (editor), Manoranjan Mohanty (editor), Brij B. Gupta (editor), Konstantinos E. Psannis (editor) |
1 |
| 1394 |
|
Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions [1 ed.] |
Pethuru Raj (editor), B. Sundaravadivazhagan (editor), V. Kavitha (editor) |
1 |
| 1395 |
|
Generative AI, Cybersecurity, and Ethics |
Mohammad Rubyet Islam |
|
| 1396 |
|
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 |
Hamid Jahankhani |
|
| 1397 |
|
AI-Driven: Social Media Analytics and Cybersecurity |
Wael M. S. Yafooz, Yousef Al-Gumaei (Eds.) |
|
| 1398 |
|
Inside Cyber : How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
Chuck Brooks |
|
| 1399 |
|
Safeguarding the Future: Security and Privacy by Design for AI, Metaverse, Blockchain, and Beyond [1 ed.] |
Alan Tang |
1 |
| 1400 |
|
Hacking und Cyber Security mit KI: Prompt Engineering, Phishing, Pentesting, IT security uvm. mithilfe von ChatGPT Inkl. vielen Challenges |
Florian Dalwigk |
|
| 1401 |
|
Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) |
Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) |
|
| 1402 |
|
Deep Learning Applications for Cyber Security [1st ed. 2019] |
Mamoun Alazab, MingJian Tang |
1 |
| 1403 |
|
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions |
Marwan Omar |
|
| 1404 |
|
Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks) |
Kwangjo Kim, Harry Chandra Tanuwidjaja |
|
| 1405 |
|
Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript |
J. D. Glaser |
|
| 1406 |
|
Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) |
Stanislav Abaimov, Maurizio Martellini |
|
| 1407 |
|
Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem |
Soma Halder, Sinan Ozdemir |
|
| 1408 |
|
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python |
Chiheb Chebbi |
|
| 1409 |
|
Data Mining and Machine Learning in Cybersecurity |
Sumeet Dua, Xian Du |
|
| 1410 |
|
Data Mining and Machine Learning in Cybersecurity [1 ed.] |
Sumeet Dua, Xian Du |
1 |
| 1411 |
|
Machine Learning and Cryptographic Solutions for Data Protection and Network Security |
J Anitha Ruth, Vijayalakshmi G V Mahesh, P Visalakshi |
|
| 1412 |
|
Hands-on Machine Learning for Cyber Security |
Soma Halder |
|
| 1413 |
|
Machine learning et security: protecting systems with data and algorithms |
Chio, Clarence,Freeman, David |
|
| 1414 |
|
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings [1 ed.] |
Shlomi Dolev, Sachin Lodha (eds.) |
1 |
| 1415 |
|
Social Network Forensics, Cyber Security, and Machine Learning [1st ed.] |
P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat |
1 |
| 1416 |
|
Machine Learning for Cybersecurity Cookbook |
Emmanuel Tsukerman |
|
| 1417 |
|
Machine learning for computer and cyber security: principles, algorithms, and practices |
Gupta, Brij, Sheng, Quan Z |
|
| 1418 |
|
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings [1st ed. 2019] |
Xiaofeng Chen, Xinyi Huang, Jun Zhang |
1 |
| 1419 |
|
Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python [1 ed.] |
Emmanuel Tsukerman |
1 |
| 1420 |
|
Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals |
Zach Codings |
|
| 1421 |
|
Cyber Security Cryptography and Machine Learning [1st ed.] |
Itai Dinur, Shlomi Dolev, Sachin Lodha |
1 |
| 1422 |
|
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I [1st ed.] |
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang |
1 |
| 1423 |
|
Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings [1st ed.] |
Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
1 |
| 1424 |
|
Cyber Security Meets Machine Learning |
Xiaofeng Chen, Willy Susilo, Elisa Bertino |
|
| 1425 |
|
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III [1st ed.] |
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang |
1 |
| 1426 |
|
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II [1st ed.] |
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang |
1 |
| 1427 |
|
Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings |
Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann |
|
| 1428 |
|
Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) [1st ed. 2022] |
Stanislav Abaimov, Maurizio Martellini |
1 |
| 1429 |
|
Machine Learning for Cyber Security |
Preeti Malik, Lata Nautiyal, Mangey Ram |
|
| 1430 |
|
Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301) [1st ed. 2022] |
Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor) |
1 |
| 1431 |
|
Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks) |
Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li |
|
| 1432 |
|
Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part I |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
| 1433 |
|
Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them |
Ram Shankar, Siva Kumar, Hyrum Anderson |
|
| 1434 |
|
Machine Learning, Image Processing, Network Security and Data Sciences. 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings [Part II] |
Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni |
|
| 1435 |
|
Machine Learning Techniques for Cybersecurity |
Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub |
|
| 1436 |
|
Machine Learning for Cyber Security |
Preeti Malik (editor), Lata Nautiyal (editor), Mangey Ram (editor) |
|
| 1437 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on MIND 2021 |
Rajesh Doriya, Badal Soni, Anupam Shukla, Xiao-Zhi Gao |
|
| 1438 |
|
Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part I |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
| 1439 |
|
Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
| 1440 |
|
Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part III] |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
| 1441 |
|
Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part II] |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
| 1442 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings, Part II |
Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni |
|
| 1443 |
|
Not with a Bug, But with a Sticker : Attacks on Machine Learning Systems and What To Do About Them |
Ram Shankar Siva Kumar, Hyrum Anderson |
|
| 1444 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, ... in Computer and Information Science) |
Nilay Khare (editor), Deepak Singh Tomar (editor), Mitul Kumar Ahirwal (editor), Vijay Bhaskar Semwal (editor), Vaibhav Soni (editor) |
|
| 1445 |
|
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems) |
Bimal Kumar Roy (editor), Atul Chaturvedi (editor), Boaz Tsaban (editor), Sartaj Ul Hasan (editor) |
|
| 1446 |
|
Autorschaftserkennung und Verstellungsstrategien: Textanalysen und -vergleiche im Spektrum forensischer Linguistik, Informationssicherheit und Machine-Learning |
Steffen Hessler |
|
| 1447 |
|
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security |
Arun Kumar Rana, Rashmi Gupta, Sharad Sharma, Ahmed A. Elngar, Sachin Dhawan |
|
| 1448 |
|
Intelligent Systems Modeling and Simulation III: Artificial Intelligent, Machine Learning, Intelligent Functions and Cyber Security |
Samsul Ariffin, Abdul Karim |
|
| 1449 |
|
Python Web Penetration Testing Cookbook |
Buchanan C., Ip T., Mabbitt A. et al. |
|
| 1450 |
|
Python Penetration Testing Essentials |
Mohit Raj. |
|
| 1451 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers |
Justin Seitz |
|
| 1452 |
|
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware |
Fahad Ali Sarwar |
|
| 1453 |
|
Cyber Security: Python for Penetration Testing |
Travis Czech |
|
| 1454 |
|
Ethical Hacking with Python - Build your own Hacking Scripts and Tools with Python from Scratch |
Abdeladim Fadheli |
|
| 1455 |
|
Python for Cybersecurity |
Howard E. Poston lll |
|
| 1456 |
|
Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker Attacks |
Alan Grid |
|
| 1457 |
|
The secret of bug hunting. Bug bounty automation with python |
Syed Abuthahir |
|
| 1458 |
|
Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python [1 ed.] |
Bastian Ballmann (auth.) |
1 |
| 1459 |
|
Understanding Network Hacks: Attack and Defense with Python [1 ed.] |
Bastian Ballmann (auth.) |
1 |
| 1460 |
|
Understanding Network Hacks Attack and Defense with Python [Softcover reprint of the original 1st ed. 2015] |
Bastian Ballmann |
1 |
| 1461 |
|
Hacking: Hacking With Python - The Complete Beginner's Course to Learn Ethical Hacking With Python in 7 Clear-Cut Lessons - Including Dozens of Practical Examples & Exercises (Hacking Series Book 1) |
Alphy Books, Hacking |
|
| 1462 |
|
Beginning Ethical Hacking with Python [1 ed.] |
Sanjib Sinha (auth.) |
1 |
| 1463 |
|
Python Digital Forensics Cookbook |
Preston Miller, Chapin Bryce |
|
| 1464 |
|
Hacking with Python: Beginner's Guide to Ethical Hacking, Basic Security, Penetration Testing, and Python Hacking |
Lane, Evan |
|
| 1465 |
|
Python Penetration Testing Essentials: Techniques for ethical hacking with Python [2nd Edition] |
Raj, Mohit |
2 |
| 1466 |
|
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python |
Hussam Khrais |
|
| 1467 |
|
Hands-On Penetration Testing with Python Enhance your ethical hacking skills to build automated and intelligent systems |
Furqan Khan |
|
| 1468 |
|
Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems |
Khan, Furqan |
|
| 1469 |
|
Python for Beginners : An Essential Guide to Easy Learning with Basic Exercises : Python programming Crash Course for Data Analysis and for Beginner Hackers |
Walsh, Conley |
|
| 1470 |
|
COMPUTER PROGRAMMING 4 Books In 1: Data Science, Hacking with Kali Linux, Computer Networking for Beginners, Python Programming |
Jason Callaway |
|
| 1471 |
|
Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 [2. Aufl.] |
Bastian Ballmann |
2 |
| 1472 |
|
LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERS |
DARWIN, TYE |
|
| 1473 |
|
Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 |
Bastian Ballmann |
|
| 1474 |
|
Understanding Network Hacks: Attack and Defense with Python 3 [2 ed.] |
Bastian Ballmann |
2 |
| 1475 |
|
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity |
Grid, Alan |
|
| 1476 |
|
Understanding Network Hacks: Attack and Defense with Python 3 [2nd ed. 2021] |
Bastian Ballmann |
2 |
| 1477 |
|
Python for Cybersecurity: Using Python for Cyber Offense and Defense [1 ed.] |
Howard E. Poston |
1 |
| 1478 |
|
Python for Cybersecurity: Using Python for Cyber Offense and Defense |
Howard E. Poston III |
|
| 1479 |
|
Black Hat Python, 2nd Edition |
Justin Seitz, Tim Arnold |
|
| 1480 |
|
Python for OSINT. 21 day course for beginners [First ed.] |
cyb_detective |
|
| 1481 |
|
Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python |
Tony Snake |
|
| 1482 |
|
Top 10 Hacking Scripts in Python, C#, and ASP.NET: 2 Books in 1 |
Devwebtuts Publishing |
|
| 1483 |
|
Mastering Computer Programming: A Comprehensive Guide to Python, C, C++, C#, HTML Coding, and Ethical Hacking |
Kameron Hussain, Frahaan Hussain |
|
| 1484 |
|
Learn Penetration Testing with Python 3.x : An ethical hacker’s blueprint for offensive security [2 ed.] |
Yehia Elghaly |
2 |
| 1485 |
|
Ethical Hacking with Python: Developing Cybersecurity Tools |
Nate Phoetean |
|
| 1486 |
|
Python For Cybersecurity : Securing Systems And Networks With Python Programming |
Jackson, Marley |
|
| 1487 |
|
Python Programming For Cybersecurity With PyShark And Cryptography: A Hands-On Beginner's Guide To Leveraging PyShark for Network Traffic Analysis and Cryptography for Secure Communication |
Caldwell, Alex |
|
| 1488 |
|
Master Python Cybersecurity 2024 |
Rodrigues, Diego |
|
| 1489 |
|
Java 2 network security |
Marco Pistoia, International Business Machines Corporation., et al |
|
| 1490 |
|
Java 2 Network Security [2nd ed.] |
Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani |
2 |
| 1491 |
|
Cryptography for Internet and database applications: developing secret and public key techniques with Java [1st ed.] |
Nick Galbreath |
1 |
| 1492 |
|
The Decision to Attack: Military and Intelligence Cyber Decision-Making |
Brantly Aaron Franklin, Keller William. |
|
| 1493 |
|
The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You |
Matherly John. |
|
| 1494 |
|
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense |
Jean Nestor M. Dahj |
|
| 1495 |
|
Romanian Intelligence Service - OSINT Handbook |
|
|
| 1496 |
|
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks |
Aditya K. Sood PhD |
|
| 1497 |
|
Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT [1 ed.] |
Rajdeep Chowdhury |
1 |
| 1498 |
|
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques |
Vinny Troia |
|
| 1499 |
|
Dark Web and Deep Web Intelligence |
Schuster Louis |
|
| 1500 |
|
Check Point Advanced Technical Reference Guide NG with Application Intelligence |
|
|
| 1501 |
|
Intelligent Multimedia Data Hiding: New Directions [1 ed.] |
Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain, Wai-Chi Fang |
1 |
| 1502 |
|
Intelligence and Security Informatics: Techniques and Applications [1 ed.] |
Bhavani Thuraisingham (auth.), Hsinchun Chen, Christopher C. Yang (eds.) |
1 |
| 1503 |
|
Safeguards in a world of ambient intelligence [1. softcover print ed.] |
Wright, David,Vildjiounaite, Elena,Gutwirth, Serge,Punie, Yves,Friedewald, Michael |
1 |
| 1504 |
|
Internet searches for vetting, investigations, and open-source intelligence [1 ed.] |
Edward J. Appel |
1 |
| 1505 |
|
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System [1 ed.] |
Álvaro Herrero, Emilio Corchado (auth.) |
1 |
| 1506 |
|
Chaos-Based Cryptography: Theory,Algorithms and Applications [1 ed.] |
Dimitar Solev, Predrag Janjic, Ljupco Kocarev (auth.), Ljupco Kocarev, Shiguo Lian (eds.) |
1 |
| 1507 |
|
Enabling Open Source Intelligence (OSINT) in Private Social Networks [12347] |
Benjamin Robert Holland |
12347 |
| 1508 |
|
Verification of security intelligence for a resilient SCADA system |
Sumit Chakraborty |
|
| 1509 |
|
Risk Assessment and Management in the Networked Economy [1 ed.] |
Omar K. Hussain, Tharam S. Dillon, Farookh K. Hussain, Elizabeth J. Chang (auth.) |
1 |
| 1510 |
|
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings [1 ed.] |
Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang (eds.) |
1 |
| 1511 |
|
Intelligent Methods for Cyber Warfare [1 ed.] |
Ronald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.) |
1 |
| 1512 |
|
Cybercrime, Digital Forensics and Jurisdiction [1 ed.] |
Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.) |
1 |
| 1513 |
|
Advanced Research in Data Privacy [1 ed.] |
Guillermo Navarro-Arribas, Vicenç Torra (eds.) |
1 |
| 1514 |
|
(OSINT) Open Source Intelligence Glossary Volume I: Guide to Keywords, Phrases for Improved Internet Research Results [1] |
Nicholas Crowder |
1 |
| 1515 |
|
The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You |
Matherly, John |
|
| 1516 |
|
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges |
Qing Li, Gregory Clark |
|
| 1517 |
|
The Tao of Open Source Intelligence |
IT Governance Publishing |
|
| 1518 |
|
Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks |
Claude Fachkha |
|
| 1519 |
|
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 [1 ed.] |
Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) |
1 |
| 1520 |
|
Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach [1 ed.] |
Roman Gumzej (auth.) |
1 |
| 1521 |
|
The Tao of Open Source Intelligence [1 ed.] |
Stewart K. Bertram |
1 |
| 1522 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [5 ed.] |
Michael Bazzell |
5 |
| 1523 |
|
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level [1 ed.] |
Florian Skopik |
1 |
| 1524 |
|
Introduction to Artificial Intelligence for Security Professionals [1 ed.] |
The Cylance Data Science Team |
1 |
| 1525 |
|
Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings [1 ed.] |
G. Alan Wang, Michael Chau, Hsinchun Chen (eds.) |
1 |
| 1526 |
|
Darkweb cyber threat intelligence mining |
Robertson, John |
|
| 1527 |
|
Information Fusion for Cyber-Security Analytics |
Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George |
|
| 1528 |
|
Intelligence-driven incident response outwitting the adversary [First edition] |
Brown, Rebekah,Roberts, Scott J |
|
| 1529 |
|
Cyber Security for Cyber Physical Systems [1 ed.] |
Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) |
1 |
| 1530 |
|
Information Fusion for Cyber-Security Analytics [1st edition] |
Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George |
1 |
| 1531 |
|
Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level [1 ed.] |
Florian Skopik |
1 |
| 1532 |
|
International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence [1 ed.] |
Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) |
1 |
| 1533 |
|
Artificial Intelligence Tools for Cyber Attribution |
Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef |
|
| 1534 |
|
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection |
Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela |
|
| 1535 |
|
Cyber Threat Intelligence [1st ed.] |
Ali Dehghantanha, Mauro Conti, Tooska Dargahi |
1 |
| 1536 |
|
Digital Defence: Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics |
Kumar, Ahlad, Kumar Chaudhary, Naveen, Shastri, Apoorva S., Singh, Mangal, Kulkarni, Dr Anand J. |
|
| 1537 |
|
Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (River Publishers Series in Digital Security and Forensics) [1 ed.] |
Akansha Singh (editor), Krishna Kant Singh (editor) |
1 |
| 1538 |
|
The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity. |
M. A. Jabbar, Sanju Tiwari, Subhendu Kumar Pani, Stephen Huang |
|
| 1539 |
|
Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117) |
Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor) |
|
| 1540 |
|
Advanced OSINT Strategies: Online Investigations and Intelligence Gathering |
Rob Botwright |
|
| 1541 |
|
Mathematics of Computer Science, Cybersecurity and Artificial Intelligence |
Cheikh Thiecoumba Gueye, Papa Ngom, Idy Diop (Eds.) |
|
| 1542 |
|
Network Security Empowered by Artificial Intelligence |
Yingying Chen, Jie Wu, Paul Yu, Xiaogang Wang |
|
| 1543 |
|
Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications) [2024 ed.] |
Hamid Jahankhani (editor), Gordon Bowen (editor), Mhd Saeed Sharif (editor), Osama Hussien (editor) |
2024 |
| 1544 |
|
Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107) [2024 ed.] |
Yingying Chen (editor), Jie Wu (editor), Paul Yu (editor), Xiaogang Wang (editor) |
2024 |
| 1545 |
|
Artificial Intelligence for Cyber-Physical Systems Hardening |
Issa Traore, Isaac Woungang, Sherif Saad |
|
| 1546 |
|
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons |
Erendor, Mehmet Emin |
|
| 1547 |
|
Computational Intelligence Applications in Cyber Security [1 ed.] |
Suhel Ahmad Khan (editor), Mohammad Faisal (editor), Nawaf Alharbe (editor), Rajeev Kumar (editor), Raees Ahmad Khan (editor) |
1 |
| 1548 |
|
Deep Dive : Exploring the Real‐world Value of Open Source Intelligence |
Rae Baker |
|
| 1549 |
|
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence [1 ed.] |
Youssef Baddi (editor), Mohammed Amin Almaiah (editor), Omar Almomani (editor), Yassine Maleh (editor) |
1 |
| 1550 |
|
Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics [1 ed.] |
Adam Tilmar Jakobsen |
1 |
| 1551 |
|
Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities |
Sharma, Smita, Thirumalaisamy, Manikandan, Balusamy, Balamurugan, Chilamkurti, Naveen |
|
| 1552 |
|
Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 |
Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman |
|
| 1553 |
|
Artificial Intelligence and Cyber Security in Industry 4.0 |
Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi |
|
| 1554 |
|
Artificial Intelligence and Cybersecurity. Theory and Applications |
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen |
|
| 1555 |
|
Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications |
Ouaissa, Mariya, Ouaissa, Mariyam, Boulouard, Zakaria, Kumar, Abhishek |
|
| 1556 |
|
The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense |
Donnie W. Wendt |
|
| 1557 |
|
The OSINT Codebook: Cracking Open Source Intelligence Strategies |
Alexandre DeGarmo |
|
| 1558 |
|
Deep Dive: Exploring the Real-world Value of Open Source Intelligence [1 ed.] |
Rae L. Baker |
1 |
| 1559 |
|
Kids Cybersecurity Using Computational Intelligence Techniques |
Wael Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara |
|
| 1560 |
|
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 |
Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang |
|
| 1561 |
|
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2 |
Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang |
|
| 1562 |
|
Computational Intelligence for Cybersecurity Management and Applications [1 ed.] |
Yassine Maleh (editor), Mamoun Alazab (editor), Soufyane Mounir (editor) |
1 |
| 1563 |
|
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [2 ed.] |
Izzat Alsmadi |
2 |
| 1564 |
|
Cyber Threat Intelligence |
Martin Lee |
|
| 1565 |
|
International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th ... (Lecture Notes in Networks and Systems, 748) |
Pablo García Bringas (editor), Hilde Pérez García (editor), Francisco Javier Martínez de Pisón (editor), Francisco Martínez Álvarez (editor), Alicia Troncoso Lora (editor), Álvaro Herrero (editor), José Luis Calvo Rolle (editor), Héctor Quintián (editor), Emilio Corchado (editor) |
|
| 1566 |
|
Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography |
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam |
|
| 1567 |
|
Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 |
Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman |
|
| 1568 |
|
Dancho Danchev's Cyber Intelligence Cybercrime Research Memoir Second Edition [2 ed.] |
Dancho Danchev |
2 |
| 1569 |
|
The OSINT Codebook : Cracking Open Source Intelligence Strategies |
Alexandre DeGarmo |
|
| 1570 |
|
Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications |
Ahmed A. Abd El-Latif, Mohammed Adel Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk |
|
| 1571 |
|
Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting |
Roberto Martinez |
|
| 1572 |
|
Artificial Intelligence and Blockchain in Digital Forensics (River Publishers Series in Digital Security and Forensics) [1 ed.] |
P. Karthikeyan (editor), Hari Mohan Pande (editor), Velliangiri Sarveshwaran (editor) |
1 |
| 1573 |
|
Open Source Intelligence 101 : From Novice to Expert |
Lyam Arnaud |
|
| 1574 |
|
Artificial Intelligence for Intrusion Detection Systems |
Mayank Swarnkar, Shyam Singh Rajput |
|
| 1575 |
|
Advancing Computational Intelligence Techniques for Security Systems Design |
Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan |
|
| 1576 |
|
Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) [1st ed. 2022] |
Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) |
1 |
| 1577 |
|
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers |
Thomas Roccia |
|
| 1578 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [9 ed.] |
Michael Bazzell |
9 |
| 1579 |
|
Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) [1 ed.] |
Ishaani Priyadarshini (editor), Rohit Sharma (editor) |
1 |
| 1580 |
|
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs |
Kyle Wilhoit, Joseph Opacki |
|
| 1581 |
|
Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies, 109) [1st ed. 2022] |
Sanjay Misra (editor), Chamundeswari Arumugam (editor) |
1 |
| 1582 |
|
Finding Beacons in the Dark [1 ed.] |
BlackBerry Research and Intelligence Team |
1 |
| 1583 |
|
Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007) |
Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor) |
|
| 1584 |
|
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices |
Dr. Erdal Ozkaya |
|
| 1585 |
|
Big Data Analytics and Computational Intelligence for Cybersecurity |
Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar |
|
| 1586 |
|
Mastering Cyber Intelligence |
Jean Nestor M. Dahj, |
|
| 1587 |
|
Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT |
Rajdeep Chowdhury, S. K. Niranjan |
|
| 1588 |
|
Artificial Intelligence and Cybersecurity: Theory and Applications |
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen |
|
| 1589 |
|
The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program [4 ed.] |
CyberEdge Group, LLC |
4 |
| 1590 |
|
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics |
Jena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar |
|
| 1591 |
|
Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) |
Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) |
|
| 1592 |
|
Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123) |
Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor) |
|
| 1593 |
|
Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity (The Human Element in Smart and Intelligent Systems) [1 ed.] |
Abbas Moallem (editor) |
1 |
| 1594 |
|
Artificial Intelligence and Blockchain for Future Cybersecurity Applications (Studies in Big Data, 90) [1st ed. 2021] |
Yassine Maleh (editor), Youssef Baddi (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor) |
1 |
| 1595 |
|
Artificial Intelligence for Cybersecurity (Advances in Information Security, 54) [1st ed. 2022] |
Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) |
1 |
| 1596 |
|
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools [1 ed.] |
Valentina Palacín |
1 |
| 1597 |
|
Machine Intelligence and Big Data Analytics for Cybersecurity Applications |
Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi |
|
| 1598 |
|
Offensive Intelligence: 300 Techniques, Tools and Tips to Know Everything [2 ed.] |
Philippe Dylewski |
2 |
| 1599 |
|
Artificial Intelligence and Blockchain for Future Cybersecurity Applications [1 ed.] |
Yassine Maleh, Youssef Baddi, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani |
1 |
| 1600 |
|
Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) |
Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop |
|
| 1601 |
|
Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler |
Ravi Devarasetty |
|
| 1602 |
|
Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence, 978) |
Madhusudan Singh |
|
| 1603 |
|
Cyber Security Intelligence and Analytics [1st ed.] |
Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh |
1 |
| 1604 |
|
Cyber Intelligence: Actors, Policies, Practices |
Constance S. Uthoff |
|
| 1605 |
|
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147) [1 ed.] |
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) |
1 |
| 1606 |
|
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction (SpringerBriefs in Computer Science) |
Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
|
| 1607 |
|
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities [1 ed.] |
Sanjay Misra (editor), Amit Kumar Tyagi (editor) |
1 |
| 1608 |
|
Cyber Security, Artificial Intelligence, Data Protection & the Law |
Robert Walters, Marko Novak |
|
| 1609 |
|
Artificial Intelligence, Cybersecurity and Cyber Defence |
Daniel Ventre |
|
| 1610 |
|
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques [1 ed.] |
Vinny Troia |
1 |
| 1611 |
|
Artificial Intelligence, Cybersecurity and Cyber Defence Book |
Daniel Ventre |
|
| 1612 |
|
Open Source Intelligence and Cyber Crime: Social Media Analytics [1st ed.] |
Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn |
1 |
| 1613 |
|
Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II [1st ed.] |
Xingming Sun, Jinwei Wang, Elisa Bertino |
1 |
| 1614 |
|
Combating Security Challenges in the Age of Big Data: Powered by State-of-the-Art Artificial Intelligence Techniques [1st ed.] |
Zubair Md. Fadlullah, Al-Sakib Khan Pathan |
1 |
| 1615 |
|
Data Science In Cybersecurity And Cyberthreat Intelligence [1st Edition] |
Leslie F. Sikos, Kim-Kwang Raymond Choo |
1 |
| 1616 |
|
Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I [1st ed.] |
Xingming Sun, Jinwei Wang, Elisa Bertino |
1 |
| 1617 |
|
Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [1st ed.] |
Xingming Sun, Zhaoqing Pan, Elisa Bertino |
1 |
| 1618 |
|
Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part II [1st ed. 2019] |
Huansheng Ning |
1 |
| 1619 |
|
Artificial Intelligence and Global Security: Future Trends, Threats and Considerations |
Yvonne R. Masakowski |
|
| 1620 |
|
The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research |
Open Source Researchers |
|
| 1621 |
|
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146) |
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) |
|
| 1622 |
|
Artificial Intelligence and Security Challenges in Emerging Networks (Advances in Computational Intelligence and Robotics) [1 ed.] |
Ryma Abassi (editor) |
1 |
| 1623 |
|
Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources |
US Department of Justice |
|
| 1624 |
|
Cyber-Enabled Intelligence [1 ed.] |
Huansheng Ning (Editor), Liming Chen (Editor), Ata Ullah (Editor), Xiong Luo (Editor) |
1 |
| 1625 |
|
The Threat Intelligence Handbook [2 ed.] |
Christopher Ahlberg |
2 |
| 1626 |
|
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [1st ed.] |
Izzat Alsmadi |
1 |
| 1627 |
|
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147) |
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) |
|
| 1628 |
|
The Threat Intelligence Handbook [ebook ed.] |
Chris Pace (ed.) |
|
| 1629 |
|
Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202 |
Richard Medlin, Nitin Sharma, Justin Casey |
|
| 1630 |
|
The decision to attack: military and intelligence cyber decision-making [Paperback edition] |
Brantly, Aaron Franklin |
|
| 1631 |
|
Practical cyber intelligence how action-based intelligence can be an effective response to incidents |
Wilson Bautista Jr |
|
| 1632 |
|
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and Intelligence [1st ed.] |
Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman |
1 |
| 1633 |
|
Open Source (OSINT) Intelligence Gathering and Analysis - SANS SEC487 |
Micah Hoffman |
|
| 1634 |
|
Big Data Security |
Shibakali Gupta (editor), Indradip Banerjee (editor), Siddhartha Bhattacharyya (editor) |
|
| 1635 |
|
Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks) [1st ed. 2018] |
Darren Quick, Kim-Kwang Raymond Choo |
1 |
| 1636 |
|
Cyber terrorism: a guide for facility managers [1 ed.] |
Gustin, Joseph F |
1 |
| 1637 |
|
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) [1 ed.] |
Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko |
1 |
| 1638 |
|
Mathematics in cyber research |
Paul L. Goethals (editor), Natalie Michele Scala (editor), Daniel T. Bennett (editor) |
|
| 1639 |
|
A Multidisciplinary Introduction to Information Security |
Mjolsnes, Stig F. |
|
| 1640 |
|
Modern Cryptography Applied Mathematics for Encryption and Information Security |
William Easttom |
|
| 1641 |
|
Modern Cryptograph.y Applied Mathematics for Encryption and Information Security [2 ed.] |
Chuck Easttom |
2 |
| 1642 |
|
Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology [1 ed.] |
Nicholas J. Daras, Themistocles M. Rassias (eds.) |
1 |
| 1643 |
|
A Human Readable Guide to Cyber Security |
Dane Christian |
|
| 1644 |
|
Analyzing Human Behavior In Cyberspace |
Zheng Yan |
|
| 1645 |
|
Advances in Human Factors in Cybersecurity [1st ed.] |
Tareq Z. Ahram, Denise Nicholson |
1 |
| 1646 |
|
Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA [1st ed.] |
Isabella Corradini, Enrico Nardelli, Tareq Ahram |
1 |
| 1647 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA [1st ed.] |
Tareq Ahram, Waldemar Karwowski |
1 |
| 1648 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17–21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA |
Denise Nicholson (editor) |
|
| 1649 |
|
Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (Lecture Notes in Networks and Systems) [1st ed. 2021] |
Matteo Zallio (editor), Carlos Raymundo Ibañez (editor), Jesus Hechavarria Hernandez (editor) |
1 |
| 1650 |
|
Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure |
Derrick Rountree |
|
| 1651 |
|
Wireshark & Ethereal Network Protocol Analyzer Toolkit |
Angela Orebaugh, Gilbert Ramirez, Jay Beale, Joshua Wright |
|
| 1652 |
|
X-Ways Forensics Practitioner's Guide [1 ed.] |
Brett Shavers, Eric Zimmerman |
1 |
| 1653 |
|
Zen and the Art of Information Security [1 ed.] |
Ira Winkler |
1 |
| 1654 |
|
Zero Day |
Mark Russinovich |
|
| 1655 |
|
Zero Day Exploit: Countdown to Darkness [First Edition] |
Rob Shein, David Litchfield, Marcus Sachs |
|
| 1656 |
|
Zero To Mastery In Information Security And Cyber Laws: No.1 Book To Become Zero To Hero In Information Security And Cyber Laws, This Amazing Book Covers ... Edition (Zero To Mastery Computer Series) |
Rajiv Jain, Vei Publishing |
|
| 1657 |
|
Zero To Mastery In Network Security- No.1 Network Security Book To Become Zero To Hero In Network Security, This Amazing Network Security Book Covers A-Z ... Edition (Zero To Mastery Computer Series) |
Rajiv Jain, Vei Publishing, Ayaz Uddin (editor) |
|
| 1658 |
|
Zero-Day Exploit |
Rob Shein, David Litchfield, Marcus Sachs |
|
| 1659 |
|
The Cybersecurity Body of Knowledge-The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity [1 ed.] |
Daniel Shoemaker (Author), Anne Kohnke (Author), Ken Sigler (Author) |
1 |
| 1660 |
|
Wireless security |
Maxim M, Pollino D. |
|
| 1661 |
|
Distributed Denial of Service Attacks-Real-world Detection and Mitigation [1 ed.] |
İlker Özçelik (Author), Richard Brooks (Author) |
1 |
| 1662 |
|
Network security: a beginner's guide [Third edition] |
Maiwald, Eric |
|
| 1663 |
|
Hacking Exposed Mobile Security Secrets & Solutions |
Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse |
|
| 1664 |
|
Ccsp Certified Cloud Security Professional All-In-One Exam Guide [ebook ed.] |
Daniel Carter |
|
| 1665 |
|
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition [4 ed.] |
Daniel Lachance, Glen E. Clarke |
4 |
| 1666 |
|
Cryptography & Network Security (McGraw-Hill Forouzan Networking) [1 ed.] |
Behrouz Forouzan |
1 |
| 1667 |
|
Network Security Portable Reference [1 ed.] |
Michael Horton |
1 |
| 1668 |
|
Network Security Illustrated [1 ed.] |
Jason Albanese, Wes Sonnenreich |
1 |
| 1669 |
|
Hacking Exposed Mobile: Security Secrets & Solutions |
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price |
|
| 1670 |
|
Cryptography and network security |
Atul Kahate |
|
| 1671 |
|
Network Security Illustrated |
|
|
| 1672 |
|
Cryptography And Network Security [2 ed.] |
Atul Kahate |
2 |
| 1673 |
|
CompTIA Security+ Certification Study Guide (Exam SY0-601) |
Glen E. Clarke |
|
| 1674 |
|
Cipm Certified Information Privacy Manager All-In-One Exam Guide |
Peter H. Gregory |
|
| 1675 |
|
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions |
Rich Cannings, Himanshu Dwivedi, Zane Lackey |
|
| 1676 |
|
Comptia Security+ Certification Study Guide, Third Edition (Exam Sy0-501) [Third edition] |
Clarke, Glen E |
|
| 1677 |
|
CIPM Certified Information Privacy Manager All-in-One Exam Guide [1 ed.] |
Peter Gregory |
1 |
| 1678 |
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions |
David Endler, Mark Collier |
|
| 1679 |
|
Special OPS: Host and Network Security for Microsoft, Unix and Oracle [1st ed.] |
Joel Scambray, Stuart McClure |
1 |
| 1680 |
|
CCSP Certified Cloud Security Professional. Exam Guide [3 ed.] |
|
3 |
| 1681 |
|
Cryptography InfoSec Pro Guide [1 ed.] |
Sean-Philip Oriyano |
1 |
| 1682 |
|
Network Security A Beginner’s Guide, Third Edition [3 ed.] |
Eric Maiwald |
3 |
| 1683 |
|
Principles of Computer Security CompTIA Security+ and Beyond Lab Manual [2. Auflage.] |
Vincent J. Nestler, Gregory B. White, W. Arthur Conklin |
2 |
| 1684 |
|
Firewalls complete. |
Marcus Goncalves |
|
| 1685 |
|
Network security |
Eric Maiwald |
|
| 1686 |
|
Principles of Computer Security - CompTIA Security+ and Beyond, 2nd Edition [2 ed.] |
Dr. Wm. Arthur Conklin, Dr. Gregory White, Dwayne Williams, Roger L. Davis, Chuck Cothren |
2 |
| 1687 |
|
Botnets: The Killer Web Applications [3 ed.] |
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi |
3 |
| 1688 |
|
Cryptography InfoSec Pro Guide |
Sean-Philip Oriyano |
|
| 1689 |
|
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI) [1 ed.] |
Robert Larson |
1 |
| 1690 |
|
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization |
Tyler Wrightson |
|
| 1691 |
|
Hacking Exposed Web Applications [3rd edition] |
Liu, Vincent,Scambray, Joel,Sima, Caleb |
3 |
| 1692 |
|
Hacking Exposed Wireless, 2nd Edition: Wireless Security Secrets and Solutions |
Johnny Cache, Joshua Wright, Vincent Liu |
|
| 1693 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide [1 ed.] |
Matt Walker |
1 |
| 1694 |
|
CEH Certified Ethical Hacker all-in-one exam guide [2nd edition] |
Horton, Bradley B.,Walker, Matthew |
2 |
| 1695 |
|
Ceh Certified Ethical Hacker All-In-One Exam Guide [Fourth edition] |
Walker, Matthew |
|
| 1696 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide [3rd edition] |
Walker, Matthew |
3 |
| 1697 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition [5 ed.] |
Matt Walker |
5 |
| 1698 |
|
Gray Hat Hacking - The Ethical Hacker's Handbook [2 ed.] |
Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness |
2 |
| 1699 |
|
All in One CISSP Exam Guide [9 ed.] |
Fernando Maymí, Shon Harris |
9 |
| 1700 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition [4 ed.] |
Walker, Matt |
4 |
| 1701 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Premium Third Edition with Online Practice Labs (Allinone Exam Guides) [Hardcover ed.] |
Matt Walker |
|
| 1702 |
|
Gray hat hacking : the ethical hacker’s handbook [4 ed.] |
Daniel Regalado et al. |
4 |
| 1703 |
|
Hacking Exposed, 6th Edition: Network Security Secrets and Solutions |
Stuart McClure, Joel Scambray, George Kurtz |
|
| 1704 |
|
Hacking Exposed. Linux [3 ed.] |
ISECOM |
3 |
| 1705 |
|
CEH Certified Ethical Hacker Bundle |
Walker, Matt |
|
| 1706 |
|
CEH Certified Ethical Hacker Exam Guide [3rd ed.] |
Matt Walker |
3 |
| 1707 |
|
CEH Certified Ethical Hacker Bundle [5 ed.] |
Matt Walker |
5 |
| 1708 |
|
CEH Certified Ethical Hacker Practice Exams [3 ed.] |
Matt Walker |
3 |
| 1709 |
|
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition [3 ed.] |
Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams |
3 |
| 1710 |
|
CEH Certified Ethical Hacker Practice Exams [1 ed.] |
Matt Walker |
1 |
| 1711 |
|
Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions [First (1st) ed.] |
Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt |
1 |
| 1712 |
|
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition |
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims |
|
| 1713 |
|
CEH Certified Ethical Hacker Practice Exams [5 ed.] |
Matt Walker |
5 |
| 1714 |
|
Gray Hat Hacking The Ethical Hacker’s Handbook [5th ed.] |
coll. |
5 |
| 1715 |
|
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) |
Walker, Matt |
|
| 1716 |
|
Gray Hat Hacking the Ethical Hacker’s Handbook |
coll. |
|
| 1717 |
|
Computer Forensics InfoSec Pro Guide [1 ed.] |
David Cowen |
1 |
| 1718 |
|
SSCP systems security certified practitioner: all-in-one exam guide [2nd edition] |
Gibson, Darril |
2 |
| 1719 |
|
CEH Certified Ethical Hacker Practice Exams, Second Edition (All-in-One) |
Matt Walker |
|
| 1720 |
|
CEH Certified Ethical Hacker Practice Exams, Fourth Edition [4 ed.] |
Matt Walker |
4 |
| 1721 |
|
Hacking Exposed: Network Security Secrets & Solutions [3 ed.] |
Jean Letessier, Johann Rafelski |
3 |
| 1722 |
|
Hacking Exposed: Network Security Secrets & Solutions [3rd ed.] |
Stuart McClure, Joel Scambray, George Kurtz |
3 |
| 1723 |
|
Modern Cryptography: Applied Mathematics for Encryption and Information Security [1st ed.] |
Chuck Easttom |
1 |
| 1724 |
|
Modern cryptography : applied mathematics for encryption and information security |
Easttom, Chuck |
|
| 1725 |
|
CEH, Certified Ethical Hacker bundle [Third edition] |
Walker, Matthew |
|
| 1726 |
|
CSSLP Certification All-in-One Exam Guide |
Arthur Conklin |
|
| 1727 |
|
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook [2 ed.] |
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness |
2 |
| 1728 |
|
Reverse Deception: Organized Cyber Threat Counter-Exploitation [1 ed.] |
Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones |
1 |
| 1729 |
|
CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide [3 ed.] |
Wm. Arthur Conklin, Daniel Shoemaker |
3 |
| 1730 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook |
Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams |
3 |
| 1731 |
|
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) |
Bobby E. Rogers |
|
| 1732 |
|
CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002) [2 ed.] |
SPARKS |
2 |
| 1733 |
|
Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-501) [Fifth edition] |
Dunkerley, Dawn |
|
| 1734 |
|
Comptia Cysa+ Cybersecurity Analyst Certification Practice Exams (Exam Cs0-001) |
Rogers, Bobby E |
|
| 1735 |
|
Hacking Exposed™ Web applications [1 ed.] |
Joel Scambray, Mike Shema |
1 |
| 1736 |
|
Introduction to Cryptography and Network Security |
Behrouz A. Forouzan |
|
| 1737 |
|
Certified Ethical Hacker Exam Guide [2 ed.] |
Matt Walker |
2 |
| 1738 |
|
Reverse Deception: Organized Cyber Threat Counter-Exploitation [1st edition] |
Bodmer, Sean,Carpenter, Gregory,Jones, Jade,Kilger, Max |
1 |
| 1739 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook [6 ed.] |
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost |
6 |
| 1740 |
|
Information security: the complete reference [2 ed.] |
Mark Rhodes-Ousley |
2 |
| 1741 |
|
Information Security The Complete Reference [2nd edition] |
Rhodes-Ousley, Mark |
2 |
| 1742 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook [1 ed.] |
Shon Harris |
1 |
| 1743 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook 2nd Edition [2 ed.] |
Shon Harris |
2 |
| 1744 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook Sixth Edition [6 ed.] |
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost |
6 |
| 1745 |
|
Hardening Network Infrastructure: Bulletproof Your Systems Before You Are Hacked! [1 ed.] |
Wes Noonan |
1 |
| 1746 |
|
Seguridad informática para empresas y particulares |
Gonzalo Alvarez Marañón, Pedro Pablo Pérez Garía, Pedro Bustamante |
|
| 1747 |
|
HackNotes(tm) Network Security Portable Reference [1 ed.] |
Michael Horton, Clinton Mugge |
1 |
| 1748 |
|
Intrusion Detection and Prevention [1 ed.] |
Carl Endorf, Gene Schultz, Jim Mellander |
1 |
| 1749 |
|
Gray Hat Hacking: The Ethical Hacker’s Handbook [2 ed.] |
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness |
2 |
| 1750 |
|
Extreme Exploits: Advanced Defenses Against Hardcore Hacks |
Victor Oppleman, Oliver Friedrichs, Brett Watson |
|
| 1751 |
|
Gray Hat Hacking: The Ethical Hacker’s Handbook [6 ed.] |
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost |
6 |
| 1752 |
|
Hacker's Challenge 3 [3rd ed] |
Bradley, Tony,Dwivedi, Himanshu,Pennington, Bill,Pollino, David |
3 |
| 1753 |
|
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition [2 ed.] |
Peter Gregory |
2 |
| 1754 |
|
Cism Certified Information Security Manager Practice Exams, Second Edition |
Peter H. Gregory |
|
| 1755 |
|
CISM Certified Information Security Manager. Exam Guide [2 ed.] |
Peter H. Gregory |
2 |
| 1756 |
|
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios [Edition Unstated] |
Mike Schiffman |
|
| 1757 |
|
CISSP All in One Exam Guide [4 ed.] |
|
4 |
| 1758 |
|
Hacker's challenge: test your incident response skills using 20 scenarios |
Schiffman, Mike |
|
| 1759 |
|
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them [1 ed.] |
Michael Howard, David LeBlanc, John Viega |
1 |
| 1760 |
|
Hacker’s challenge: test your incident response skills using 20 scenarios [First edition.] |
Mike Schiffman |
|
| 1761 |
|
Incident Response & Computer Forensics [3 edition] |
Jason Luttgens, Matthew Pepe, Kevin Mandia |
3 |
| 1762 |
|
CISSP All in one Exam Guide [8 ed.] |
Shon Harris, Fernando Maymí |
8 |
| 1763 |
|
GCIH GIAC Certified Incident Handler All-in-One Exam Guide [1 ed.] |
Nick Mitropoulos |
1 |
| 1764 |
|
Casp+ Comptia Advanced Security Practitioner Certification All-in-one Exam Guide, Exam Cas-003 |
Lane, Nicholas, Conklin, Arthur, White, Gregory B., Williams, Dwayne |
|
| 1765 |
|
Incident Response and Computer Forensics [2 ed.] |
Chris Prosise, Kevin Mandia, Matt Pepe |
2 |
| 1766 |
|
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration [1st ed.] |
Guy Hart-Davis |
1 |
| 1767 |
|
CISSP All-in-One Exam Guide [7th edition] |
Harris, Shon,Maymi, Fernando |
7 |
| 1768 |
|
CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide |
Brooks, Charles L |
|
| 1769 |
|
Security Sage's Guide to Hardening the Network Infrastructure [4 ed.] |
Stuart McClure |
4 |
| 1770 |
|
CISSP All-in-One Exam Guide [Eighth edition] |
Maymi, Fernando,Harris, Shon |
|
| 1771 |
|
Hacking Exposed [5 ed.] |
Stuart McClure, Joel Scambray, George Kurtz |
5 |
| 1772 |
|
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition [Paperback ed.] |
Lee Reiber |
|
| 1773 |
|
Hacking Exposed - Linux: Linux Security Secrets |
|
|
| 1774 |
|
CISSP All-in-One Exam Guide, [9 ed.] |
Fernando Maymi, Shon Harris |
9 |
| 1775 |
|
Hacking Exposed [2nd ed] |
Cowen, David,Davis, Chris,Philipp, Aaron |
2 |
| 1776 |
|
CISSP All-in-One Exam Guide, Fifth Edition [5 ed.] |
Shon Harris |
5 |
| 1777 |
|
People-centric security : transforming your enterprise security culture [1 ed.] |
Hayden, Lance |
1 |
| 1778 |
|
Hacking exposed 6 : network security secrets & solutions |
Stuart McClure, Joel Scambray, George Kurtz |
|
| 1779 |
|
Hacking exposed 6: network security secrets & solutions [10th anniversary ed] |
McClure, Stuart,Scambray, Joel,Kurtz, George |
10 |
| 1780 |
|
CC Certified in Cybersecurity All-in-One Exam Guide [1 ed.] |
Jordan Genung, Steven Bennett |
1 |
| 1781 |
|
CISSP Certification All-in-One Exam Guide [4 ed.] |
Shon Harris |
4 |
| 1782 |
|
Mobile application security |
Himanshu Dwivedi, Chris Clark, David V Thiel |
|
| 1783 |
|
CompTIA PenTest+ Certification All-in-One Exam Guide [2 ed.] |
Heather Linn, Raymond Nutting |
2 |
| 1784 |
|
Hacking Exposed 7. Network Security Secrets and Solutions [7th Edition] |
Stuart McClure and Joel Scambray |
7 |
| 1785 |
|
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-002) |
Heather Linn |
|
| 1786 |
|
CompTIA PenTest+ certification all-in-one exam guide (exam PT0-001) |
Nutting, Raymond |
|
| 1787 |
|
Hacking Exposed 7: Network Security Secrets & Solutions [7 ed.] |
Stuart McClure, Joel Scambray, George Kurtz |
7 |
| 1788 |
|
Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002) |
Heather Linn, Raymond Nutting |
|
| 1789 |
|
CompTIA PenTest+ certification practice exams (exam PT0-001) |
Ammerman, Jonathan |
|
| 1790 |
|
Hacking exposed Cisco networks: Cisco security secrets & solutions |
Vladimirov, Andrew A |
|
| 1791 |
|
CISSP Passport |
Bobby E. Rogers |
|
| 1792 |
|
Hacking exposed computer forensics : secrets & solutions [2nd ed] |
Aaron Philipp, David Cowen, Chris Davis, CISSP |
2 |
| 1793 |
|
CISSP Practice Exams [5 ed.] |
Shon Harris, Jonathan Ham |
5 |
| 1794 |
|
CCISO Certified Chief Information Security Officer All-in-One Exam Guide |
Steve Bennett, Jordan Genung |
|
| 1795 |
|
Mike Meyers CompTIA Security+ Certification Passport (Exam SY0-601) |
Dawn Dunkerley |
|
| 1796 |
|
Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity |
Leeza Garber, Scott Olson |
|
| 1797 |
|
Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems [1 ed.] |
G. B. Baecher |
1 |
| 1798 |
|
Cognitive hack : the new battleground in cybersecurity... the human mind [1 ed.] |
Bone, James |
1 |
| 1799 |
|
Cyber Deception: Techniques, Strategies, and Human Aspects |
Tiffany Bao, Milind Tambe, Cliff Wang |
|
| 1800 |
|
Cyber Security Social Engineering - Hacking Human Firewalls |
Nishad, Bharat Bhuval |
|
| 1801 |
|
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications [1st ed.] |
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger |
1 |
| 1802 |
|
Die Kunst des Human Hacking: Social Engineering in der Praxis |
Christopher Hadnagy |
|
| 1803 |
|
Cyber justice : human rights and good governance for the internet |
Mihr, Anja |
|
| 1804 |
|
Cybersecurity Systems for Human Cognition Augmentation [1 ed.] |
Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.) |
1 |
| 1805 |
|
Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factor [2 ed.] |
Andreas Von Grebmer |
2 |
| 1806 |
|
From Encryption to Quantum Computing: The Governance of Information Security and Human Rights |
Ot van Daalen |
|
| 1807 |
|
Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings [1st ed.] |
Nathan Clarke, Steven Furnell |
1 |
| 1808 |
|
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, ... and Communication Technology, 613) [1st ed. 2021] |
Steven Furnell (editor), Nathan Clarke (editor) |
1 |
| 1809 |
|
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings |
Tryfonas, Theo |
|
| 1810 |
|
Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings [1 ed.] |
Theo Tryfonas, Ioannis Askoxylakis (eds.) |
1 |
| 1811 |
|
Hacking the human: social engineering techniques and security countermeasures |
Ian Mann |
|
| 1812 |
|
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, ... and Communication Technology, 658) |
Nathan Clarke (editor), Steven Furnell (editor) |
|
| 1813 |
|
Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings [1 ed.] |
Theo Tryfonas (eds.) |
1 |
| 1814 |
|
Human Aspects of Information Security, Privacy, and Trust: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings [1 ed.] |
Sourav Bhuyan, Joel S. Greenstein, Kevin A. Juang (auth.), Louis Marinos, Ioannis Askoxylakis (eds.) |
1 |
| 1815 |
|
Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings [1 ed.] |
Theo Tryfonas, Ioannis Askoxylakis (eds.) |
1 |
| 1816 |
|
Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings ... and Communication Technology, 674) [1st ed. 2023] |
Steven Furnell (editor), Nathan Clarke (editor) |
1 |
| 1817 |
|
Human Hacking |
Christopher Hadnagy |
|
| 1818 |
|
Human Dimensions of Cybersecurity [1 ed.] |
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury |
1 |
| 1819 |
|
Human Factors Analysis of 23 Cyberattacks |
Moallem, Abbas |
|
| 1820 |
|
Human Hacked: My Life and Lessons as the World’s First Augmented Ethical Hacker [1 ed.] |
Len Noe |
1 |
| 1821 |
|
Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security) |
B. Ganor, K. Von Knop, C. Duarte |
|
| 1822 |
|
Human-Centered Security |
Heidi Trost |
|
| 1823 |
|
Humans and Cyber Security: How Organisations Can Enhance Resilience Through Human Factors |
Widdowson, Amanda |
|
| 1824 |
|
Human-computer interaction and cybersecurity handbook |
Moallem, Abbas |
|
| 1825 |
|
Internet Freedom Software and Illicit Activity : Supporting Human Rights Without Enabling Criminals [1 ed.] |
Sasha Romanosky, Martin C. Libicki, Zev Winkelman, Olesya Tkacheva |
1 |
| 1826 |
|
Invisible Threats: Financial and Information Technology Crimes and National Security, Volume 10 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science) |
U. Gori, I. Paparela |
|
| 1827 |
|
Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert |
Ozkaya, Erdal |
|
| 1828 |
|
Learn Social Engineering Learn the art of human hacking with an internationally renowned expert |
Erdal Ozkaya |
|
| 1829 |
|
Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for Peace and Security Series - E: Human and Societal Dynamics |
U. Gori |
|
| 1830 |
|
Managing the Human Factor in Information Security: How to win over staff and influence business managers [1 ed.] |
David Lacey |
1 |
| 1831 |
|
Psybersecurity Human Factors of Cyber Defence |
Oliver Guidetti, Mohiuddin Ahmed, Craig Speelman |
|
| 1832 |
|
Research agenda. The human factor in cybercrime and cybersecurity. |
Eric Rutger Leukfeldt |
|
| 1833 |
|
Resistance, liberation technology and human rights in the digital age [1 ed.] |
Giovanni Ziccardi (auth.) |
1 |
| 1834 |
|
Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility |
Emily B. Laidlaw |
|
| 1835 |
|
Security The Human Factor |
Paul Kearney |
|
| 1836 |
|
Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception [1 ed.] |
Vince Reynolds |
1 |
| 1837 |
|
Social Engineering: The Art of Human Hacking |
Hadnagy, Christopher(Foreword),Wilson, Paul(Foreword) |
|
| 1838 |
|
Social Engineering: The Science of Human Hacking |
Hadnagy, Christopher |
|
| 1839 |
|
Stopping Human Hacks |
Ira Winkler, Tracy Celaya |
|
| 1840 |
|
Techniques and applications for advanced information privacy and security: emerging organizational, ethical, and human issues |
Hamid R. Nemati, Hamid R. Nemati |
|
| 1841 |
|
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy) [1 ed.] |
Hamid R. Nemati |
1 |
| 1842 |
|
Surveillance Law, Data Retention and Human Rights: A Risk to Democracy |
Matthew White |
|
| 1843 |
|
The Android Malware Handbook: Detection and Analysis by Human and Machine |
Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, Yanhai Xiong |
|
| 1844 |
|
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity |
Cesar Bravo, Desilda Toska |
|
| 1845 |
|
The Human Firewall: Wie eine Kultur der Cyber-Sicherheit geschaffen wird |
Florian Jörgens |
|
| 1846 |
|
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer [1 ed.] |
Perry Carpenter, Kai Roer |
1 |
| 1847 |
|
Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools [1 ed.] |
Abbas Moallem |
1 |
| 1848 |
|
Unmasking the Social Engineer: The Human Element of Security [1 ed.] |
Christopher Hadnagy, Paul Kelly F., Paul Ekman |
1 |
| 1849 |
|
The art of intrusion: the real stories behind the exploits of hackers, intruders & deceivers |
Simon, William L., Mitnick, Kevin David |
|
| 1850 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers [1 ed.] |
Kevin D. Mitnick, William L. Simon |
1 |
| 1851 |
|
The Stories of My Hackers and I |
Beatrice, Mrs, Walsh, Lin |
|
| 1852 |
|
Information Security Analyst |
Wil Mara |
|
| 1853 |
|
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers [1 ed.] |
Ping Li, Bing Sun, Chao Li (auth.), Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing (eds.) |
1 |
| 1854 |
|
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door |
Brian Krebs |
|
| 1855 |
|
Exam Ref SC-100 Microsoft Cybersecurity Architect [1 ed.] |
Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez |
1 |
| 1856 |
|
Look Both Ways: Help Protect Your Family on the Internet [1 ed.] |
Linda Criddle |
1 |
| 1857 |
|
Exam Ref MS-101 Microsoft 365 Mobility and Security |
Brian Svidergol, Bob Clements |
|
| 1858 |
|
A Cryptography Primer: Secrets and Promises [draft ed.] |
Klein P.N. |
|
| 1859 |
|
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! |
Occupytheweb |
|
| 1860 |
|
Hunting Security Bugs [1 ed.] |
Tom Gallagher, Lawrence Landauer, Bryan Jeffries |
1 |
| 1861 |
|
Analysis and design of networked control systems under attacks |
Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan |
|
| 1862 |
|
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion |
Jim Harrison, Yuri Diogenes, Mohit Saxena, Tom Shinder |
|
| 1863 |
|
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business [1 ed.] |
George Finney |
1 |
| 1864 |
|
Deploying Secure 802 11 Wireless Networks with Microsoft Windows |
|
|
| 1865 |
|
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant |
Bud Ratliff, Jason Ballard |
|
| 1866 |
|
Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers [1 ed.] |
Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo (auth.), Heung Youl Youm, Moti Yung (eds.) |
1 |
| 1867 |
|
Microsoft Azure Sentinel |
Yuri Diogenes, Nicholas Dicola, Jonathan Trull |
|
| 1868 |
|
Maintaining Network Separations with Trusted Solaris 8 Software |
Sun Microsystems, Inc. |
|
| 1869 |
|
Hacked: the inside story of America's struggle to secure cyberspace |
Charlie Mitchell |
|
| 1870 |
|
Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544) |
Tesch, Dale., Greg Abelar |
|
| 1871 |
|
Microsoft Azure Sentinel: Planning and implementing Microsoft s cloud-native SIEM solution |
Jonathan Trull, Nicholas DiCola, Yuri Diogenes |
|
| 1872 |
|
She’s In CTRL: How women can take back tech – to communicate, investigate, problem-solve, broker deals and protect themselves in a digital world |
Anne Imafidon |
|
| 1873 |
|
Surviving a Ransomware Attack with Azure Site Recovery |
Dave Kawula, Emile Cabot, Cary Sun, Cristal Kawula, John O'Neill Sr. |
|
| 1874 |
|
Exam Ref AZ-500 Microsoft Azure Security Technologies |
Yuri Diogenes , Orin Thomas |
|
| 1875 |
|
Computer Security in the 21st Century [1 ed.] |
D.T. Lee, S. P. Shieh, J. Doug Tygar |
1 |
| 1876 |
|
Security monitoring with Cisco security MARS Includes index |
Halleen, Gary, Kellogg, Greg |
|
| 1877 |
|
Cutthroat: high stakes & killer moves on the electronic frontier |
Stephen Keating |
|
| 1878 |
|
Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science, 1683) |
Luis Bathen (editor), Gokay Saldamli (editor), Xiaoyan Sun (editor), Thomas H. Austin (editor), Alex J. Nelson (editor) |
|
| 1879 |
|
The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting (Business Skills) [1 ed.] |
Mark Morowczynski, Rod Trent, Matthew Zorich |
1 |
| 1880 |
|
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server 2003 Network |
Roberta Bragg |
|
| 1881 |
|
Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science) [1st ed. 2021] |
Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) |
1 |
| 1882 |
|
Secure and Trustworthy Transportation Cyber-Physical Systems [1 ed.] |
Yunchuan Sun,Houbing Song (eds.) |
1 |
| 1883 |
|
MCSA/MCSE Self-paced Training Kit (exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 [1 ed.] |
Stan Reimer, Orin Thomas |
1 |
| 1884 |
|
Cyber Security Defense with Microsoft Defender |
Kawula, Dave, O'Neill Sr, John, Kawula, Cristal, Cabot, Emile, Sun, Cary |
|
| 1885 |
|
Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia |
Sarah Katz |
|
| 1886 |
|
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century [1 ed.] |
Demetrius Klitou (auth.) |
1 |
| 1887 |
|
Web and Information Security |
Ferrari E. |
|
| 1888 |
|
CISSP Training Kit |
David R. Miller |
|
| 1889 |
|
Information Security and Ethics: Social and Organizational Issues |
Marian Quigley |
|
| 1890 |
|
Internet Policy in China : A Field Study of Internet Cafés |
Helen Sun |
|
| 1891 |
|
Reinventing Cybersecurity [1 ed.] |
Jasmine Henry, Alison Gianotto, Coleen Shane, Tracy Bannon, Dr. Meg Layton, Breanne Boland, Angela Marafino, Latha Maripuri, Carlota Sage, Carla Sun |
1 |
| 1892 |
|
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals |
Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski |
|
| 1893 |
|
Exam Ref AZ-500 Microsoft Azure Security Technologies |
Yuri Diogenes, Orin Thomas |
|
| 1894 |
|
Breaking and Entering: The Extraordinary Story of a Hacker Called 'Alien' |
Jeremy Smith, Sue Buswell (editor) |
|
| 1895 |
|
The news machine : hacking : the untold story |
Hanning, James, Mulcaire, Glenn |
|
| 1896 |
|
Enumerating Esoteric Attack Surfaces: Recon for Bug Bounty Hunters, Penetration Testers and OSINT Aggressors |
Jann Moon |
|
| 1897 |
|
International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors |
U. S. Department Of Defense, Strategic Studies Institute, United States Army War College, Department Of Homeland Security, Federal Bureau Of Investigation |
|
| 1898 |
|
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals [2 ed.] |
Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski |
2 |
| 1899 |
|
Out of the Inner Circle. A Hacker's Guide to Computer Security |
Bill Landreth, Howard Rheingold |
|
| 1900 |
|
Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III [1st ed.] |
Xingming Sun, Zhaoqing Pan, Elisa Bertino |
1 |
| 1901 |
|
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century |
Shimon Brathwaite |
|
| 1902 |
|
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century [1 ed.] |
Shimon Brathwaite |
1 |
| 1903 |
|
CISSP Rapid Review |
Darril Gibson |
|
| 1904 |
|
Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II [1 ed.] |
Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino (eds.) |
1 |
| 1905 |
|
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks [1st ed.] |
Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
1 |
| 1906 |
|
How to do Privacy in the 21st Century: The True Story of Hacktivism [1 ed.] |
Peter Burnett, Valeria Vescina |
1 |
| 1907 |
|
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft® Internet Security and Acceleration Server 2004 |
Reimer Stan |
|
| 1908 |
|
Microsoft Azure Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution (IT Best Practices - Microsoft Press) [2 ed.] |
Yuri Diogenes, Nicholas DiCola, Tiander Turpijn |
2 |
| 1909 |
|
Hacking Cyberspace |
David J. Gunkel |
|
| 1910 |
|
Project Zero Trust : A Story about a Strategy for Aligning Security and the Business |
Finney, George,Kindervag, John, |
|
| 1911 |
|
Microsoft Internet Security and Acceleration (ISA) Server 2000: Administrator's Pocket Consultant [illustrated edition] |
Jason Ballard, Bud Ratliff |
|
| 1912 |
|
The Darkest Web Drugs, death and destroyed lives ... the inside story of the internet’s evil twin |
Eileen Ormsby |
|
| 1913 |
|
The Hacker Crackdown: Law and Disorder on the Electronic Frontier |
Michael Bruce Sterling |
|
| 1914 |
|
Analysis and design of networked control systems under attacks [First edition] |
Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan |
|
| 1915 |
|
Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings [1 ed.] |
Ruilin Li, Bing Sun, Chao Li, Longjiang Qu (auth.), Ron Steinfeld, Philip Hawkes (eds.) |
1 |
| 1916 |
|
A British Hacker in America: The story of PMF & 'Operation Cybersnare' - The U.S. Secret Service's first online sting |
Pmf |
|
| 1917 |
|
Improving Web Application Security: Threats and Countermeasures [1 ed.] |
Microsoft Corporation |
1 |
| 1918 |
|
Exam Ref AZ-700 Designing and Implementing Microsoft Azure Networking Solutions [1 ed.] |
Charles Pluta |
1 |
| 1919 |
|
Assessing Network Security |
Kevin Lam, David LeBlanc, Ben Smith |
|
| 1920 |
|
Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II [1st ed.] |
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena |
1 |
| 1921 |
|
Internet Wars: The Struggle for Power in the 21st Century [1st ed.] |
Fergus Hanson |
1 |
| 1922 |
|
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World |
Stefanick, Lorna |
|
| 1923 |
|
Economics of Information Security and Privacy III [1 ed.] |
Sam Ransbotham, Sabyasachi Mitra (auth.), Bruce Schneier (eds.) |
1 |
| 1924 |
|
Economics of Information Security (Advances in Information Security) [1 ed.] |
L. Jean Camp, Stephen Lewis |
1 |
| 1925 |
|
Securing Freedom in the Global Commons (Stanford Security Studies) |
Scott Jasper |
|
| 1926 |
|
Cyber Terrorism: Political And Economic Implications |
Andrew M. Colarik |
|
| 1927 |
|
Cybersecurity Investments: Decision Support Under Economic Aspects [1 ed.] |
Stefan Beissel (auth.) |
1 |
| 1928 |
|
Protecting America's Freedom in the Information Age (A Report of the Markle Foundation Task Force) |
Zoe Baird, James Barksdale |
|
| 1929 |
|
Dark Web and Deep Web: Place of anonymity and freedom of expression |
Smin Oienen |
|
| 1930 |
|
The Economics of Information Security and Privacy [1 ed.] |
Matthias Brecht, Thomas Nowey (auth.), Rainer Böhme (eds.) |
1 |
| 1931 |
|
Cyber War and Cyber Peace: Digital Conflict in the Middle East |
Mike Sexton, Eliza Campbell (editors) |
|
| 1932 |
|
Digital Whoness: Identity, Privacy And Freedom In The Cyberworld [1st Edition] |
Rafael Capurro, Michael Eldred, Daniel Nagel |
1 |
| 1933 |
|
OECD guidelines for the security of information systems and networks : towards a culture of security = Lignes directrices de l’OCDE régissant la sécurité des systèmes et réseaux d’information : vers un culture de la sécurité. |
OECD |
|
| 1934 |
|
The real cyber war : the political economy of Internet freedom [1st Edition] |
Jablonski, Michael, Powers, Shawn M |
1 |
| 1935 |
|
The Economics of Computer Hacking |
Peter T., Christopher J. |
|
| 1936 |
|
Digital whoness : identity, privacy and freedom in the cyberworld |
Capurro, Rafael, Eldred, Michael, Nagel, Daniel |
|
| 1937 |
|
Hacking University: Mobile Phone & App Hacking & Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps & Precisely ... (Hacking Freedom and Data Driven Book 5) |
Isaac D. Cody |
|
| 1938 |
|
This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information |
Andy Greenberg |
|
| 1939 |
|
Information Security Across Federal Agencies: Analysis Of Adequacy And Effectiveness |
Shane Palmer |
|
| 1940 |
|
Developing a Cybersecurity Immune System for Industry 4.0 |
Sergei Petrenko (author) |
|
| 1941 |
|
Managing Information Risk and the Economics of Security (Medizinische Informatik Und Satistik) [1 ed.] |
M. Eric Johnson |
1 |
| 1942 |
|
Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 [1 ed.] |
Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) |
1 |
| 1943 |
|
This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world’s information |
Andy Greenberg |
|
| 1944 |
|
Data Security and Privacy in Massachusetts [2 ed.] |
Stephen Y. Chow (editor) |
2 |
| 1945 |
|
The Privacy Handbook: Proven Countermeasures for Combating Threats to Privacy, Security, and Personal Freedom |
Michael E. Chesbro |
|
| 1946 |
|
Economics of Identity Theft: Avoidance, Causes and Possible Cures [1 ed.] |
L. Jean Camp |
1 |
| 1947 |
|
Encryption Works : How to Protect Your Privacy in the Age of NSA Surveillance |
Micah Lee |
|
| 1948 |
|
Take control of your online privacy |
Joe Kissell |
|
| 1949 |
|
Implementing NAP and NAC security technologies : the complete guide to network access control |
Daniel Hoffman |
|
| 1950 |
|
Mastering Kali Linux for Advanced Penetration Testing [all] |
Robert W. Beggs |
|
| 1951 |
|
Official (Isc)2 Guide to the Issmp Cbk |
|
|
| 1952 |
|
Risk management solutions for Sarbanes-Oxley section 404 IT compliance |
John S Quarterman |
|
| 1953 |
|
Network Intrusion Detection [3rd ed] |
Stephen Northcutt, Judy Novak |
3 |
| 1954 |
|
Nmap Cookbook: The Fat-free Guide to Network Scanning |
Nicholas Marsh |
|
| 1955 |
|
Web Penetration Testing with Kali Linux |
Joseph Muniz, Aamir Lakhani |
|
| 1956 |
|
Network Security Bible [1 ed.] |
Eric Cole, Ronald L. Krutz, James Conley |
1 |
| 1957 |
|
Phishing : cutting the identity theft line |
Rachael Lininger, Russell Dean Vines |
|
| 1958 |
|
Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility |
Russell Smith |
|
| 1959 |
|
CEH : official certified ethical hacker review guide |
Kimberly Graves |
|
| 1960 |
|
Digital Crime and Forensic Science in Cyberspace [illustrated edition] |
et al, Panagiotis Kanellis |
|
| 1961 |
|
Firewalls For Dummies [2nd ed] |
Brian Komar, Ronald Beekelaar, Joern Wettern |
2 |
| 1962 |
|
Integrating security and software engineering: advances and future visions [illustrated edition] |
Haralambos Mouratidis, Haralambos Mouratidis, Paolo Giorgini |
|
| 1963 |
|
PCI DSS : a Pocket Guide |
Alan Calder, Nicki Carter |
|
| 1964 |
|
The Perfect Weapon War, Sabotage, and Fear in the Cyber Age |
Sanger, David E |
|
| 1965 |
|
Nmap 6 ;a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators: network exploration and security auditing cookbook |
Calderon Pale, Paulino |
|
| 1966 |
|
Instant Metasploit starter |
Ranganath, Karthik |
|
| 1967 |
|
Snort for Dummies |
Charlie Scott, Paul Wolfe, Bert Hayes |
|
| 1968 |
|
Understanding Cyber Threats and Attacks |
Ph.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor) |
|
| 1969 |
|
Mission-critical security planner : when hackers won't take no for an answer |
Eric Greenberg |
|
| 1970 |
|
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and L7-filter |
Gheorghe, Lucian, Dempster, Barrie |
|
| 1971 |
|
Handbook of security and networks |
Chen, Hui,Li, Frank Haizhon,Xiao, Yang |
|
| 1972 |
|
Penetration testing protecting networks and systems |
Henry, Kevin M |
|
| 1973 |
|
Internet Firewalls and Network Security [2nd ed] |
Chris Hare, Karanjit Siyan |
2 |
| 1974 |
|
An Introduction to Computer Security: The NIST Handbook |
Barbara Guttman |
|
| 1975 |
|
Practical Core Software Security: A Reference Framework |
James F Ransome, Mark S Merkow, Anmol |
|
| 1976 |
|
Vulnerability Management [1 ed.] |
Park Foreman |
1 |
| 1977 |
|
Hacking for Dummies |
Kevin Beaver, Stuart McClure |
|
| 1978 |
|
Securing SCADA Systems |
Ronald L. Krutz |
|
| 1979 |
|
How To Hack Like a Ghost |
Sparc Flow |
|
| 1980 |
|
Rethinking Cybercrime: Critical Debates |
Tim Owen, Jessica Marshall |
|
| 1981 |
|
Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines |
Resource, Cyber Security |
|
| 1982 |
|
Innovative Security Solutions for Information Technology and Communications: 14th International Conference, SecITC 2021, Virtual Event, November ... Papers (Lecture Notes in Computer Science) |
Peter Y.A. Ryan (editor), Cristian Toma (editor) |
|
| 1983 |
|
Handbook Certified Data Protection Officer: Practical Work Plan Guidance |
Kadir, Romeo |
|
| 1984 |
|
Cybersecurity Fundamentals |
Rajesh Kumar Goutam |
|
| 1985 |
|
Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment [2 ed.] |
Pascal Ackerman |
2 |
| 1986 |
|
Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents |
Erdal Ozkaya |
|
| 1987 |
|
Adversary-Aware Learning Techniques and Trends in Cybersecurity [1st ed. 2021] |
Prithviraj Dasgupta (editor), Joseph B. Collins (editor), Ranjeev Mittu (editor) |
1 |
| 1988 |
|
World Internet Development Report 2019: Blue Book for World Internet Conference, Translated by CCTB Translation Service |
Chinese Academy of Cyberspace Studies |
|
| 1989 |
|
Hack Online Stalkers, Hackers, & Visitors - Get & Trace IPs FOR REAL. |
ghost4815 |
|
| 1990 |
|
Cybersecurity in Digital Transformation: Scope and Applications |
Dietmar P.F. Möller |
|
| 1991 |
|
Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers (Security and Cryptology) |
Matthew Bernhard (editor), Andrea Bracciali (editor), Lewis Gudgeon (editor), Thomas Haines (editor), Ariah Klages-Mundt (editor), Shin'ichiro Matsuo (editor), Daniel Perez (editor), Massimiliano Sala (editor), Sam Werner (editor) |
|
| 1992 |
|
Sensemaking for Security (Advanced Sciences and Technologies for Security Applications) |
Anthony J. Masys (editor) |
|
| 1993 |
|
Information Security and Cryptology: 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020, Revised Selected Papers (Lecture Notes in Computer Science) |
Yongdong Wu (editor), Moti Yung (editor) |
|
| 1994 |
|
Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196) [1st ed. 2021] |
Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor) |
1 |
| 1995 |
|
Ransomware Revolution: The Rise Of A Prodigious Cyber Threat [85, 1st Edition] |
Matthew Ryan |
1 |
| 1996 |
|
THE ADVANCED PENETRATING TESTING : Step-By-Step Guide To Ethical Hacking and Penetration Testing Made Easy |
JEFF, DR. PATRICK |
|
| 1997 |
|
Secrets of Grey Hat Hacker - The Playbook of a Genius [1, 1 ed.] |
Genuis stuff |
1 |
| 1998 |
|
Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 [1 ed.] |
Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor) |
1 |
| 1999 |
|
THE NEW CYBERSECURITY FOR BEGINNERS AND DUMMIES: Extensive Guide To Getting Started In Cybersecurity |
JEFF, DR. PATRICK |
|
| 2000 |
|
Attribution als Herausforderung für EU-Cybersanktionen : Eine Analyse von WannaCry, NotPetya, Cloud Hopper, Bundestag-Hack, OVCW |
Annegret Bendiek, Matthias Schulze |
|
| 2001 |
|
Backdoor: Bypassing the Gatekeepers in Cybersecurity |
Femi Reis |
|
| 2002 |
|
Privacy, Regulations, and Cybersecurity |
Chris Moschovitis |
|
| 2003 |
|
CEH v11 Certified Ethical Hacker Study Guide [1 ed.] |
Ric Messier |
1 |
| 2004 |
|
The Ultimate Guide on Cybersecurity + Data Science: 2 Books in 1. From Big Data to Knowledge Management + Data Analytics with R and the Blockchain for Your Business Success |
Adam Walker, Keith Hughes |
|
| 2005 |
|
Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II [1 ed.] |
Elisa Bertino, Haya Shulman, Michael Waidner |
1 |
| 2006 |
|
Hackear a Coyote [1 ed.] |
Alan Mills |
1 |
| 2007 |
|
Distributed Denial of Service Attacks |
Rajeev Singh, Mangey Ram |
|
| 2008 |
|
Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings |
Mirosław Kutyłowski, Jun Zhang, Chao Chen |
|
| 2009 |
|
Security Risk Models for Cyber Insurance |
David Rios Insua, Caroline Baylon, Jose Vila |
|
| 2010 |
|
How to Hack Like a Ghost: Breaching the Cloud |
Sparc Flow |
|
| 2011 |
|
Frontiers in Cyber Security: 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers (Communications in Computer and Information Science) |
Chunjie Cao (editor), Yuqing Zhang (editor), Yuan Hong (editor), Ding Wang (editor) |
|
| 2012 |
|
The New Penetrating Testing for Beginners: Essential Guide to Ethical Hacking and Penetration Testing Made Easy |
Wilfred Dawson |
|
| 2013 |
|
Recent Trends in Blockchain for Information Systems Security and Privacy [1 ed.] |
Ajith Abraham, Amit Kumar Tyagi |
1 |
| 2014 |
|
CyberBRICS: Cybersecurity Regulations In The BRICS Countries [1st Edition] |
Luca Belli |
1 |
| 2015 |
|
Cybersecurity Research Analysis Report for Europe and Japan: Cybersecurity and Privacy Dialogue Between Europe and Japan [1st ed.] |
Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc |
1 |
| 2016 |
|
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability |
David Brewer |
|
| 2017 |
|
Modern-Cryptography-Proof Techniques and Implementations |
|
|
| 2018 |
|
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare |
A.J. Jenkinson |
|
| 2019 |
|
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business [1 ed.] |
Kim Crawley |
1 |
| 2020 |
|
Cyberspace in Peace and War [2 ed.] |
Martin Libicki |
2 |
| 2021 |
|
Modern Cryptography for Cybersecurity Professionals |
Lisa Bock |
|
| 2022 |
|
Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents |
Glen D. Singh |
|
| 2023 |
|
Research Anthology on Business Aspects of Cybersecurity |
Information Reso Management Association |
|
| 2024 |
|
Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, ... Selected Papers (Security and Cryptology) |
Sokratis Katsikas (editor), Costas Lambrinoudakis (editor), Nora Cuppens (editor), John Mylopoulos (editor), Christos Kalloniatis (editor), Weizhi Meng (editor), Steven Furnell (editor), Frank Pallas (editor), Jörg Pohle (editor) |
|
| 2025 |
|
Hacking by Samuel, Cyrus |
Samuel, Cyrus |
|
| 2026 |
|
Kali Linux Penetration Testing Bible [1 ed.] |
Gus Khawaja |
1 |
| 2027 |
|
Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) [1st ed. 2021] |
Yan Lin |
1 |
| 2028 |
|
The Complete Guide to Hacking |
Wilfred Dawson |
|
| 2029 |
|
Network Security And Cyber Defense (CNSS) |
Singh, Gurpej |
|
| 2030 |
|
CRISC Exam Complete Preparation NEW (Isaca): Pass your Exam On the First Try (Latest Questions & Detailed Explanation) |
Daccache, Georgio |
|
| 2031 |
|
Fortigate Admin Crash Course. Part 1 |
Ofer Shmueli |
|
| 2032 |
|
Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers |
Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell |
|
| 2033 |
|
EC-Council Certified Ethical Hacker |
Unknown |
|
| 2034 |
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting [1 ed.] |
Gregory C. Rasner |
1 |
| 2035 |
|
Modern Cryptography for Cyber Security Professionals(2021)[Bock][9781838644352] |
Lisa Bock |
|
| 2036 |
|
Cryptography and Network Security: An Introduction [1 ed.] |
R. Achary |
1 |
| 2037 |
|
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I |
Shiho Moriai, Huaxiong Wang |
|
| 2038 |
|
Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 |
Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez |
|
| 2039 |
|
China Internet Development Report 2021: Blue Book for World Internet Conference |
Chinese Academy of Cyberspace Studies |
|
| 2040 |
|
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 2 (Advances in Intelligent Systems and Computing, 1300) |
Aboul Ella Hassanien (editor), Siddhartha Bhattacharyya (editor), Satyajit Chakrabati (editor), Abhishek Bhattacharya (editor), Soumi Dutta (editor) |
|
| 2041 |
|
Hacking: A Beginners Guide to Read How to Hack Websites, Wireless Networks, Manage with Social Engineering, Make a Penetration Test, and Maintain Your Computer Safe |
Samuel, Cyrus |
|
| 2042 |
|
COMPUTER HACKING SYSTEM: A STEP BY STEP GUIDE ON HACKING ENCYCLOPEDIA |
GREGORY PH.D, LISA H. |
|
| 2043 |
|
CompTIA Security+ Review Guide |
James Michael Stewart |
|
| 2044 |
|
How Cybersecurity Really Works |
Sam Grubb |
|
| 2045 |
|
Advanced Smart Computing Technologies in Cybersecurity and Forensics [1 ed.] |
Keshav Kaushik (editor), Shubham Tayal (editor), Akashdeep Bhardwaj (editor), Manoj Kumar (editor) |
1 |
| 2046 |
|
8 Steps to Better Security: A Simple Cyber Resilience Guide for Business |
Kim Crawley |
|
| 2047 |
|
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer [1 ed.] |
Jean-Philippe Aumasson |
1 |
| 2048 |
|
Privacy by Design for the Internet of Things: Building accountability and security |
Andrew Crabtree (editor), Hamed Haddadi (editor), Richard Mortier (editor) |
|
| 2049 |
|
Cyberwars in the Middle East |
Ahmed Al-Rawi |
|
| 2050 |
|
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments [3 ed.] |
Douglas Landoll |
3 |
| 2051 |
|
TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers |
NARAYANAMOORTHI, VIKRAMAN |
|
| 2052 |
|
Dark Web Investigation [1st Edition] |
Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson |
1 |
| 2053 |
|
The GDPR Challenge: Privacy, Technology, and Compliance in an Age of Accelerating Change [1 ed.] |
Amie Taal (editor) |
1 |
| 2054 |
|
The Official (ISC)2 CISSP CBK Reference [6 ed.] |
Arthur J. Deane, Aaron Kraus |
6 |
| 2055 |
|
Data Science and Security: Proceedings of IDSCS 2021 (Lecture Notes in Networks and Systems, 290) [1st ed. 2021] |
Samiksha Shukla (editor), Aynur Unal (editor), Joseph Varghese Kureethara (editor), Durgesh Kumar Mishra (editor), Dong Seog Han (editor) |
1 |
| 2056 |
|
Adversarial Tradecraft in Cybersecurity(2021)[Borges][9781801076203] |
Borges |
|
| 2057 |
|
Master Hacking, Master The Tools: Understanding Process Of Hacking, Notions of Linux, Linux Mint, Kali Linux, Penetrating Tests And More: Kali Linux Tools List |
Baltzley, Barton |
|
| 2058 |
|
The Art of Attack : Attacker Mindset for Security Professionals |
Maxie Reynolds |
|
| 2059 |
|
Cyberjutsu: Cybersecurity for the Modern Ninja [1 ed.] |
Ben McCarty |
1 |
| 2060 |
|
CYBERSECURITY MANUAL FOR BEGINNERS : Counter present day dangers and utilize best in class devices and methods to secure your association against cybercriminals |
FORD, ALLAN |
|
| 2061 |
|
A Vulnerable System: The History of Information Security in the Computer Age |
Andrew J. Stewart |
|
| 2062 |
|
Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings [1st ed. 2021] |
Mikael Asplund, Simin Nadjm-Tehrani |
1 |
| 2063 |
|
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers [1 ed.] |
Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li |
1 |
| 2064 |
|
How to get a job in cybersecurity earning over six figures : Zero to Cyber Hero |
Lina Lau |
|
| 2065 |
|
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II |
Shiho Moriai, Huaxiong Wang |
|
| 2066 |
|
Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, ... 2021, Proceedings (Security and Cryptology) |
Patrick Longa (editor), Carla Ràfols (editor) |
|
| 2067 |
|
CISSP Exam Cram 5th Edition [5 ed.] |
Michael Gregg |
5 |
| 2068 |
|
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities |
Vickie Li |
|
| 2069 |
|
Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing) |
Akashdeep Bhardwaj (editor), Varun Sapra (editor) |
|
| 2070 |
|
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1 [1] |
Aboul Ella Hassanien, Siddhartha Bhattacharyya, Satyajit Chakrabati, Abhishek Bhattacharya, Soumi Dutta |
1 |
| 2071 |
|
Cyberjutsu |
McCarty, Ben |
|
| 2072 |
|
Network and System Security: 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings (Security and Cryptology) |
Min Yang (editor), Chao Chen (editor), Yang Liu (editor) |
|
| 2073 |
|
Data-Centric Business and Applications: ICT Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity [5, 1 ed.] |
Tamara Radivilova, Dmytro Ageyev, Natalia Kryvinska |
1 |
| 2074 |
|
Auditing Information and Cyber Security Governance: A Controls-Based Approach [1 ed.] |
Robert E. Davis |
1 |
| 2075 |
|
Transforming Cybersecurity Solutions Using Blockchain [1st Edition] |
Rashmi Agrawal, Neha Gupta |
1 |
| 2076 |
|
Cyber Threats in Healthcare: Understanding Risks and Mitigation |
Nina Godbole |
|
| 2077 |
|
Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones |
Marco Grassi (@marcograss), Xingyu Chen (@0xKira233) |
|
| 2078 |
|
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks [1 ed.] |
Chris Peiris, Binil Pillai, Abbas Kudrati |
1 |
| 2079 |
|
Exam SY0-601: Comptia Security + |
David Seidl |
|
| 2080 |
|
CompTIA Security+ Study Guide: Exam SY0-601 [8 ed.] |
Mike Chapple, David Seidl |
8 |
| 2081 |
|
The Hackers Codex: Modern Web Application Attacks Demystified |
Wieser, Brandon |
|
| 2082 |
|
Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications) [1 ed.] |
Arun Kumar Singh (editor), Balwinder Raj (editor) |
1 |
| 2083 |
|
Building an Effective Security Program for Distributed Energy Resources and Systems [1 ed.] |
Mariana Hentea |
1 |
| 2084 |
|
CISSP: Certified Information Systems Security Professional |
Deane, Arthur J.,Kraus, Aaron,, Aaron Kraus |
|
| 2085 |
|
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners [1 ed.] |
Sam Grubb |
1 |
| 2086 |
|
Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security |
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit |
|
| 2087 |
|
The Game Has Changed:: Small Business Security And IT Advice In The Age Of Cybercrime |
Javaheri, David |
|
| 2088 |
|
Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II (Security and Cryptology) |
Nikita Borisov (editor), Claudia Diaz (editor) |
|
| 2089 |
|
Emerging Information Security and Applications: Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected ... in Computer and Information Science) |
Weizhi Meng (editor), Sokratis K. Katsikas (editor) |
|
| 2090 |
|
Cyber Forensics: Examining Emerging and Hybrid Technologies [1 ed.] |
Albert J. Marcella (editor) |
1 |
| 2091 |
|
The Cybersecurity Self-Help Guide [1 ed.] |
Arun Soni |
1 |
| 2092 |
|
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners - EARLY ACCESS |
Sam Grubb |
|
| 2093 |
|
Emerging Topics in Hardware Security |
Mark Tehranipoor |
|
| 2094 |
|
Digitalisierung, Globalisierung und Risikoprävention: Festschrift für Ulrich Sieber zum 70. Geburtstag. 2 Teilbände [1 ed.] |
Engelhart, Marc, Kudlich, Hans, Vogel, Benjamin |
1 |
| 2095 |
|
The Security Engineer Handbook [1.0 ed.] |
Mark Widse, Tom Park |
10 |
| 2096 |
|
Securing Social Networks in Cyberspace [1 ed.] |
Al-Sakib Khan Pathan (editor) |
1 |
| 2097 |
|
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race |
Nicole Perlroth |
|
| 2098 |
|
Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (Security and Cryptology) |
Nikita Borisov (editor), Claudia Diaz (editor) |
|
| 2099 |
|
Hacking Tools: Introducing To Linux, Linux Mint, Wireless Networks, Penetrating Tests And Kali Linux: Kali Linux Tools Tutorial |
Palk, Stewart |
|
| 2100 |
|
Common Windows, Linux and Web Server Systems Hacking Techniques |
Dr. Hidaia Mahmood Alassouli |
|
| 2101 |
|
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker |
WILLIAM PH.D, DR. SANDRA |
|
| 2102 |
|
The "Essence" of Network Security: An End-to-End Panorama |
Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay |
|
| 2103 |
|
Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings (Lecture Notes in Computer Science, 12835) [1st ed. 2021] |
Toru Nakanishi (editor), Ryo Nojima (editor) |
1 |
| 2104 |
|
The Nmap cookbook: Beat the Beast |
Nima Shahmoradi, Nasim Kangari |
|
| 2105 |
|
CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide [1 ed.] |
Joseph Muniz, Steven Chimes, James Risler |
1 |
| 2106 |
|
DBIR 2021 data breach investigations report. |
coll. |
|
| 2107 |
|
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity |
Christian Espinosa |
|
| 2108 |
|
Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems, 467) |
Sudhanshu Maurya (editor), Sateesh K. Peddoju (editor), Badlishah Ahmad (editor), Ines Chihi (editor) |
|
| 2109 |
|
Hacking Codes: The Secret Of Hacking For Beginners: Define Computer Hacking |
Marrion, Loria |
|
| 2110 |
|
Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices [1 ed.] |
Alex Alexandrou |
1 |
| 2111 |
|
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (Security and Cryptology) |
Juan A. Garay (editor) |
|
| 2112 |
|
Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (Security and Cryptology) |
Juan A. Garay (editor) |
|
| 2113 |
|
Building a European Digital Public Space: Strategies for Taking Back Control From Big Tech Platforms |
Alexander Baratsits |
|
| 2114 |
|
Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 7–10, 2021, Revised Selected Papers |
Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin Garcia-Alfaro |
|
| 2115 |
|
Optimal Spending on Cybersecurity Measures: Risk Management |
Tara Kissoon |
|
| 2116 |
|
CompTIA Security+: IT-Sicherheit verständlich erklärt -Die umfassende Prüfungsvorbereitung zur CompTIA-Prüfung SYO-601 |
Mathias Gut, Markus Kammermann |
|
| 2117 |
|
Hack into your Friends Computer [1. Auflage] |
Magelan Cyber Security |
1 |
| 2118 |
|
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021. Proceedings, Part I |
Kazue Sako, Nils Ole Tippenhauer (Eds.) |
|
| 2119 |
|
Metodologia OSINT para Investigar en Internet Tercera Edición [3 ed.] |
Julián Gutiérrez |
3 |
| 2120 |
|
Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021 (Lecture Notes in Networks and Systems, 421) |
Pradeep Kumar Singh (editor), Sławomir T. Wierzchoń (editor), Sudeep Tanwar (editor), Joel J. P. C. Rodrigues (editor), Maria Ganzha (editor) |
|
| 2121 |
|
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks |
Purackal, Rachel Sebastian |
|
| 2122 |
|
Cybersecurity for SCADA Systems [2 ed.] |
William T. Shaw |
2 |
| 2123 |
|
Hands-on Penetration Testing for Web Applications |
Richa Gupta |
|
| 2124 |
|
A Simple Cyber Resilience Guide for Business |
Crawley, Kim, |
|
| 2125 |
|
Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings (Security and Cryptology) |
Weizhi Meng (editor), Mauro Conti (editor) |
|
| 2126 |
|
Intelligent and Connected Vehicle Security |
Jiajia Liu |
|
| 2127 |
|
Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings ... and Telecommunications Engineering) |
Wenbo Shi (editor), Xiaofeng Chen (editor), Kim-Kwang Raymond Choo (editor) |
|
| 2128 |
|
(Isc)2 Cissp Certified Information Systems Security Professional Official Practice Tests |
Mike Chapple, David Seidl |
|
| 2129 |
|
CISSP: 3 in 1- Beginner's Guide to Learn the Realms of Security and Risk Management from A-Z using CISSP Principles+ Simple and Effective Strategies+ Advanced Methods to Learn the CISSP CBK Reference |
Jones, Daniel |
|
| 2130 |
|
Secure Control of Networked Control Systems and Its Applications |
Dong Yue, Songlin Hu, Zihao Cheng |
|
| 2131 |
|
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests [2 ed.] |
Mike Chapple, David Seidl |
2 |
| 2132 |
|
Cyber Threats and Nuclear Weapons |
Lin, Herbert, |
|
| 2133 |
|
Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I (Lecture Notes in Computer Science) |
Debin Gao (editor), Qi Li (editor), Xiaohong Guan (editor), Xiaofeng Liao (editor) |
|
| 2134 |
|
World Internet Development Report 2021: Blue Book for World Internet Conference |
Chinese Academy of Cyberspace Studies |
|
| 2135 |
|
Integration of WSNs into Internet of Things: A Security Perspective |
Sudhir Kumar Sharma, Bharat Bhushan, Raghvendra Kumar, Aditya Khamparia, Narayan C. Debnath |
|
| 2136 |
|
Risks and Security of Internet and Systems: 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers (Lecture Notes in Computer Science) |
Bo Luo (editor), Mohamed Mosbah (editor), Frédéric Cuppens (editor), Lotfi Ben Othmane (editor), Nora Cuppens (editor), Slim Kallel (editor) |
|
| 2137 |
|
IT Convergence and Security: Proceedings of ICITCS 2020 [1st ed.] |
Hyuncheol Kim, Kuinam J. Kim |
1 |
| 2138 |
|
Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet |
Snowden, John |
|
| 2139 |
|
The Hitchhiker's Guide to Online Anonymity - Version 1.0.7 - October 2021 [1.0.7 ed.] |
AnonymousPlanet |
107 |
| 2140 |
|
IT And Cyber Security For Beginners 2 Books in 1: Learn How To master IT and Cyber Security |
Hazel , Riley Zoey. |
|
| 2141 |
|
The Hitchhiker’s Guide to Online Anonymity - Version 0.9.4 - May 2021 [Version 0.9.4, Version 0.9.4 ed.] |
AnonymousPlanet |
94 |
| 2142 |
|
Routledge Companion to Global Cyber-Security Strategy [1 ed.] |
Scott N. Romaniuk (editor), Mary Manjikian (editor) |
1 |
| 2143 |
|
Cyber Security For Beginners: Learn How To Be Secure Online |
Hazel, Riley Zoey. |
|
| 2144 |
|
The Hitchhiker’s Guide to Online Anonymity (1.0.1, August 2021) [1.0.1, 1.0.1 ed.] |
AnonymousPlanet |
101 |
| 2145 |
|
The Complete Internet Security Manual. |
coll. |
|
| 2146 |
|
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 (Lecture Notes in Networks and Systems) |
Hani Ragab Hassen (editor), Hadj Batatia (editor) |
|
| 2147 |
|
Digital Robbery: ATM Hacking And Implications [1st Edition] |
Shun-Yung Kevin Wang, Ming-Li Hsieh |
1 |
| 2148 |
|
Advanced Cybersecurity Technologies [1 ed.] |
Ralph Moseley |
1 |
| 2149 |
|
Critical Infrastructure Protection XV: 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15–16, 2021, Revised Selected Papers [1 ed.] |
Jason Staggs, Sujeet Shenoi |
1 |
| 2150 |
|
Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics) |
Anand Handa (editor), Rohit Negi (editor), Sandeep K. Shukla (editor) |
|
| 2151 |
|
The Quantum Threat |
Pandya Ph.D., Jayshree |
|
| 2152 |
|
Advances in Cybersecurity Management [1st ed. 2021] |
Kevin Daimi (editor), Cathryn Peoples (editor) |
1 |
| 2153 |
|
Silicon Valley Cybersecurity Conference: Second Conference, SVCC 2021, San Jose, CA, USA, December 2–3, 2021, Revised Selected Papers (Communications in Computer and Information Science) |
Sang-Yoon Chang (editor), Luis Bathen (editor), Fabio Di Troia (editor), Thomas H. Austin (editor), Alex J. Nelson (editor) |
|
| 2154 |
|
Information Security and Cryptology – ICISC 2021: 24th International Conference, Seoul, South Korea, December 1–3, 2021, Revised Selected Papers (Lecture Notes in Computer Science) |
Jong Hwan Park (editor), Seung-Hyun Seo (editor) |
|
| 2155 |
|
Study Guide Exam CV0-003 |
Piper, Ben, |
|
| 2156 |
|
National Cyber Summit (NCS) Research Track 2020 [1st ed.] |
Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, Eric Imsand |
1 |
| 2157 |
|
Fortigate Infrastructure Study Guide v7.0 [1] |
|
1 |
| 2158 |
|
Strategic Approaches to Digital Platform Security Assurance |
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers |
|
| 2159 |
|
Breaking & Entering: A Pocket Guide For Friendly Remote Admins |
Andy Doering |
|
| 2160 |
|
Fortinet Fortigate Security Study Guide v7.0 [1] |
|
1 |
| 2161 |
|
HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII ... Applications, incl. Internet/Web, and HCI) |
Abbas Moallem (editor) |
|
| 2162 |
|
Network Ethical Hacking and Penetration Testing. Version 2.0 |
Albert Samuel |
|
| 2163 |
|
Cyberspace and Security: A fundamentally New Approach |
Victor Sheymov |
|
| 2164 |
|
Cybersecurity for Project Managers. A PRACTICAL GUIDE |
Niharika Srivastav &, Sanjay Saxena |
|
| 2165 |
|
CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) - epub for Kindle [2 ed.] |
Omar Santos |
2 |
| 2166 |
|
Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings |
Serge Vaudenay, Haya Shulman, Stephan Krenn |
|
| 2167 |
|
CompTIA Security+ SY0-601 Exam Cram [6 ed.] |
Marty M. Weiss |
6 |
| 2168 |
|
Assessing and Insuring Cybersecurity Risk |
Ravi Das |
|
| 2169 |
|
QUINTESSENTIAL GUIDE TO CYBERSECURITY For Starters : Step By Step Guide To Get Started |
SCOTT PH.D, HARRY |
|
| 2170 |
|
Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2021 (Lecture Notes in Networks and Systems, 481) |
Debasis Giri (editor), Jyotsna Kumar Mandal (editor), Kouichi Sakurai (editor), Debashis De (editor) |
|
| 2171 |
|
Threat Hunting with Elastic Stack |
Andrew Pease |
|
| 2172 |
|
Data Privacy And Trust In Cloud Computing: Building Trust In The Cloud Through Assurance And Accountability [1st Edition] |
Theo Lynn, John Mooney, Lisa Van Der Werff, Grace Fox |
1 |
| 2173 |
|
Distributed Denial of Service (DDoS) Attacks |
Amrita Dahiya and Brij B. Gupta |
|
| 2174 |
|
Information Security and Cryptology: 17th International Conference, Inscrypt 2021, Virtual Event, August 12–14, 2021, Revised Selected Papers |
Yu Yu (editor), Moti Yung (editor) |
|
| 2175 |
|
Technology Development for Security Practitioners (Security Informatics and Law Enforcement) |
Babak Akhgar (editor), Dimitrios Kavallieros (editor), Evangelos Sdongos (editor) |
|
| 2176 |
|
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, ... Selected Papers (Security and Cryptology) |
Joaquin Garcia-Alfaro (editor), Jose Luis Muñoz-Tapia (editor), Guillermo Navarro-Arribas (editor), Miguel Soriano (editor) |
|
| 2177 |
|
Start-up Secure: Baking Cybersecurity into Your Company from Founding to Exit |
Chris Castaldo |
|
| 2178 |
|
Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence |
Hemang Doshi |
|
| 2179 |
|
Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected ... in Computer and Information Science) |
Erol Gelenbe (editor), Marija Jankovic (editor), Dionysios Kehagias (editor), Anna Marton (editor), Andras Vilmos (editor) |
|
| 2180 |
|
Resilience in the Digital Age (Information Systems and Applications, incl. Internet/Web, and HCI) |
Fred S. Roberts (editor), Igor A. Sheremet (editor) |
|
| 2181 |
|
CompTIA Pentest+ (Practice Exams) |
Karamagi, Robert |
|
| 2182 |
|
Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings (Security and Cryptology) |
Joonsang Baek (editor), Sushmita Ruj (editor) |
|
| 2183 |
|
Advances in Malware and Data-Driven Network Security |
Brij B. Gupta |
|
| 2184 |
|
Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers (Lecture Notes in Computer Science) |
Joaquin Garcia-Alfaro (editor), Jean Leneutre (editor), Nora Cuppens (editor), Reda Yaich (editor) |
|
| 2185 |
|
CISSP: 4 in 1- Beginner's Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods |
Jones, Daniel |
|
| 2186 |
|
500+ DARK WEB LINKS |
Almas, Rarsa |
|
| 2187 |
|
Global Internet Governance: Influences from Malaysia and Singapore [1st ed.] |
Susan Leong, Terence Lee |
1 |
| 2188 |
|
Authentication of Embedded Devices: Technologies, Protocols and Emerging Applications |
Basel Halak |
|
| 2189 |
|
Hacking of Computer Networks. |
Unknown |
|
| 2190 |
|
Advances in Digital Forensics XVII: 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers (IFIP ... and Communication Technology, 612) [1st ed. 2021] |
Gilbert Peterson (editor), Sujeet Shenoi (editor) |
1 |
| 2191 |
|
Cyber Risks and Insurance: the Legal Principles |
QC, Dean Armstrong, Steward, Thomas, Thakerar, Shyam |
|
| 2192 |
|
Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data |
Lisa Bock |
|
| 2193 |
|
Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers |
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha |
|
| 2194 |
|
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure |
Cesar Bravo |
|
| 2195 |
|
Cloud Native Security |
Chris Binnie, Rory McCune |
|
| 2196 |
|
CISM (Certified Information Security Manager) |
ISACA |
|
| 2197 |
|
The Complete Internet Security Manual (New July 2021 Update) [10 ed.] |
Papercut Limited |
10 |
| 2198 |
|
Cyberjutsu: Cybersecurity for the Modern Ninja |
Ben McCarty |
|
| 2199 |
|
Quantum Computing in Cybersecurity |
Romil Rawat, Rajesh Kumar, Chakrawarti Sanjaya, Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, Hitesh Rawat |
|
| 2200 |
|
Ethical Hacking: A Hands-on Introduction to Breaking In |
Daniel Graham |
|
| 2201 |
|
Wireless and Mobile Hacking and Sniffing Techniques |
Hidaia Mahmood Alassouli |
|
| 2202 |
|
A Profound Guide On Cyber Security: Getting Protected At Ease As a Professional And a Beginner |
Amelia Mike |
|
| 2203 |
|
Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career |
Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen |
|
| 2204 |
|
ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings (IFIP ... and Communication Technology, 625) |
Audun Jøsang (editor), Lynn Futcher (editor), Janne Hagen (editor) |
|
| 2205 |
|
Mobile Internet Security: 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected Papers (Communications in Computer and Information Science) |
Igor Kotenko |
|
| 2206 |
|
Personalized Privacy Protection in Big Data |
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu |
|
| 2207 |
|
Information Security and Employee Behaviour: How to Reduce Risk Through Employee Education, Training and Awareness [2 ed.] |
Angus McIlwraith |
2 |
| 2208 |
|
CISSP Official Study Guide [9 ed.] |
Chapple, Mike |
9 |
| 2209 |
|
Cyber-Security Threats, Actors, and Dynamic Mitigation |
Nicholas Kolokotronis and Stavros Shiaeles |
|
| 2210 |
|
Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software |
Nir Yehoshua, Uriel Kosayev |
|
| 2211 |
|
Networking for Beginners: Simple Guide to Study Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber Security |
Mathew, Jack |
|
| 2212 |
|
Maîtriser la SSI pour les systèmes industriels: La Cybersécurité des systèmes industriels |
ANSSI |
|
| 2213 |
|
CISSP Official Practice Tests [3 ed.] |
Chapple, Mike |
3 |
| 2214 |
|
CompTIA PenTest+ Study Guide: Exam PT0-002 [2 ed.] |
Mike Chapple, David Seidl |
2 |
| 2215 |
|
Classical and Physical Security of Symmetric Key Cryptographic Algorithms |
Anubhab Baksi |
|
| 2216 |
|
Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam |
David Okeyode |
|
| 2217 |
|
Real-World Bug Hunting: A Field Guide to Web Hacking [1.0] |
Yaworski, Peter |
10 |
| 2218 |
|
Kali Linux 3 in 1 Beginners Guide |
Thorpe, Ethan |
|
| 2219 |
|
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists [Second edition] |
Graeme Browning |
|
| 2220 |
|
Encyclopedia Cyberspacia |
|
|
| 2221 |
|
Hacking Web : How to Hacking Web And Make Money Hacking Ethically |
Yaworski, Peter |
|
| 2222 |
|
MCE Microsoft ® Certified Expert Cybersecurity Architect Study Guide. Exam SC- 100 |
Kathiravan Udayakumar, Puthiyavan Udayakumar |
|
| 2223 |
|
Mastering Secure Coding Writing Software That Stands Up to Attacks |
Larry Jones |
|
| 2224 |
|
Ethical Hacking |
Lewis, Elijah |
|
| 2225 |
|
Hacking Android |
Terry D. Clark |
|
| 2226 |
|
Security on the Web [1 ed.] |
Marvin Zelkowitz |
1 |
| 2227 |
|
On the Grid |
Luke Smith |
|
| 2228 |
|
Intelligent Data Security Solutions for e-Health Applications |
Amit Kumar Singh, Mohamed Elhoseny |
|
| 2229 |
|
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News |
Clint Watts |
|
| 2230 |
|
Introduction to Security, Eighth Edition |
Robert Fischer Ph.D., Edward Halibozek MBA, David Walters |
|
| 2231 |
|
Advances in Smart Grid Power System: Network, Control and Security |
Anuradha Tomar, Ritu Kandari |
|
| 2232 |
|
A Practical Guide to Digital Forensics Investigations, 2nd Edition |
Darren R. Hayes |
|
| 2233 |
|
Cybertorture: A Very Brief Introduction |
Tolga Theo Yalur |
|
| 2234 |
|
CCNP Security Cisco Secure Firewall and Intrusion Prevention System |
Nazmul Rajib |
|
| 2235 |
|
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition [2 ed.] |
Troy McMillan |
2 |
| 2236 |
|
CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide [3 ed.] |
Troy McMillan |
3 |
| 2237 |
|
CISSP Cert Guide (Certification Guide) [4 ed.] |
Robin Abernathy, Darren Hayes |
4 |
| 2238 |
|
CEH Certified Ethical Hacker Cert Guide (Certification Guide) [4 ed.] |
Omar Santos, Michael Gregg |
4 |
| 2239 |
|
Computer Security Fundamentals [5 ed.] |
William Chuck Easttom |
5 |
| 2240 |
|
Zero Trust in Resilient Cloud and Network Architectures |
Dhrumil Prajapati, Vinay Saini, Josh Halley, Ariel Leza |
|
| 2241 |
|
The Basics of Web Hacking. Tools and Techniques to Attack the Web |
Josh Pauli (Auth.) |
|
| 2242 |
|
CISSP Cert Guide 4th Edition [4 ed.] |
Robin Abernathy, Darren R. Hayes |
4 |
| 2243 |
|
Distributed Control Methods and Cyber Security Issues in Microgrids |
Wenchao Meng (editor), Xiaoyu Wang (editor), Shichao Liu (editor) |
|
| 2244 |
|
Zero Trust Architecture |
Cindy Green-Ortiz, Brandon Fowler, Jason Frazier, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald |
|
| 2245 |
|
Computer Security Fundamentals, 5th Edition |
William Chuck Easttom |
|
| 2246 |
|
Cloud Computing: Concepts, Technology, Security, and Architecture (The Pearson Digital Enterprise Series from Thomas Erl) |
Thomas Erl, Eric Monroy |
|
| 2247 |
|
CompTIA Security+ SY0-701 Cert Guide (Certification Guide) [1 ed.] |
Lewis Heuermann |
1 |
| 2248 |
|
IPSec the new security standart for the internet, intranets and virtual private networks [2nd ed] |
Doraswamy, Naganand, Harkins, Dan |
2 |
| 2249 |
|
Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Certification Guide) [1 ed.] |
Omar Santos |
1 |
| 2250 |
|
CompTIA® Advanced Security Practitioner (CASP+) CAS-004 Cert Guide |
Troy McMillan |
|
| 2251 |
|
Certified Ethical Hacker (Ceh) Exam Cram (Exam Cram (Pearson)) [1 ed.] |
William Chuck Easttom |
1 |
| 2252 |
|
CompTIA PenTest+ PT0-002 Cert Guide [2 ed.] |
Omar Santos |
2 |
| 2253 |
|
Securing Enterprise Networks with Cisco Meraki (for Duc ka) |
Ryan Chaney, Simerjit Singh |
|
| 2254 |
|
International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic) [1 ed.] |
J. &, Eriksson |
1 |
| 2255 |
|
Internet governance: the new frontier of global institutions [1 ed.] |
John Mathiason |
1 |
| 2256 |
|
Borders in Cyberspace: Information Policy and the Global Information Infrastructure |
Brian Kahin, Charles Nesson |
|
| 2257 |
|
Access Controlled. The Shaping of Power, Rights, and Rule in Cyberspace |
Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 18.01.2013Street date: 28.02.2014 |
|
| 2258 |
|
Researching Internet Governance: Methods, Frameworks, Futures (Information Policy) |
Laura Denardis (editor), Derrick Cogburn (editor), Nanette S. Levinson (editor), Francesca Musiani (editor) |
|
| 2259 |
|
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency |
Olson, Parmy |
|
| 2260 |
|
Protocol Politics: The Globalization of Internet Governance (Information Revolution and Global Politics) |
Laura DeNardis |
|
| 2261 |
|
Tor: From The Dark Web To The Future Of Privacy [1 ed.] |
Ben Collier |
1 |
| 2262 |
|
We Are All Targets: How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos |
Matt Potter |
|
| 2263 |
|
IoT: Security and Privacy Paradigm (Internet of Everything (IoE)) [1 ed.] |
Souvik Pal (editor), Vicente García Díaz (editor), Dac-Nhuong Le (editor) |
1 |
| 2264 |
|
We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency |
Parmy Olson |
|
| 2265 |
|
Cybersecurity and Cognitive Science [1 ed.] |
Ahmed A. Moustafa (editor) |
1 |
| 2266 |
|
Information Security Handbook (Internet of Everything (IoE)) [1 ed.] |
Noor Zaman Jhanjhi (editor), Khalid Hussain (editor), Mamoona Humayun (editor), Azween Bin Abdullah (editor), João Manuel R.S. Tavares (editor) |
1 |
| 2267 |
|
Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems |
Bharat Bhushan, Sudhir Kumar Sharma, Muzafer Saracević, Azedine Boulmakoul |
|
| 2268 |
|
Data Protection: Ensuring Data Availability [2 ed.] |
Preston de Guise |
2 |
| 2269 |
|
Cybersecurity Fundamentals: A Real-World Perspective |
Kutub Thakur, Al-Sakib Khan Pathan |
|
| 2270 |
|
Biomedical Defense Principles to Counter DNA Deep Hacking |
Rocky Termanini |
|
| 2271 |
|
Hybrid Encryption Algorithms Over Wireless Communication Channels |
Mai H. Shahieen |
|
| 2272 |
|
Testing and Securing Web Applications [1 ed.] |
Ravi Das (Author), Greg Johnson (Author) |
1 |
| 2273 |
|
Cybersecurity for Everyone [1 ed.] |
David B. Skillicorn |
1 |
| 2274 |
|
Cross-Site Scripting Attacks-Classification, Attack, and Countermeasures [1 ed.] |
B. B. Gupta (Author), Pooja Chaudhary (Author) |
1 |
| 2275 |
|
The Security Hippie |
Barak Engel |
|
| 2276 |
|
Inside the Dark Web |
Erdal Ozkaya, Rafiqul Islam |
|
| 2277 |
|
Big Data Analytics and Computing for Digital Forensic Investigations [1 ed.] |
Suneeta Satpathy (Editor), Sachi Nandan Mohanty (Editor) |
1 |
| 2278 |
|
Fancy Bear Goes Phishing - The Dark History of the Information Age, in Five Extraordinary Hacks [1 ed.] |
Scott J. Shapiro |
1 |
| 2279 |
|
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology [1 ed.] |
Wayne Patterson, Cynthia E. Winston-Proctor |
1 |
| 2280 |
|
A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals |
Gupta, B B,Tewari, Aakanksha |
|
| 2281 |
|
Security Analytics for the Internet of Everything |
Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah, Al-Sakib Khan Pathan |
|
| 2282 |
|
Power and Authority in Internet Governance [1 ed.] |
Blayne Haggart, Natasha Tusikov, Jan Aart Scholte (eds.) |
1 |
| 2283 |
|
Information Security Handbook |
Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, João Manuel R.S. Tavares |
|
| 2284 |
|
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation |
Myriam Dunn Cavelty, Andreas Wenger |
|
| 2285 |
|
The Investigator's Guide to Computer Crime |
Carl J., Ph.D. Franklin |
|
| 2286 |
|
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back [1 ed.] |
Bruce Schneier |
1 |
| 2287 |
|
Cyber Security Practical Engineering Approach |
Henrique Santos |
|
| 2288 |
|
Global Information Warfare: The New Digital Battlefield, Second Edition [2 ed.] |
Andrew Jones (Author), Gerald L. Kovacich (Author) |
2 |
| 2289 |
|
Computer and Information Security Handbook [4 ed.] |
John R. Vacca (editor) |
4 |
| 2290 |
|
The Future of Violence: Robots and Germs, Hackers and Drones—Confronting A New Age of Threat |
Benjamin Wittes, Gabriella Blum |
|
| 2291 |
|
Professional Pen Testing for Web Applications |
Andres Andreu |
|
| 2292 |
|
Inside Network Security Assessment: Guarding Your IT Infrastructure [With CDROM] |
ProQuest., Gregg, Michael C., Kim, David |
|
| 2293 |
|
Maximum Security [3rd ed.] |
Greg Shipley |
3 |
| 2294 |
|
Maximum Wireless Security |
Cyrus Peikari, Seth Fogie |
|
| 2295 |
|
Inside Network Perimeter Security |
Stephen Northcutt, Karen Frederick, Scott Winters, Lenny Zeltser, Ronald W. Ritc |
|
| 2296 |
|
Microsoft ISA Server 2006 Unleashed |
Michael Noel |
|
| 2297 |
|
Hackers Beware. Defending Your Network from the Wiley Hacker [1 ed.] |
Eric Cole |
1 |
| 2298 |
|
Professional Windows Desktop and Server Hardening |
Roger A. Grimes |
|
| 2299 |
|
SECUR Exam Cram 2 |
Raman Sud, Ken Edelman |
|
| 2300 |
|
How Personal & Internet Security Work [1 ed.] |
Preston Gralla |
1 |
| 2301 |
|
Absolute Beginner's Guide to Personal Firewalls [1 ed.] |
Jerry Lee Ford Jr |
1 |
| 2302 |
|
The complete idiot's guide to protecting yourself online |
Gralla |
|
| 2303 |
|
MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network |
Bill Ferguson, Don Poulton, Diane Barrett |
|
| 2304 |
|
Practical Firewalls [1st ed.] |
Terry William Ogletree |
1 |
| 2305 |
|
Privacy Defended: Protecting Yourself Online |
Gary Bahadur, William Chan, Chris Weber |
|
| 2306 |
|
TANGLED WEB: Tales of Digital Crime from the Shadows of Cyberspace [1st ed.] |
Richard Power |
1 |
| 2307 |
|
Server+ Certification Exam Cram 2 (Exam SKO-002) |
Marcraft International |
|
| 2308 |
|
CISA Exam Cram [2 ed.] |
Michael Gregg |
2 |
| 2309 |
|
A Practical Guide to Digital Forensics Investigations 2nd Edition [2 ed.] |
Darren R. Hayes |
2 |
| 2310 |
|
Certified ethical hacker exam prep (Exam Prep 2): Includes index |
Gregg, Michael (Michael C.) |
|
| 2311 |
|
Three Tweets to Midnight: Effects of the Global Information Ecosystem on the Risk of Nuclear Conflict |
Harold A. Trinkunas, Herbert S. Lin, Benjamin Loehrke |
|
| 2312 |
|
Attribute-Based Encryption and Access Control (Data-Enabled Engineering) [1 ed.] |
Dijiang Huang, Qiuxiang Dong, Yan Zhu |
1 |
| 2313 |
|
Building A Global Information Assurance Program [1 ed.] |
Raymond J. Curts, Douglas E. Campbell |
1 |
| 2314 |
|
LAN Turtle: A Guide to the Remote Access Toolkit [v22.03 ed.] |
Darren Kitchen |
2203 |
| 2315 |
|
Packet Squirrel Mark II: A Guide to Ethernet Man-in-the-Middle [v23.07 ed.] |
Darren Kitchen |
2307 |
| 2316 |
|
Internet of Things Security-Principles, Applications, Attacks, and Countermeasures [1 ed.] |
Brij B. Gupta (Author), Megha Quamara (Author) |
1 |
| 2317 |
|
USB Rubber Ducky: A Guide to Keystroke Injection Attacks [v22.08-2, 2 ed.] |
Darren Kitchen |
2 |
| 2318 |
|
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics) [1 ed.] |
Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla |
1 |
| 2319 |
|
Power and Authority in Internet Governance: Return of the State? |
Blayne Haggart, Natasha Tusikov, Jan Aart Scholte |
|
| 2320 |
|
Bash Bunny: A Guide to the HotPlug Attack Platform [v22.03 ed.] |
Darren Kitchen |
2203 |
| 2321 |
|
Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience [1 ed.] |
Charlette Donalds, Corlane Barclay, Kweku-Muata Osei-Bryson |
1 |
| 2322 |
|
A Beginner’s Guide to Internet of Things Security-Attacks, Applications, Authentication, and Fundamentals [1 ed.] |
B. B. Gupta (Author), Aakanksha Tewari (Author) |
1 |
| 2323 |
|
Cybersecurity Fundamentals: A Real-World Perspective [1st Edition] |
Kutub Thakur, Al-Sakib Khan Pathan |
1 |
| 2324 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [5 ed.] |
Branden R. Williams, James K. Adamson |
5 |
| 2325 |
|
Cybersecurity and High-Performance Computing Environments |
Kuan-Ching Li Nitin Sukhija Elizabeth Bautista Jean-Luc Gaudiot |
|
| 2326 |
|
The Hack Is Back: Techniques to Beat Hackers at Their Own Games [1 ed.] |
Jesse Varsalone, Christopher Haller |
1 |
| 2327 |
|
Secure Data Science: Integrating Cyber Security and Data Science |
B. Thuraisngham, M. Kantarcioglu, L. Khan |
|
| 2328 |
|
Teaching Cybersecurity. A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom |
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker |
|
| 2329 |
|
Unleashing the Art of Digital Forensics [1 ed.] |
Keshav Kaushik, Rohit Tanwar, Susheela Dahiya, Komal Kumar Bhatia, Yulei Wu |
1 |
| 2330 |
|
Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program |
Alan Tang |
|
| 2331 |
|
Understanding Cyber-Warfare Politics, Policy And Strategy [2 ed.] |
Christopher Whyte, Brian Mazanec |
2 |
| 2332 |
|
A Comprehensive Guide to Information Security Management and Audit |
Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala |
|
| 2333 |
|
5G Cyber Risks and Mitigation |
Sabhyata Soni |
|
| 2334 |
|
Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis |
Shivi Garg, Niyati Baliyan |
|
| 2335 |
|
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting |
Rafay Baloch |
|
| 2336 |
|
Advanced Techniques and Applications of Cybersecurity and Forensics |
Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary |
|
| 2337 |
|
Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity Techniques |
Alex Khang, Shashi Kant Gupta, Sita Rani, Dimitrios A. Karras |
|
| 2338 |
|
Dark World; A Book on the Deep Dark Web |
Atif Ali &, Muhammad Qasim |
|
| 2339 |
|
Dark World: A Book on the Deep Dark Web |
Atif Ali and Muhammad Qasim |
|
| 2340 |
|
Intelligent Approaches to Cyber Security |
Narendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli |
|
| 2341 |
|
Cyber Resilience in Critical Infrastructure |
Sinan Kufeoglu, Abdullah Talip Akgun |
|
| 2342 |
|
Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges |
Shalli Rani |
|
| 2343 |
|
Quantum Computing: A Journey into the Next Frontier of Information and Communication Security |
Hammoudeh, Mohammad, Alessa, Abdullah T., Sherbeeni, Amro M., Firth, Clinton M., Alessa, Abdullah S. |
|
| 2344 |
|
The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security |
Lee Parrish |
|
| 2345 |
|
Cloud Security Concepts, Applications and Practices [1 ed.] |
Edited ByJamuna S Murthy, Siddesh G, M,, Srinivasa K, G, |
1 |
| 2346 |
|
Ransomware Evolution |
Mohiuddin Ahmed |
|
| 2347 |
|
Networks Attack Detection on 5G Networks using Data Mining Techniques |
Sagar Dhanraj Pande, Aditya Khamparia |
|
| 2348 |
|
A Reference Manual for Data Privacy Laws and Cyber Frameworks (Cyber Shorts) [1 ed.] |
Ravindra Das |
1 |
| 2349 |
|
Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics |
Arif, Muhammad, Arfan Jaffar, M., Geman, Oana, Abbasi, Waseem |
|
| 2350 |
|
Protégete del doxing. Cómo prevenir y solucionar la exposición de tus datos personales en Internet |
Juanjo Ramos |
|
| 2351 |
|
Offensive and Defensive Cyber Security Strategies;Fundamentals, Theory and Practices |
Mariya Ouaissa, Mariyam Ouaissa |
|
| 2352 |
|
Optimal Spending on Cybersecurity Measures [First Edition] |
Tara Kissoon |
|
| 2353 |
|
ManusCrypt; Designed for Mankind—Anthropocentric Information Security |
Prashant A Upadhyaya |
|
| 2354 |
|
Cybercrime And Cybersecurity [1 ed.] |
Paul A. Watters |
1 |
| 2355 |
|
Protecting Location Privacy in the Era of Big Data: A Technical Perspective |
Yan, Yan, Mahmood, Adnan, Sheng, Quan Z. |
|
| 2356 |
|
Philosophy Of Cybersecurity [1 ed.] |
Lukasz Olejnik, Artur Kurasiński |
1 |
| 2357 |
|
Navigating the Cyber Maze: Insights and Humor on the Digital Frontier |
Muhlert, Matthias |
|
| 2358 |
|
Cyber Investigations of Smart Devices |
Bhardwaj, Akashdeep |
|
| 2359 |
|
Digital Resilience, Cybersecurity and Supply Chains |
Tarnveer Singh |
|
| 2360 |
|
¡Que no te espíen! Las herramientas y aplicaciones imprescindibles para proteger tu privacidad en la red |
Juanjo Ramos |
|
| 2361 |
|
How to Leak Documents and Surf the Web Anonymously: Becoming Anonymous |
Nathan Bowie |
|
| 2362 |
|
Mastering Cybersecurity: A Practical Guide for Professionals [1] |
Akashdeep Bhardwaj |
1 |
| 2363 |
|
Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-pacific |
Francis C. Domingo |
|
| 2364 |
|
Cyber Security and Operations Management for Industry 4.0 |
Ahmed A Elngar, N Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam |
|
| 2365 |
|
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom |
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker |
|
| 2366 |
|
Internet of Things Security and Privacy: Practical and Management Perspectives [1 ed.] |
Ali Ismail Awad (editor), Atif Ahmad (editor), Kim-Kwang Raymond Choo (editor), Saqib Hakak (editor) |
1 |
| 2367 |
|
Advances in Cyber Security and Intelligent Analytics |
Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas |
|
| 2368 |
|
Ransomware and Cybercrime [1 ed.] |
Andrew Jenkinson |
1 |
| 2369 |
|
Strategic Cyber Security Management [1 ed.] |
Peter Trim, Yang-Im Lee |
1 |
| 2370 |
|
Online Harms and Cybertrauma: Legal and Harmful Issues with Children and Young People |
Catherine Knibbs |
|
| 2371 |
|
Cybersecurity for eHealth: A Simplified Guide to Practical Cybersecurity for Non-technical Stakeholders & Practitioners of Healthcare [1 ed.] |
Emmanuel C. Ogu |
1 |
| 2372 |
|
Why CISOs Fail (Internal Audit and IT Audit) [2 ed.] |
Barak Engel |
2 |
| 2373 |
|
Zero Trust Journey Across the Digital Estate [1 ed.] |
Abbas Kudrati, Binil A. Pillai |
1 |
| 2374 |
|
Phishing for Nazis: Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web |
Lev Topor |
|
| 2375 |
|
Practical Security for Agile and DevOps [1 ed.] |
Mark S. Merkow |
1 |
| 2376 |
|
A Comprehensive Guide to Information Security Management and Audit [1 ed.] |
Rajkumar Banoth, Gugulothu Narsimha, Aruna Kranthi Godishala |
1 |
| 2377 |
|
Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence [1 ed.] |
Rong Su |
1 |
| 2378 |
|
Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems) [1 ed.] |
Bharat Bhushan (editor), Sudhir Kumar Sharma (editor), Parma Nand (editor), Achyut Shankar (editor) |
1 |
| 2379 |
|
6G Communication Network: Architecture, Security and Applications [1 ed.] |
Ajay Kumar Vyas (editor), Narendra Khatri (editor), Sunil Kumar Jha (editor) |
1 |
| 2380 |
|
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You [1 ed.] |
Peter Fagan |
1 |
| 2381 |
|
Internet of Things Vulnerabilities and Recovery Strategies [1 ed.] |
Fahim Masoodi (editor), Alwi Bamhdi (editor), Majid Ahmad Charoo (editor), Zubair Masoodi (editor), Arif Lattoo (editor), Gousiya Hussain (editor) |
1 |
| 2382 |
|
PKI Implementation and Infrastructures |
Julian Ashbourn |
|
| 2383 |
|
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities |
Murugan, Thangavel, Singh, W. Jai |
|
| 2384 |
|
Radical Reporting: Writing Better Audit, Risk, Compliance, and Information Security Reports (Security, Audit and Leadership Series) [2 ed.] |
Sara I. James |
2 |
| 2385 |
|
Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives [1 ed.] |
Randhir Kumar (editor), Prabhat Kumar (editor), Sobin C C (editor) |
1 |
| 2386 |
|
Optimal Spending on Cybersecurity Measures: Digital Privacy and Data Protection [1 ed.] |
Tara Kissoon |
1 |
| 2387 |
|
Great Power Cyber Competition (Routledge Advances in Defence Studies) [1 ed.] |
David V. Gioe (editor), Margaret W. Smith (editor) |
1 |
| 2388 |
|
Big Data and Blockchain Technology for Secure IoT Applications |
Selvarajan, Shitharth, Mohammad, Gouse Baig, Bharath Reddy, Sadda, Balachandran Praveen Kumar |
|
| 2389 |
|
Digital (Dis)Information Operations: Fooling the Five Eyes [1 ed.] |
Melissa-Ellen Dowling |
1 |
| 2390 |
|
Surviving the Wild Wild Web [First Edition] |
Marton Gergely, Ian Grey, Heba Saleous |
|
| 2391 |
|
Introduction to Cybersecurity in the Internet of Things [1 ed.] |
Keke Gai, Jing Yu, Liehuang Zhu |
1 |
| 2392 |
|
Cyber CISO Marksmanship: Hitting the Mark in Cybersecurity Leadership |
Dunham, Ken, Johnson, James, McComb, Joseph, Elrod, Jason |
|
| 2393 |
|
The Zero Trust Framework and Privileged Access Management (PAM) [1 ed.] |
Ravindra Das |
1 |
| 2394 |
|
The CISO Playbook (Security, Audit and Leadership Series) [1 ed.] |
Andres Andreu |
1 |
| 2395 |
|
Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape [1 ed.] |
Akashdeep Bhardwaj |
1 |
| 2396 |
|
Cyber Operations and International Law |
François Delerue |
|
| 2397 |
|
Cloud Native Data Security with OAuth (for Raymond Rhine) |
Gary Archer, Judith Kahrer, and Michał Trojanowski |
|
| 2398 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws |
Stuttard, Dafydd,Pinto, Marcus |
|
| 2399 |
|
The web application hacker’s handbook: finding and exploiting security flaws [2 ed.] |
Dafydd Stuttard, Marcus Pinto |
2 |
| 2400 |
|
RTFM: Red Team Field Manual v2 [2 ed.] |
Ben Clark, Nick Downer |
2 |
| 2401 |
|
Cyber Operations And International Law [1st Edition] |
François Delerue |
1 |
| 2402 |
|
Data Security Blueprints |
Federico Castanedo |
|
| 2403 |
|
Hacking Connected Cars; Tactics, Techniques, and Procedures [1 ed.] |
Alissa Knight |
1 |
| 2404 |
|
Web Application Defender's Cookbook: Battling Hackers and Protecting Users [1 ed.] |
Ryan C. Barnett, Jeremiah Grossman |
1 |
| 2405 |
|
Using Social Media for Global Security [1 ed.] |
Ravi Gupta, Hugh Brooks |
1 |
| 2406 |
|
Government Cloud Procurement: Contracts, data protection, and the quest for compliance |
Kevin McGillivray |
|
| 2407 |
|
Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today’s Crypto |
Roger A. Grimes |
|
| 2408 |
|
Web Commerce Security: Design and Development [1 ed.] |
Hadi Nahari and Ronald L. Krutz |
1 |
| 2409 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems [3 ed.] |
Ross Anderson |
3 |
| 2410 |
|
A Guide to Building Dependable Distributed Systems |
Anderson, Ross |
|
| 2411 |
|
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership |
Jennifer Jin and Marcus J. Carey |
|
| 2412 |
|
Security 2020: Reduce Security Risks This Decade |
Doug Howard, Kevin Prince(auth.) |
|
| 2413 |
|
CompTIA CySA+ Practice Tests: Exam CS0-002 [2 ed.] |
Mike Chapple, David Seidl |
2 |
| 2414 |
|
CompTIA CySA+ Study Guide Exam CS0-002 [2 ed.] |
Mike Chapple, David Seidl |
2 |
| 2415 |
|
Darknet: Geopolitics and Uses [1 ed.] |
Laurent Gayard |
1 |
| 2416 |
|
The Metrics Manifesto: Confronting Security with Data [1 ed.] |
Richard Seiersen |
1 |
| 2417 |
|
Hands on Hacking [1 ed.] |
Matthew Hickey, Jennifer Arcuri |
1 |
| 2418 |
|
Cloud Security For Dummies (For Dummies (Computer/Tech)) [1 ed.] |
Ted Coombs |
1 |
| 2419 |
|
Penetration Testing For Dummies (For Dummies (Computer/Tech)) [1 ed.] |
Robert Shimonski |
1 |
| 2420 |
|
CISSP For Dummies |
Lawrence C. Miller, Peter H. Gregory |
|
| 2421 |
|
Cyber Security and Network Security [1 ed.] |
Sabyasachi Pramanik (editor), Debabrata Samanta (editor), M. Vinay (editor), Abhijit Guha (editor) |
1 |
| 2422 |
|
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework [1 ed.] |
Cynthia Brumfield |
1 |
| 2423 |
|
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation [3 ed.] |
Ted G. Lewis |
3 |
| 2424 |
|
Cryptography apocalypse: preparing for the day when quantum computing breaks today's crypto |
Grimes, Roger A |
|
| 2425 |
|
The Metrics Manifesto : Confronting Security with Data |
Seiersen, Richard,Hubbard, Douglas W., |
|
| 2426 |
|
Cybersecurity For Dummies |
Steinberg, Joseph |
|
| 2427 |
|
Hands On Hacking [1st Edition] |
Matthew Hickey, Jennifer Arcuri |
1 |
| 2428 |
|
CompTIA Pentest+ Certification For Dummies (For Dummies (Computer/Tech)) [2 ed.] |
Glen E. Clarke |
2 |
| 2429 |
|
Practical Industrial Cybersecurity : ICS, Industry 4.0, and IIoT |
Charles J. Brooks, Philip A. Craig Jr. |
|
| 2430 |
|
You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions [1 ed.] |
Ira Winkler, Dr. Tracy Celaya Brown |
1 |
| 2431 |
|
CompTIA PenTest+ Certification For Dummies [1 ed.] |
Glen E. Clarke |
1 |
| 2432 |
|
Security Awareness For Dummies |
Ira Wrinkler |
|
| 2433 |
|
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide [3 ed.] |
Mike Chapple, David Seidl |
3 |
| 2434 |
|
Wireless Communication for Cybersecurity |
S. Sountharrajan, R. Maheswar Geetanjali, Rathee, M. Akila |
|
| 2435 |
|
CompTIA CySA+ study guide : exam CS0-002 [Second ed.] |
David Seidl, Mike Chapple |
|
| 2436 |
|
The Pentester Blueprint : Starting a Career as an Ethical Hacker |
Phillip L. Wylie, Kim Crawley |
|
| 2437 |
|
Alice and Bob Learn Application Security |
Tanya Janca |
|
| 2438 |
|
The CISO Evolution: Business Knowledge for Cybersecurity Executives |
Matthew K. Sharp, Kyriakos P. Lambros |
|
| 2439 |
|
Cyber Operations: A Case Study Approach [1 ed.] |
Jerry M. Couretas |
1 |
| 2440 |
|
Cyber Security and Digital Forensics: Challenges and Future Trends |
Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le |
|
| 2441 |
|
CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004 [4 ed.] |
Nadean H. Tanner, Jeff T. Parker |
4 |
| 2442 |
|
Cybersecurity Law [3 ed.] |
Jeff Kosseff |
3 |
| 2443 |
|
Digital Forensics and Internet of Things – Impact and Challenges [1 ed.] |
Anita Gehlot (editor), Rajesh Singh (editor), Jaskaran Singh (editor), Neeta Raj Sharma (editor) |
1 |
| 2444 |
|
The CISO Evolution: Business Knowledge for Cybersecurity Executives |
Matthew K. Sharp, Kyriakos Lambros |
|
| 2445 |
|
Cybersecurity and Local Government [1 ed.] |
Donald F. Norris, Laura K. Mateczun, Richard F. Forno |
1 |
| 2446 |
|
Securing Delay-Tolerant Networks with BPSec |
Edward J. Birrane III, Sarah Heiner, Ken McKeever |
|
| 2447 |
|
Cyber-War: The Anatomy of the global Security Threat |
Julian Richards (auth.) |
|
| 2448 |
|
Cybersecurity for dummies. [2 ed.] |
Joseph Steinberg |
2 |
| 2449 |
|
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide [3 ed.] |
Mike Wills |
3 |
| 2450 |
|
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT |
Charles J. Brooks, Philip A. Craig Jr. |
|
| 2451 |
|
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise [1 ed.] |
Jennifer Minella |
1 |
| 2452 |
|
Executive's Guide to Cyber Risk: Securing the Future Today [1 ed.] |
Siegfried Moyo |
1 |
| 2453 |
|
Cybersecurity For Dummies (For Dummies (Computer/Tech)) [2 ed.] |
Joseph Steinberg |
2 |
| 2454 |
|
The Official (ISC)2 SSCP CBK Reference [6 ed.] |
MIKE WILLS |
6 |
| 2455 |
|
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise |
Jennifer (JJ) Minella |
|
| 2456 |
|
CISA Certified Information Systems Auditor Study Guide : Covers 2024–2029 Exam Objectives |
Peter H. Gregory, Mike Chapple |
|
| 2457 |
|
Wireless Communication in Cyber Security [1 ed.] |
S. Sountharrajan (editor), R. Maheswar (editor), Geetanjali Rathee (editor), M. Akila (editor) |
1 |
| 2458 |
|
How to Measure Anything in Cybersecurity Risk [2 ed.] |
Douglas W. Hubbard, Richard Seiersen |
2 |
| 2459 |
|
How to Measure Anything in Cybersecurity Risk [Second Edition] |
Douglas W. Hubbard, RICHARD SEIERSEN |
|
| 2460 |
|
If It's Smart, It's Vulnerable |
Mikko Hypponen |
|
| 2461 |
|
The Active Defender: Immersion in the Offensive Security Mindset |
Catherine J. Ullman |
|
| 2462 |
|
The Official (ISC)2 CCSP CBK Reference [4 ed.] |
Aaron Kraus |
4 |
| 2463 |
|
Cybercrime and Cybersecurity in the Global South |
Nir Kshetri (auth.) |
|
| 2464 |
|
Internet Governance and the Global South: Demand for a New Framework |
Abu Bhuiyan (auth.) |
|
| 2465 |
|
Dodging Spam Filters: Strategies for Maximizing Email Deliverability |
Williams , Roger |
|
| 2466 |
|
Evolution of the Cyber Domain: The Implications for National and Global Security |
Eneken Tikk-Ringas |
|
| 2467 |
|
The Personal Digital Resilience Handbook: An essential guide to safe, secure and robust use of everyday technology |
Wild, David |
|
| 2468 |
|
Cryptography and Network Security: Principles and Practice, Global Edition [8 ed.] |
William Stallings |
8 |
| 2469 |
|
Securing Amazon Web Services |
Jay Schulman |
|
| 2470 |
|
Cryptography and Network Security: Principles and Practice, Global Edition [7 ed.] |
William Stallings |
7 |
| 2471 |
|
Cryptography: The Key to Digital Security, How It Works, and Why It Matters |
Keith Martin |
|
| 2472 |
|
Cybersecurity All-in-One For Dummies [1 ed.] |
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs |
1 |
| 2473 |
|
Cybersecurity All-In-One for Dummies |
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs |
|
| 2474 |
|
The DevSecOps Playbook: Deliver Continuous Security at Speed |
Sean D. Mack |
|
| 2475 |
|
CompTIA CySA+ Study Guide: Exam CS0-003 [3 ed.] |
Mike Chapple, David Seidl |
3 |
| 2476 |
|
Open-Source Security Operations Center (SOC) : A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC |
Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar |
|
| 2477 |
|
Reinforcement Learning for Cyber Operations |
Abdul Rahman |
|
| 2478 |
|
Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem [1 ed.] |
Chris Hughes, Nikki Robinson |
1 |
| 2479 |
|
Cyber Guardians: Empowering Board Members for Effective Cybersecurity [1 ed.] |
Bart R. McDonough |
1 |
| 2480 |
|
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet [1 ed.] |
David Senecal |
1 |
| 2481 |
|
Digital Twins and Cybersecurity: Safeguarding the Future of Connected Systems |
Palanichamy Naveen |
|
| 2482 |
|
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice |
Jason Edwards |
|
| 2483 |
|
Alice & Bob Learn Secure Coding |
Janca Janca |
|
| 2484 |
|
Securing Microsoft Azure OpenAI |
Karl Ots |
|
| 2485 |
|
The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry [1 ed.] |
Alon Arvatz |
1 |
| 2486 |
|
Pen Testing from Contract to Report [1 ed.] |
Alfred Basta, Nadine Basta, Waqar Anwar |
1 |
| 2487 |
|
CompTIA CySA+ Study Guide, 3rd Edition [3 ed.] |
Mike Chapple, David Seidl |
3 |
| 2488 |
|
CompTIA CySA+ Practice Tests : Exam CS0-003 [Third Edition] |
Mike Chapple, David Seidl |
|
| 2489 |
|
The DevSecOps Playbook: Deliver Continuous Security at Speed [1 ed.] |
Sean D. Mack |
1 |
| 2490 |
|
Cybersecurity First Principles: A Reboot of Strategy and Tactics |
Rick Howard |
|
| 2491 |
|
Cybersecurity First Principles: A Reboot of Strategy and Tactics [1 ed.] |
Rick Howard |
1 |
| 2492 |
|
Stepping Through Cybersecurity Risk Management : A Systems Thinking Approach |
Jennifer L. Bayuk |
|
| 2493 |
|
The DevSecOps Playbook : Deliver Continuous Security at Speed |
Sean D. Mack |
|
| 2494 |
|
Cyber Guardians : Empowering Board Members for Effective Cybersecurity |
Bart R. McDonough |
|
| 2495 |
|
Secrets Management For Dummies, Akeyless Special Edition |
Brett McLaughlin |
|
| 2496 |
|
Zero Trust and Third-Party Risk: Reduce the Blast Radius [Team-IRA] [1 ed.] |
Gregory C. Rasner |
1 |
| 2497 |
|
Zero Trust and Third-Party Risk : Reduce the Blast Radius |
Gregory C. Rasner |
|
| 2498 |
|
CCST Cisco Certified Support Technician Study Guide : Cybersecurity Exam [First Edition] |
Lammle, Todd,Buhagiar, Jon,Robb, Donald,Montgomery, Todd,, Jon Buhagiar, Donald Robb, Todd Montgomery |
|
| 2499 |
|
CompTIA Security+ Study Guide with over 500 Practice Test Questions : Exam SY0-701 [Ninth Edition] |
Mike Chapple, David Seidl |
|
| 2500 |
|
CCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online, 2nd Edition [Second Edition, with Online Practice] |
Arthur J. Deane |
|
| 2501 |
|
The Code of Honor: Embracing Ethics in Cybersecurity [1 ed.] |
Paul J. Maurer, Ed Skoudis |
1 |
| 2502 |
|
The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 [1 ed.] |
Gagandeep Kaur (editor), Tanupriya Choudhury (editor), S. Balamurugan (editor) |
1 |
| 2503 |
|
Alice and Bob Learn Secure Coding [1 ed.] |
Tanya Janca |
1 |
| 2504 |
|
Emerging Threats and Countermeasures in Cybersecurity |
Gulshan Shrivastava |
|
| 2505 |
|
The Cybersecurity Guide to Governance, Risk, and Compliance [1 ed.] |
Jason Edwards, Griffin Weaver |
1 |
| 2506 |
|
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) [10 ed.] |
Mike Chapple, James Michael Stewart, Darril Gibson |
10 |
| 2507 |
|
ISC2® CISSP® Certified Information Systems Security Professional Official Study Guide [10 ed.] |
Mike Chapple, James Michael Stewart, Darril Gibson |
10 |
| 2508 |
|
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests [4 ed.] |
Mike Chapple, David Seidl |
4 |
| 2509 |
|
Securing the Digital Frontier : Threats and Advanced Techniques in Security and Forensics |
Kavita Sharma, Vishnu Sharma, Parma Nand, Anil Kumar Sagar, Gulshan Shrivastava |
|
| 2510 |
|
The Cybersecurity Control Playbook : From Fundamentals to Advanced Strategies |
Edwards, Jason, |
|
| 2511 |
|
Your Face Belongs to Us: The Secretive Startup Dismantling Your Privacy |
Kashmir Hill |
|
| 2512 |
|
CompTIA PenTest+ Study Guide, 3rd Edition [3 ed.] |
Mike Chapple, Rob Shimonski, and David Seidl |
3 |
| 2513 |
|
IAPP CIPP/US Certified Information Privacy Professional Study Guide - 2nd Edition [2 ed.] |
Mike Chapple, Joe Shelley |
2 |
| 2514 |
|
CompTIA PenTest+ Study Guide : Exam PT0-003 [Third Edition] |
Chapple, Mike,Shimonski, Robert,Seidl, David,, Robert Shimonski, David Seidl |
|
| 2515 |
|
Securing the AWS Cloud : A Guide for Learning to Secure AWS Infrastructure [First Edition] |
Brandon Carroll |
|
| 2516 |
|
A Beginner’s Guide to Web Application Penetration Testing |
Ali Abdollahi |
|
| 2517 |
|
Cybersecurity For Dummies [3 ed.] |
Joseph Steinberg |
3 |
| 2518 |
|
Taming the Hacking Storm : A Framework for Defeating Hackers and Malware [First Edition] |
Roger A. Grimes |
|
| 2519 |
|
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls [2 ed.] |
Christopher J Hodson |
2 |