Number Cover TextBook for Cyber Security Author Edition
0 cover Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night McHale, David
1 cover CC Certified in Cybersecurity Study Guide (Sybex Study Guide) Mike Chapple
2 cover CCNP and CCIE Security Core SCOR 350-701 Exam cram [1 ed.] Eugenio Iavarone 1
3 cover The Rules for Online Dating: Capturing the Heart of Mr. Right in Cyberspace Ellen Fein, Sherrie Schneider
4 cover Advanced Certificate in Information Security (ACISE) Part-I IGNOU
5 cover Advanced Certificate in Information Security (ACISE) Part-II IGNOU
6 cover Transactions on data hiding and multimedia security VI Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.)
7 cover Cyber Dragon: Inside China's Information Warfare and Cyber Operations Dean Cheng
8 cover Cyberbullies, Cyberactivists, Cyberpredators: Film, TV, and Internet Stereotypes Lauren Rosewarne
9 cover The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals Paul Bocij
10 cover Understanding Online Piracy: The Truth about Illegal File Sharing Nathan Fisk
11 cover Securing India in the Cyber Era Sameer Patil
12 cover Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science) Pantelimon Stănică (editor), Sihem Mesnager (editor), Sumit Kumar Debnath (editor)
13 cover Cyberspace and Instability Robert Chesney (editor), James Shires (editor), Max Smeets (editor)
14 cover Cybersexualities: A Reader on Feminist Theory, Cyborgs and Cyberspace Jenny Wolmark
15 cover Handbook on Securing Cyber-Physical Critical Infrastructure Sajal K. Das, Krishna Kant and Nan Zhang (Auth.)
16 cover Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) Jeffrey Pawlick, Quanyan Zhu
17 cover Cyber Security Threats and Challenges Facing Human Life [1 ed.] Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) 1
18 cover Cybersecurity: A Practical Engineering Approach Henrique M. D. Santos
19 cover CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) Brent Chapman
20 cover Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) Maymi, Fernando,Chapman, Brent,Parker, Jeff T
21 cover CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide Fernando Maymi, Brent Chapman
22 cover Career Opportunities in Computers and Cyberspace, 2nd Edition [2 ed.] Harry Henderson 2
23 cover Cyber Infrastructure for the Smart Electric Grid Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser
24 cover Cyber-physical Systems: Theory, Methodology, and Applications (IEEE Press) [1 ed.] Pedro H. J. Nardelli 1
25 cover Cybersecurity in Intelligent Networking Systems (IEEE Press) [1 ed.] Shengjie Xu, Yi Qian, Rose Qingyang Hu 1
26 cover Game Theory and Machine Learning for Cyber Security [1 ed.] Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) 1
27 cover Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program [1 ed.] John Jackson 1
28 cover The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity Dan Shoemaker, Anne Kohnke, Ken Sigler
29 cover Blockchain for Distributed Systems Security Sachin S. Shetty (editor), Charles A. Kamhoua (editor), Laurent L. Njilla (editor)
30 cover Information security : an integrated collection of essays [[2. Dr.] ed.] Marshall D. Abrams (editor),Sushil Jajodia (editor), Harold J. Podell (editor) 2
31 cover Cyber Warfare Rosenzweig, Paul
32 cover Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor)
33 cover Using Science in Cybersecurity Leigh Metcalf, Jonathan Spring
34 cover Security in Ad-hoc and Sensor Networks (Computer and Network Security) Raheem Beyah, Janise Mcnair, Cherita Corbett
35 cover Comptia Security+ Guide to Network Security Fundamentals [7 ed.] Mark Ciampa 7
36 cover CompTIA Network+ Guide to Networks 9th edition [9 ed.] Jill West 9
37 cover Wireless Safety [1 ed.] EC-Council 1
38 cover Secure Network Infrastructures EC-Council 1
39 cover Computer Insecurity: Risking the System [1 ed.] Steven Furnell BSc (Hons) Phd, CEng FBCS (auth.) 1
40 cover Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks Josephine Wolff
41 cover Cybersecurity [1 ed.] Duane C. Wilson 1
42 cover Foundations of Computer Security [1 ed.] Professor David Salomon (auth.) 1
43 cover Guide to Computer Network Security [3 ed.] Joseph Migga Kizza (auth.) 3
44 cover Hacking Europe: From Computer Cultures to Demoscenes [1 ed.] Gerard Alberts, Ruth Oldenziel (eds.) 1
45 cover Internet and Intranet Security [2 ed.] Rolf Oppliger, Rolf Oppliger 2
46 cover Medical Device Cybersecurity for Engineers and Manufacturers Axel Wirth, Christopher Gates, Jason Smith
47 cover Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) Michael Roytman and Ed Bellis
48 cover New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) Howard Shrobe, David L. Shrier, Alex Pentland
49 cover Security Technologies for the World Wide Web [2 ed.] Rolf Oppliger 2
50 cover Understanding Voice over IP Security (Artech House Telecommunications Library) [1 ed.] Alan B. Johnston, David M. Piscitello 1
51 cover Google Hacking for Penetration Testers, Volume 1 Long J.
52 cover How to Hack Computers: how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning
53 cover Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali OccupyTheWeb
54 cover Carry On: Sound Advice from Schneier on Security Schneier, Bruce
55 cover CEH Certified Ethical Hacker Study Guide Graves, Kimberly
56 cover CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions Ric Messier
57 cover CEHv8: Certified Ethical Hacker Version 8 Study Guide Oriyano, Sean-Philip
58 cover Cehv9: Certified Ethical Hacker Version 9 [3rd ed] Oriyano, Sean-Philip 3
59 cover Communications and Information Infrastructure Security John G. Voeller 1
60 cover Cyber Investigations : A Research Based Textbook for Advanced Studies Årnes, André,
61 cover Cyber Security Policy Guidebook Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt
62 cover Cybercrime Investigators Handbook Graeme Edwards
63 cover Cybersecurity Law [2nd ed.] Jeff Kosseff 2
64 cover Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States Matthew Webster
65 cover Hacking For Dummies [5th ed.] Kevin Beaver 5
66 cover Hacking for Dummies, 7th Edition KEVIN BEAVER 7
67 cover Hacking IPod and ITunes Scott Knaster
68 cover Hacking sales : the ultimate playbook and tool guide to building a high-velocity sales machine Altschuler, Max
69 cover iOS Hacker's Handbook Charlie Miller &, Dion Blazakis &, Dino DaiZovi &, Stefan Esser &, Vincenzo Iozzo &, Ralf-Philip Weinmann
70 cover Secrets and Lies: Digital Security in a Networked World [15th Anniversary Edition] Schneier, Bruce 15
71 cover Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition [3 ed.] David R. Miller, Michael Gregg 3
72 cover Security and privacy in the digital era Volume 1 Guerrier, Claudine
73 cover Security, privacy and digital forensics in the cloud Chen, Lei, Le-Khac, Nhien-An, Takabi, Hassan
74 cover Seismic data interpretation using digital image processing Al-Dossary, Saleh A.,Al-Shuhail, Abdullatif A.,Mousa, Wail Abdul-Hakim
75 cover Story Circle: Digital Storytelling Around the World [1 ed.] John Hartley, Kelly McWilliam 1
76 cover XDA's Android Hacker's Toolkit: the Complete Guide to Rooting, ROMs and Theming [2nd ed] Tyler, Jason, Verduzco, Will 2
77 cover Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany [1 ed.] Karl Scheibelhofer (auth.), Ralf Steinmetz, Jana Dittman, Martin Steinebach (eds.) 1
78 cover Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom [1 ed.] Jan Iwanik, Marek Klonowski, Miroslaw Kutyłowski (auth.), David Chadwick, Bart Preneel (eds.) 1
79 cover Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany Reinhard Posch (eds.)
80 cover Communications and Multimedia Security: Volume 3 Sokratis Katsikas (eds.)
81 cover Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity Reza Montasari
82 cover Cyber Situational Awareness: Issues and Research [1 ed.] Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) 1
83 cover Practical Internet Security [1 ed.] John R. Vacca (auth.) 1
84 cover Wireless Network Security [1 ed.] Jonathan Lutz, M. Anwarul Hasan (auth.), Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du (eds.) 1
85 cover Cyberliteracy: Navigating the Internet with Awareness Laura J. Gurak
86 cover Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us [1 ed.] Eugene Spafford, Leigh Metcalf, Josiah Dykstra 1
87 cover Security in Computing, 6th Edition (Rough Cuts) [6 ed.] Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp 6
88 cover Security in Computing [6 ed.] Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp 6
89 cover Computer Security [Art and Science] [2nd ed.] Matthew Bishop 2
90 cover Effective Cybersecurity: A Guide to Using Best Practices and Standards [1 ed.] William Stallings 1
91 cover Cyber-Physical Systems: A Model-Based Approach Raj Rajkumar, Dionisio de Niz, Mark Klein
92 cover Hacker's Delight (2nd Edition) [2 ed.] Henry S. Warren 2
93 cover Software Security Engineering: A Guide for Project Managers: A Guide for Project Managers (SEI Series in Software Engineering) Julia H. Allen
94 cover Chained Exploits: Advanced Hacking Attacks from Start to Finish Whitaker, Andrew J,Evans, Keatron,Voth, Jack
95 cover Virtual Honeypots: From Botnet Tracking to Intrusion Detection [1 ed.] Niels Provos, Thorsten Holz 1
96 cover Protect Your Windows Network From Perimeter to Data Jesper M. Johansson, Steve Riley
97 cover The art of computer virus research and defense Szor, Peter
98 cover Introduction to computer security Matt Bishop
99 cover Firewalls and Internet Security: Repelling the Wily Hacker [2 ed.] William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin 2
100 cover Web Hacking: Attacks and Defense McClure, Stuart, Shah, Shreeraj, Shah, Saumil 3
101 cover Computer Security: Art and Science Matt Bishop
102 cover Inside Internet Security: What Hackers Don't Want You To Know [1 ed.] Jeff Crume 1
103 cover Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity Grid, Alan
104 cover Network Security, Firewalls, and VPNs J. Michael Stewart &amp, Denise Kinsey
105 cover Information Assurance Handbook: Effective Computer Security and Risk Management Strategies Corey Schou and Steven Hernandez
106 cover Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and Cody, Isaac D
107 cover Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to Hack Websites, Smartphones, Wireless Networks) + Linux Basic for Hackers (Command line and all the essentials) + Hacking with Kali Linux Julian James McKinnon
108 cover The Pocket Guide to Cyber Security James H &amp, Usha D
109 cover Guide to Computer Network Security Kizza, Joseph Migga
110 cover Guide to Computer Network Security, Fourth Edition Joseph Migga Kizza 4
111 cover Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking With Kali Linux Kou, Jim
112 cover HACKING GMAIL: How to Hack Gmail HAT, BLACK
113 cover Hacking: How to Make Your Own Keylogger in C++ Programming Language Norman, Alan T.
114 cover Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow Karnel, Erickson
115 cover Hacking: Fundamentals for Absolute Beginners Bell, Alexander
116 cover Infinity Ethical Hacking: Learn basic to advance hacks Sapp, Arthur S
117 cover Cyber Security Awareness for CEOs and Management [1 ed.] Dalziel, Henry, Willson, David 1
118 cover Cyber Security Awareness for Corporate Directors and Board Members Willson, David, Dalziel, Henry
119 cover Cyber warfare : techniques, tactics and tools for security practitioners Jason Andress, Steve Winterfeld, Russ Rogers
120 cover Cyber warfare: techniques, tactics and tools for security practitioners Andress, Jason,Winterfeld, Steve,Northcutt, Stephen,Rogers, Russ
121 cover Cybersecurity and Applied Mathematics Casey, William,Metcalf, Leigh,William Casey
122 cover Mobile Malware Attacks and Defense Ken Dunham
123 cover The Basics of Cyber Safety Computer and Mobile Device Safety Made Easy Cross, Michael,Sammons, John
124 cover Understanding the Internet: A Clear Guide to Internet Technologies (Computer Weekly Professional Series) [1st ed.] Keith Sutherland 1
125 cover Virtual Pedophilia: Sex Offender Profiling and U.S. Security Culture Gillian Harkins