Number |
Cover |
TextBook for Cyber Security |
Author |
Edition |
0 |
|
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts |
Maurizio Martellini, Andrea Malizia (eds.) |
1 |
1 |
|
Fundamentals of Network Forensics: A Research Perspective [1 ed.] |
R.C. Joshi, Emmanuel S. Pilli (auth.) |
1 |
2 |
|
Fundamentals of network security [1st ed.] |
John E. Canavan |
1 |
3 |
|
Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night |
McHale, David |
|
4 |
|
Access Control and Security Monitoring of Multimedia Information Processing and Transmission (Computing and Networks) |
Zhihan Lyu (editor), Jaime Lloret (editor), Houbing Herbert Song (editor) |
|
5 |
|
Advanced Computer Science Applications. Recent Trends in AI, Machine Learning, and Network Security |
Karan Singh, Latha Banda, Manisha Manjul |
|
6 |
|
Advanced Product Management Series: Cybersecurity [1 ed.] |
Alex Cowan |
1 |
7 |
|
Advanced Techniques of Artificial Intelligence in IT Security Systems (Studies in Big Data, 146) [1st ed.] |
Marcin Korytkowski |
1 |
8 |
|
AI for Peace |
Branka Panic, Paige Arthur |
|
9 |
|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I [1 ed.] |
Christina Pöpper, Lejla Batina |
1 |
10 |
|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II [1 ed.] |
Christina Pöpper, Lejla Batina |
1 |
11 |
|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III [1 ed.] |
Christina Pöpper, Lejla Batina |
1 |
12 |
|
Artificial Intelligence for Cyber Defense and Smart Policing |
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand |
|
13 |
|
Azure Security [1 ed.] |
Bojan Magusic |
1 |
14 |
|
Beyond Digital Distraction: Educating Today's Cyber Student (Digital Education and Learning) [1st ed.] |
Kurt C. Schuett |
1 |
15 |
|
Big Data, Emerging Technologies and Intelligence: National Security Disrupted |
Miah Hammond-Errey |
|
16 |
|
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals |
Ramakrishnan, Ganesh, Haqanee, Mansoor |
|
17 |
|
Blockchain-Based Data Security in Heterogeneous Communications Networks |
Dongxiao Liu, Xuemin (Sherman) Shen |
|
18 |
|
Blockchain-based Internet of Things [1 ed.] |
Iraq Ahmad Reshi (editor), Sahil Sholla (editor) |
1 |
19 |
|
Cold War 2.0 : Artificial Intelligence in the New Battle between China, Russia, and America |
George S. Takach |
|
20 |
|
Building Cybersecurity Applications with Blockchain and Smart Contracts |
Nour El Madhoun, Ioanna Dionysiou, Emmanuel Bertin |
|
21 |
|
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003) [3 ed.] |
Mya Heath |
3 |
22 |
|
CompTIA Security+ Practice Tests: Exam SY0-701 [3 ed.] |
David Seidl |
3 |
23 |
|
CompTIA Security+ SY0-701 Certification Guide, Third Edition (for DUC PHAM) [3 ed.] |
Ian Neil |
3 |
24 |
|
CompTIA Security+ SY0-701 Practice Tests & PBQs: Exam SY0-701 |
Nikolaos Gorgotsias |
|
25 |
|
CompTIA® Security+ SY0-701 Cert Guide (for True Epub) |
Lewis Heuermann |
|
26 |
|
Computer networks. Data communications, Internet and security. |
Ata Elahi, Alex Cushman |
|
27 |
|
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings Part 3 |
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor) |
|
28 |
|
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science) |
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor) |
|
29 |
|
Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science) |
Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor) |
|
30 |
|
Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised ... I (Lecture Notes in Computer Science, 14398) |
Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens-Boulahia (editor), Costas Lambrinoudakis (editor), Joaquin Garcia-Alfaro (editor), Guillermo Navarro-Arribas (editor), Pantaleone Nespoli (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor) |
|
31 |
|
CC Certified in Cybersecurity Study Guide (Sybex Study Guide) |
Mike Chapple |
|
32 |
|
Children, Young People and Online Harms: Conceptualisations, Experiences and Responses |
Emily Setty (editor), Faith Gordon (editor), Emma Nottingham (editor) |
|
33 |
|
Security with Intelligent Computing and Big-data Services |
Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao |
|
34 |
|
Security with Intelligent Computing and Big-data Services: Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) |
Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain |
|
35 |
|
Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings |
Kai-Di Chang, Chi-Yuan Chen (auth.), Ruay-Shiung Chang, Tai-hoon Kim, Sheng-Lung Peng (eds.) |
|
36 |
|
Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy) [1 ed.] |
Ari Takanen, Jared DeMott, Charlie Miller |
1 |
37 |
|
Advanced Certificate in Information Security (ACISE) Part-I |
IGNOU |
|
38 |
|
Advanced Certificate in Information Security (ACISE) Part-II |
IGNOU |
|
39 |
|
Data Security in Internet of Things Based RFID and WSN Systems Applications |
Korhan Cengiz, Rohit Sharma, Rajendra Prasad Mahapatra |
|
40 |
|
Post Graduate Diploma in Information Security (PGDIS) Part 1 |
IGNOU |
|
41 |
|
Post Graduate Diploma in Information Security (PGDIS) Part 2 |
IGNOU |
|
42 |
|
Post Graduate Diploma in Information Security (PGDIS) Part 3 |
IGNOU |
|
43 |
|
Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences: PCCDS 2022 |
Rajendra Prasad Yadav, Satyasai Jagannath Nanda, Prashant Singh Rana, Meng-Hiot Lim |
|
44 |
|
Transactions on data hiding and multimedia security VI |
Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.) |
|
45 |
|
Cyber Dragon: Inside China's Information Warfare and Cyber Operations |
Dean Cheng |
|
46 |
|
Cyber Security: Threats and Responses for Government and Business |
Caravelli, Jack,Jones, Nigel,Kozup, John C |
|
47 |
|
Cybercrime: Criminal Threats from Cyberspace |
Susan W. Brenner |
|
48 |
|
Digital Influence Warfare in the Age of Social Media |
James J. F. Forest |
|
49 |
|
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers |
Philip Alexander |
|
50 |
|
Myths and Realities of Cyber Warfare: Conflict in the Digital Realm |
Nicholas Michael Sambaluk |
|
51 |
|
The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals |
Paul Bocij |
|
52 |
|
The Technology Trap: Where Human Error and Malevolence Meet Powerful Technologies |
Lloyd J. Dumas |
|
53 |
|
The War on Privacy |
Jacqueline Klosek |
|
54 |
|
Weaponizing Cyberspace: Inside Russia's Hostile Activities |
Nicholas Sambaluk |
|
55 |
|
Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings |
Rudrapatna K. Shyamasundar,Virendra Singh,Jaideep Vaidya (eds.) |
|
56 |
|
Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings |
Sabu M. Thampi,Gregorio Martínez Pérez,Carlos Becker Westphall,Jiankun Hu,Chun I. Fan,Félix Gómez Mármol (eds.) |
|
57 |
|
Smart Secure Systems – IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings |
Guru Prasadh Venkataramani,Karthik Sankaranarayanan,Saswati Mukherjee,Kannan Arputharaj,Swamynathan Sankara Narayanan (eds.) |
|
58 |
|
A Deep Learning based Approach to Proactive and Reactive Enterprise Security |
Sumit Chakraborty |
|
59 |
|
Adaptively Secure Broadcast: Threat Analytics & Security Intelligence |
Sumit Chakraborty |
|
60 |
|
Advanced Computing and Systems for Security: Volume 1 |
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.) |
|
61 |
|
Advanced Computing and Systems for Security: Volume 2 |
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.) |
|
62 |
|
Advanced Informatics for Computing Research: Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II |
Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh |
|
63 |
|
Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022 Rajkot, India, November 24–26, 2022 Revised Selected Papers, Part I |
Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat |
|
64 |
|
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I |
Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.) |
|
65 |
|
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II |
Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.) |
|
66 |
|
Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 |
Hiran V. Nath (auth.), David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai (eds.) |
|
67 |
|
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection |
S. V. Raghavan, E. Dawson (auth.), S.V. Raghavan, E Dawson (eds.) |
|
68 |
|
Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings |
V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li |
|
69 |
|
Applied Computation and Security Systems: Volume One |
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.) |
|
70 |
|
Applied Computation and Security Systems: Volume Two |
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.) |
|
71 |
|
Bioterrorism : Cryptographic Challenges |
Sumit Chakraborty |
|
72 |
|
Bioterrorism, Threat Analytics and Secure Multi-party Computation |
Sumit Chakraborty |
|
73 |
|
Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe |
John, Nirmal |
|
74 |
|
Combating Cyber Threat |
P. K. Singh |
|
75 |
|
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers |
Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar |
|
76 |
|
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings |
Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan |
|
77 |
|
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers |
Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan |
|
78 |
|
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 |
Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) |
|
79 |
|
Computer Networks and Information Technologies: Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, Bangalore, India, March 10-11, 2011. Proceedings |
Snehlata Mishra, Vandana Neha Tigga, S. N. Singh (auth.), Vinu V Das, Janahanlal Stephen, Yogesh Chaba (eds.) |
|
80 |
|
Computer Networks and Intelligent Computing: 5th International Conference on Information Processing, ICIP 2011, Bangalore, India, August 5-7, 2011. Proceedings |
Saritha S., Santhosh Kumar G. (auth.), K. R. Venugopal, L. M. Patnaik (eds.) |
|
81 |
|
Cryptography and network security 3rd edition |
Atul Kahate |
3 |
82 |
|
Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Series on Asian Criminology and Criminal Justice Research) |
Balsing Rajput |
|
83 |
|
Cyber Security in India: Education, Research and Training (IITK Directions, 4) |
Sandeep Kumar Shukla (editor), Manindra Agrawal (editor) |
|
84 |
|
Cyber Technological Paradigms and Threat Landscape in India |
Ramnath Reghunadhan |
|
85 |
|
Cyber Warfare, Security and Space Research: First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers |
Sandeep Joshi (editor), Amit Kumar Bairwa (editor), Amita Nandal (editor), Milena Radenkovic (editor), Cem Avsar (editor) |
|
86 |
|
Cyber Warfare: Its Implications on National Security |
Sanjeev Relia |
|
87 |
|
Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science, 1436) |
Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor) |
|
88 |
|
Distributed Computing and Networking: 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings |
Sanjit A. Seshia (auth.), Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha (eds.) |
|
89 |
|
India Today [April 09, 2018] | Your Privacy is Dead ! |
India Today |
|
90 |
|
Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings |
Atul Prakash, Rudrapatna Shyamasundar (eds.) |
|
91 |
|
Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings |
Sushil Jajodia, Chandan Mazumdar (eds.) |
|
92 |
|
Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings |
Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) |
|
93 |
|
Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings |
Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar |
|
94 |
|
Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings |
Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar |
|
95 |
|
Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings |
Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur |
|
96 |
|
Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings (Security and Cryptology) |
Somanath Tripathy (editor), Rudrapatna K. Shyamasundar (editor), Rajiv Ranjan (editor) |
|
97 |
|
Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings (Lecture Notes in Computer Science) |
Venkata Ramana Badarla (editor), Surya Nepal (editor), Rudrapatna K. Shyamasundar (editor) |
|
98 |
|
Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings (Lecture Notes in Computer Science) |
Vallipuram Muthukkumarasamy (editor), Sithu D. Sudarsan (editor), Rudrapatna K. Shyamasundar (editor) |
|
99 |
|
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings |
Sriram K. Rajamani (auth.), Somesh Jha, Anish Mathuria (eds.) |
|
100 |
|
Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings |
Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia (auth.), Sushil Jajodia, Chandan Mazumdar (eds.) |
|
101 |
|
Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings |
Christopher Kruegel (auth.), Venkat Venkatakrishnan, Diganta Goswami (eds.) |
|
102 |
|
Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings |
Chris Clifton, Balamurugan Anandan (auth.), Aditya Bagchi, Indrakshi Ray (eds.) |
|
103 |
|
Information theory coding and cryptography |
Mandal, Surajit, Manna, Nilotpal, Saha, Arjit |
|
104 |
|
Information Theory Coding And Cryptography |
Ranjan Bose |
|
105 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part I |
Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao |
|
106 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part II |
Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao |
|
107 |
|
Network security essentials: applications and standards |
William Stallings |
|
108 |
|
Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India |
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal |
|
109 |
|
Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India |
Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas |
|
110 |
|
Progress in Cryptology – INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings |
Roger Dingledine (auth.), Daniel J. Bernstein, Sanjit Chatterjee (eds.) |
|
111 |
|
Progress in Cryptology – INDOCRYPT 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings |
Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang (auth.), Goutam Paul, Serge Vaudenay (eds.) |
|
112 |
|
Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings |
Orr Dunkelman, Somitra Kumar Sanadhya (eds.) |
|
113 |
|
Progress in Cryptology – INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings |
Debrup Chakraborty, Tetsu Iwata |
|
114 |
|
Progress in Cryptology – INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings |
Feng Hao, Sushmita Ruj, Sourav Sen Gupta |
|
115 |
|
Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings |
Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran |
|
116 |
|
Progress in Cryptology – INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings (Security and Cryptology) |
Avishek Adhikari (editor), Ralf Küsters (editor), Bart Preneel (editor) |
|
117 |
|
Progress in Cryptology – INDOCRYPT 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11–14, 2022, Proceedings (Lecture Notes in Computer Science) |
Takanori Isobe (editor), Santanu Sarkar (editor) |
|
118 |
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers |
Rahul Johari, Neelima Gupta, Sandhya Aneja (auth.), Karan Singh, Amit K. Awasthi (eds.) |
|
119 |
|
Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings |
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (auth.), Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (eds.) |
|
120 |
|
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings |
Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko, Lei Shu (eds.) |
|
121 |
|
Securing India in the Cyber Era |
Sameer Patil |
|
122 |
|
Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science) |
Pantelimon Stănică (editor), Sihem Mesnager (editor), Sumit Kumar Debnath (editor) |
|
123 |
|
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers |
Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki |
|
124 |
|
Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings |
Sanjay Burman (auth.), Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (eds.) |
|
125 |
|
Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings |
Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) |
|
126 |
|
Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers |
Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero |
|
127 |
|
Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers ... in Computer and Information Science, 1208) |
Sabu M. Thampi (editor), Gregorio Martinez Perez (editor), Ryan Ko (editor), Danda B. Rawat (editor) |
|
128 |
|
Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (Communications in Computer and Information Science) |
Sabu M. Thampi (editor), Guojun Wang (editor), Danda B. Rawat (editor), Ryan Ko (editor), Chun-I Fan (editor) |
|
129 |
|
Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings |
Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.) |
|
130 |
|
Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings |
Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (eds.) |
|
131 |
|
Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings |
Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.) |
|
132 |
|
Security in Computing: 5th Edition |
Charles P. Pfleeger And Shari Lawrence Pfleeger |
5 |
133 |
|
Security Intelligence for Broadcast : Threat Analytics |
Sumit Chakraborty |
|
134 |
|
Security Intelligence for Broadcast: Algorithmic Complexity |
Sumit Chakraborty |
|
135 |
|
Security, Privacy, and Applied Cryptography Engineering. 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings |
Lejla Batina, Stjepan Picek, Mainack Mondal |
|
136 |
|
Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings (Security and Cryptology) |
Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor) |
|
137 |
|
Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings (Security and Cryptology) |
Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor) |
|
138 |
|
Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science) |
Francesco Regazzoni (editor), Bodhisatwa Mazumdar (editor), Sri Parameswaran (editor) |
|
139 |
|
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings |
Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont (eds.) |
|
140 |
|
Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings |
Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth (eds.) |
|
141 |
|
SIVA: Security Intelligence Verification Algorithm for Location based Services |
Sumit Chakraborty |
|
142 |
|
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I |
Amos Beimel, Stefan Dziembowski |
|
143 |
|
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II |
Amos Beimel, Stefan Dziembowski |
|
144 |
|
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings |
Tanja Ažderska (auth.), Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (eds.) |
|
145 |
|
Cyber Laundering: International Policies And Practices |
Nathalie Rebe |
|
146 |
|
Regulating Cyber Technologies: Privacy Vs Security |
Nathalie Rébé |
|
147 |
|
Innovations in Digital Forensics [Team-IRA] |
Suryadipta Majumdar (editor), Paria Shirani (editor), Lingyu Wang (editor) |
|
148 |
|
Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory |
Selda Calkavur, Alexis Bonnecaze, Romar Dela Cruz, Patrick Sole |
|
149 |
|
Internet of Everything: Key Technologies, Practical Applications and Security of IoT |
Hang Song |
|
150 |
|
Cryptography In The Information Society |
Ryabko, Boris, Fionov, Andrey, |
|
151 |
|
Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 |
Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor) |
|
152 |
|
Dynamically Enabled Cyber Defense |
Lin Yang, Quan Yu |
|
153 |
|
Data Analysis for Network Cyber-Security |
Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard |
|
154 |
|
Using Science in Cybersecurity |
Leigh Metcalf, Jonathan Spring |
|
155 |
|
Computer Viruses: A High-tech Disease [2nd ed.] |
Rolf Burger |
2 |
156 |
|
Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings [1st ed.] |
Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
1 |
157 |
|
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings |
Shlomi Dolev, Sachin Lodha |
|
158 |
|
The Kish Cypher:The Story of KLJN for Unconditional Security |
Laszlo B. Kish |
|
159 |
|
Cyberspace and Instability |
Robert Chesney (editor), James Shires (editor), Max Smeets (editor) |
|
160 |
|
The Political Mapping of Cyberspace |
Jeremy Crampton |
|
161 |
|
Integer Algorithms in Cryptology and Information Assurance |
Boris S Verkhovsky |
|
162 |
|
CyberForensics: Understanding Information Security Investigations |
Jennifer Bayuk (editor) |
|
163 |
|
Firewall Design and Analysis (Computer and Network Security) |
Alex X. Liu |
|
164 |
|
Mind Games |
Richard Thieme |
|
165 |
|
Biometrics: identity verification in a networked world [1st ed.] |
Samir Nanavati, Michael Thieme, Raj Nanavati |
1 |
166 |
|
Algorithms, architectures and information systems security |
Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy |
|
167 |
|
Security in Iot Social Networks [1° ed.] |
Fadi Al-turjman (editor), B. D. Deebak (editor) |
1 |
168 |
|
RIoT Control. Understanding and Managing Risks and the Internet of Things [1 ed.] |
Tyson Macaulay |
1 |
169 |
|
Computer and Information Security Handbook [3 ed.] |
John R. Vacca (Editor) |
3 |
170 |
|
Malware Diffusion Models for Modern Complex Networks: Theory and Applications |
Vasileios Karyotis, M.H.R. Khouzani |
|
171 |
|
Emerging trends in ICT security [1 ed.] |
Babak Akhgar, Hamid R. Arabnia (editors) |
1 |
172 |
|
Computer and Information Security Handbook [2 ed.] |
John R. Vacca (editor) |
2 |
173 |
|
Handbook on Securing Cyber-Physical Critical Infrastructure |
Sajal K. Das, Krishna Kant and Nan Zhang (Auth.) |
|
174 |
|
System Assurance: Beyond Detecting Vulnerabilities [1 ed.] |
Nikolai Mansourov, Djenana Campara |
1 |
175 |
|
Computer and information security handbook [1 ed.] |
John R. Vacca (editor) |
1 |
176 |
|
Disappearing Cryptography: Information Hiding: Steganography and Watermarking [3 ed.] |
Peter Wayner |
3 |
177 |
|
Digital watermarking and steganography [2nd ed] |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker |
2 |
178 |
|
Network security : know it all |
James B D Joshi, et al |
|
179 |
|
Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking) |
Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi |
|
180 |
|
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking) |
Jan L. Harrington |
|
181 |
|
Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking) [1 ed.] |
John Strassner |
1 |
182 |
|
Digital Watermarking [1st ed.] |
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller |
1 |
183 |
|
Virus: Detection and Elimination [Pap/Dskt ed.] |
Rune Skardhamar |
|
184 |
|
Security in Ad-hoc and Sensor Networks (Computer and Network Security) |
Raheem Beyah, Janise Mcnair, Cherita Corbett |
|
185 |
|
Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) |
Jeffrey Pawlick, Quanyan Zhu |
|
186 |
|
Cyber Security Applications for Industry 4.0 |
R Sujatha, G Prakash, Noor Zaman Jhanjhi |
|
187 |
|
AI-Based Metaheuristics for Information Security and Digital Media (Advances in Metaheuristics) [1 ed.] |
Apoorva S Shastri (editor), Mangal Singh (editor), Anand J. Kulkarni (editor), Patrick Siarry (editor) |
1 |
188 |
|
Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems) |
Bishwajeet Pandey, Shabeer Ahmad |
|
189 |
|
Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] |
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia |
1 |
190 |
|
Cyber Security Threats and Challenges Facing Human Life [1 ed.] |
Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) |
1 |
191 |
|
Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] |
Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) |
1 |
192 |
|
Introduction to Machine Learning with Applications in Information Security (Chapman & Hall/CRC Machine Learning & Pattern Recognition) [2 ed.] |
Mark Stamp |
2 |
193 |
|
Cybersecurity: A Practical Engineering Approach |
Henrique M. D. Santos |
|
194 |
|
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management |
Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh |
|
195 |
|
Phishing Detection Using Content-Based Image Classification |
Shekhar Khandelwal, Rik Das |
|
196 |
|
Security Analytics: A Data Centric Approach to Information Security [1 ed.] |
Mehak Khurana, Shilpa Mahajan |
1 |
197 |
|
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) |
Brent Chapman |
|
198 |
|
Zero Trust Security: An Enterprise Guide |
Jason Garbis, Jerry W. Chapman |
|
199 |
|
Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (Chapman & Hall/CRC Internet of Things) [1 ed.] |
Chinmay Chakraborty (editor), Sree Ranjani Rajendran (editor), Muhammad Habibur Rehman (editor) |
1 |
200 |
|
Cyberspace, Data Analytics, and Policing [1 ed.] |
David Skillicorn |
1 |
201 |
|
Cloud Security: Attacks, Techniques, Tools, and Challenges [1 ed.] |
Preeti Mishra, Emmanuel S Pilli, R C Joshi |
1 |
202 |
|
Protecting Your Privacy in a Data-Driven World |
Claire McKay Bowen |
|
203 |
|
Internet of Things and Secure Smart Environments: Successes and Pitfalls |
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan |
|
204 |
|
Security Risk Models for Cyber Insurance |
Caroline Baylon, Jose Vila, David Rios Insua |
|
205 |
|
Artificial intelligence safety and security [First edition.] |
Yampolskiy, Roman V. |
|
206 |
|
Emerging security algorithms and techniques [1st ed.] |
Ahmad, Khaleel, Doja, M. N., Singh, Manu, Udzir, Nur Izura |
1 |
207 |
|
Security for software engineers |
Helfrich, James N |
|
208 |
|
Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) |
Maymi, Fernando,Chapman, Brent,Parker, Jeff T |
|
209 |
|
The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart Cities |
Termanini, Rocky |
|
210 |
|
Data privacy: principles and practice |
Nataraj Venkataramanan, Ashwin Shriram |
|
211 |
|
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide |
Fernando Maymi, Brent Chapman |
|
212 |
|
Introduction to Machine Learning with Applications in Information Security [1 ed.] |
Mark Stamp |
1 |
213 |
|
Network performance and security : testing and analyzing using open source and low-cost tools [1 ed.] |
Chapman, Chris |
1 |
214 |
|
Managing Trust in Cyberspace |
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey |
|
215 |
|
Implementing Cisco IOS network security (IINS): (CCNA Security Exam 640-553) (Authorized self-study guide) |
Chapman, David W., Whitaker, Andrew, Paquet, Catherine |
|
216 |
|
Introduction to Network Security [Online-ausg ed.] |
Jacobson, Douglas |
|
217 |
|
Building Internet Firewalls: Internet and Web security [2nd ed] |
Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman |
2 |
218 |
|
Building Internet Firewalls |
D. Brent Chapman |
|
219 |
|
Privacy for Sale: How Big Brother and Others Are Selling Your Private Secrets for Profit [1 ed.] |
Michael E. Chesbro |
1 |
220 |
|
Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition [2 ed.] |
James E Fitzpatrick, Joseph G Morelli |
2 |
221 |
|
Fighting Terror in Cyberspace |
Mark Last, Abraham Kandel |
|
222 |
|
Cyber Infrastructure for the Smart Electric Grid |
Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser |
|
223 |
|
Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security [1 ed.] |
Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot |
1 |
224 |
|
Security and Privacy Vision in 6G: A Comprehensive Guide [Team-IRA] [1 ed.] |
Pawani Porambage, Madhusanka Liyanage |
1 |
225 |
|
Cybersecurity in Intelligent Networking Systems (IEEE Press) [1 ed.] |
Shengjie Xu, Yi Qian, Rose Qingyang Hu |
1 |
226 |
|
Deep Learning Approaches for Security Threats in IoT Environments |
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash |
|
227 |
|
Game Theory and Machine Learning for Cyber Security [1 ed.] |
Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) |
1 |
228 |
|
Intelligent Security Systems. How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security |
Leon Reznik |
|
229 |
|
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program [1 ed.] |
John Jackson |
1 |
230 |
|
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity |
Dan Shoemaker, Anne Kohnke, Ken Sigler |
|
231 |
|
Assured cloud computing [First edition] |
Campbell, Roy Harold, Kamhoua, Charles A., Kwiat, Kevin A |
|
232 |
|
DNS security management |
Michael Dooley: Timothy Rooney |
|
233 |
|
Artificial Immune System: Applications in Computer Security [1 ed.] |
Ying Tan |
1 |
234 |
|
Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures |
Houmansadr, Amir, Mazurczyk, Wojciech, Szczypiorski, Krzysztof, Wendzel, Steffen, Zander, Sebastian |
|
235 |
|
Secure Messaging on the Internet |
Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Avrum Goldberg, Matthew Smith |
|
236 |
|
Vehicular Ad Hoc Network Security and Privacy [1 ed.] |
Xiaodong Lin, Rongxing Lu |
1 |
237 |
|
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [2nd ed] |
Jacobs, Stuart |
2 |
238 |
|
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [1 ed.] |
Stuart Jacobs |
1 |
239 |
|
Network Security: Current Status and Future Directions |
|
|
240 |
|
Electronic watermarking the first 50 years |
Cox Miller |
|
241 |
|
Practical Cryptography for Internetworks [1 ed.] |
William Stallings |
1 |
242 |
|
Information security : an integrated collection of essays [[2. Dr.] ed.] |
Marshall D. Abrams (editor),Sushil Jajodia (editor), Harold J. Podell (editor) |
2 |
243 |
|
Stealing the Network: How to Own an Identity |
Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Timothy Mullen |
|
244 |
|
Information security management handbook [7, 6 ed.] |
Richard O'Hanley, James S. Tiller (editor) |
6 |
245 |
|
Weaponizing Cyberspace |
Nicholas Michael Sambaluk |
|
246 |
|
Cyber Warfare |
Rosenzweig, Paul |
|
247 |
|
Mobile and Wireless Networks Security |
Maryline Laurent-Maknavickius, Hakima Chaouchi |
|
248 |
|
Ethical hacking and countermeasures. Book 4 of 4, Secure network operating systems and infrastructures [2nd edition] |
EC-Council Press,, International Council of E-Commerce Consultants |
2 |
249 |
|
Hands-On Ethical Hacking and Network Defense (MindTap Course List) [4 ed.] |
Rob Wilson |
4 |
250 |
|
Principles of Information Security [7 ed.] |
Michael E. Whitman, Herbert J. Mattord |
7 |
251 |
|
Comptia Security+ Guide to Network Security Fundamentals [7 ed.] |
Mark Ciampa |
7 |
252 |
|
Principles of Incident Response & Disaster Recovery (MindTap Course List) [3 ed.] |
Michael E. Whitman, Herbert J. Mattord |
3 |
253 |
|
Guide to Firewalls and VPNs [3rd ed.] |
Michael E. Whitman, Herbert J. Mattord, Andrew Green |
3 |
254 |
|
Management of Information Security [6 ed.] |
Michael E. Whitman, Herbert J. Mattord |
6 |
255 |
|
Principles of Information Security [6 ed.] |
Whitman, Michael, Mattord, Herbert |
6 |
256 |
|
Hands-On Ethical Hacking and Network Defense [Third ed.] |
Michael T. Simpson, Nicholas Antill |
|
257 |
|
Guide to computer forensics and investigations : processing digital evidence [Fifth edition] |
Nelson, Bill, Phillips, Amelia, Steuart, Christopher |
|
258 |
|
Principles of Information Security [5 ed.] |
Michael E. Whitman, Herbert J. Mattord |
5 |
259 |
|
Management of Information Security [5 ed.] |
Michael E. Whitman, Herbert J. Mattord |
5 |
260 |
|
CompTIA Security+ Guide to Network Security Fundamentals [5th ed.] |
Mark Ciampa |
5 |
261 |
|
Guide to Network Defense and Countermeasures [3 ed.] |
Randy Weaver, Dawn Weaver, Dean Farwood |
3 |
262 |
|
Hands-On Ethical Hacking and Network Defense [1 ed.] |
Backman, Kent, Corley, James E., Simpson, Michael T |
1 |
263 |
|
Management of Information Security [4 ed.] |
Michael E. Whitman, Herbert J. Mattord |
4 |
264 |
|
Guide to Network Security [1st ed.] |
Michael E. Whitman et al. |
1 |
265 |
|
EIS: Inspection Testing and Commissioning [Applied Mathematics] |
Malcolm Doughton, John Hooper |
|
266 |
|
Readings and cases in information security : law and ethics |
Michael E Whitman, Herbert J Mattord |
|
267 |
|
Guide to Computer Forensics and Investigations |
Bill Nelson, Amelia Phillips, Christopher Steuart |
3 |
268 |
|
CISSP Guide to Security Essentials |
P. Gregory |
|
269 |
|
Access controlled: the shaping of power, rights, and rule in cyberspace [1 ed.] |
Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti |
1 |
270 |
|
Computer forensics: investigating wireless networks and devices |
EC-Council Press |
|
271 |
|
Computer Evidence: Collection And Preservation [2nd Edition] |
Christopher LT Brown |
2 |
272 |
|
Security awareness: applying practical security in your world [3. ed] |
Ciampa, Mark D |
3 |
273 |
|
Computer Forensics: Investigating Network Intrusions and Cybercrime [1 ed.] |
EC-Council |
1 |
274 |
|
Security+ Guide to Network Security Fundamentals |
Mark D Ciampa |
3 |
275 |
|
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms [1 ed.] |
EC-Council |
1 |
276 |
|
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems [1 ed.] |
EC-Council |
1 |
277 |
|
Secure Network Infrastructures |
EC-Council |
1 |
278 |
|
Web 2.0 Security: defending Ajax, Ria, and Soa [1 ed.] |
Shreeraj (Shreeraj Shah) Shah |
1 |
279 |
|
A Practical Guide to Managing Information Security (Artech House Technology Management Library) [illustrated edition] |
Steve Purser |
|
280 |
|
Access Contested: Security, Identity, and Resistance in Asian Cyberspace |
Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain |
|
281 |
|
An Information Security Handbook [1 ed.] |
John M. D. Hunter BA (Hons), FBCS, CEng (auth.) |
1 |
282 |
|
Borders in Cyberspace: Information Policy and the Global Information Infrastructure [1 ed.] |
Brian Kahin, Charles R. Nesson |
1 |
283 |
|
Computer and intrusion forensics |
George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rodney McKemmish |
|
284 |
|
Contemporary Cryptography |
Rolf Oppliger |
|
285 |
|
Coordinating the Internet |
edited by Brian Kahin and James H. Keller. |
|
286 |
|
Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks |
Josephine Wolff |
|
287 |
|
Cybersecurity [1 ed.] |
Duane C. Wilson |
1 |
288 |
|
International Relations in the Cyber Age: The Co-Evolution Dilemma |
Nazli Choucri, David D. Clark |
|
289 |
|
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings [v. 22, 1 ed.] |
Steve Barker (auth.), Vijay Atluri (eds.) |
1 |
290 |
|
Data Security Breaches and Privacy in Europe [1 ed.] |
Rebecca Wong (auth.) |
1 |
291 |
|
EC2ND 2005: Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK [1 ed.] |
Liwen He, Nikolai Bode (auth.), Andrew Blyth BSc, MSc, PhD (eds.) |
1 |
292 |
|
EC2ND 2006: Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK [1 ed.] |
Andrew Blyth BSc, MSc, PhD, Iain Sutherland BSc, MSc, PhD (auth.) |
1 |
293 |
|
End-to-End Encrypted Messaging |
Rolf Oppliger |
|
294 |
|
Governing Global Electronic Networks: International Perspectives on Policy and Power |
William J. Drake, Ernest J. Wilson III |
|
295 |
|
Hacker States [First Edition] |
Follis, Luca, Fish, Adam,, Adam Fish |
|
296 |
|
High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace |
Peter Ludlow, Loyd Blankenship |
|
297 |
|
Implementing the ISO / IEC 27001 ISMS Standard [2 ed.] |
Edward Humphreys |
2 |
298 |
|
Information Assurance: Security in the Information Environment [2 ed.] |
Andrew Blyth BSc, MSc, PhD, Gerald L. Kovacich MA, MSc, D.Crim (auth.) |
2 |
299 |
|
Introduction to Identity-Based Encryption (Information Security and Privacy Series) [1 ed.] |
Luther Martin |
1 |
300 |
|
Lifecycle IoT Security for Engineers |
Kaustubh Dhondge |
|
301 |
|
Medical Device Cybersecurity for Engineers and Manufacturers |
Axel Wirth, Christopher Gates, Jason Smith |
|
302 |
|
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) |
Michael Roytman and Ed Bellis |
|
303 |
|
Multicast and Group Security (Artech House Computer Security Series) |
Thomas Hardjono, Lakshminath R. Dondeti, |
|
304 |
|
Networks and states: the global politics of Internet governance [First MIT Pbk. ed] |
Mueller, Milton |
|
305 |
|
New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) |
Howard Shrobe, David L. Shrier, Alex Pentland |
|
306 |
|
Outsourcing Information Security |
C. Warren Axelrod |
|
307 |
|
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems [1 ed.] |
Javier Herranz, Jordi Nin (auth.), Jordi Nin, Javier Herranz (eds.) |
1 |
308 |
|
Computer Forensics and Privacy |
Michael A. Caloyannides |
2 |
309 |
|
Privacy vs. Security [1 ed.] |
Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan (auth.) |
1 |
310 |
|
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues [1 ed.] |
Sanjib Sinha |
1 |
311 |
|
Researching Internet Governance: Methods, Frameworks, Futures [1 ed.] |
Laura DeNardis, Derrick Cogburn, Nanette S. Levinson, Francesca Musiani |
1 |
312 |
|
Resistance To The Current: The Dialectics Of Hacking [1 ed.] |
Johan Söderberg, Maxigas |
1 |
313 |
|
Ruling the root: Internet governance and the taming of cyberspace |
Mueller, Milton |
|
314 |
|
Secure Data Networking |
Michael Purser |
|
315 |
|
Secure Information Management Using Linguistic Threshold Approach [1 ed.] |
Marek R. Ogiela, Urszula Ogiela (auth.) |
1 |
316 |
|
Secure Messaging On The Internet |
Rolf Oppliger |
|
317 |
|
Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers [1 ed.] |
Zhiyun Qian, Z. Morley Mao, Ammar Rayes, David Jaffe (auth.), Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis (eds.) |
1 |
318 |
|
Security for mobile networks and platforms |
Selim Aissi, Nora Dabbous, Anand R. Prasad |
|
319 |
|
Smart Grid Security [1 ed.] |
Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou, Dariusz Kloza (auth.) |
1 |
320 |
|
Social Engineering: How Crowdmasters, Phreaks, Hackers, And Trolls Created A New Form Of Manipulative Communication [1 ed.] |
Robert W. Gehl, Sean T Lawson |
1 |
321 |
|
CEHV8 - Module 03 - Labs Scanning Networks.pdf |
|
|
322 |
|
CEHv8 Module 03 Scanning Networks.pdf |
|
|
323 |
|
SSL and TLS: Theory and Practice (Information Security and Privacy) |
Rolf Oppliger |
|
324 |
|
SSL and TLS: Theory and Practice [2 ed.] |
Rolf Oppliger |
2 |
325 |
|
Certified Ethical Hacker (CEH) v3.0 Official Course.pdf |
|
|
326 |
|
Cisco ASA Firewall Fundamentals, 3rd Edition |
Harris Andrea |
|
327 |
|
Fundamentals of Network Security |
John E. Canavan |
|
328 |
|
The New Hacker's Dictionary - 3rd Edition [3 ed.] |
Eric S. Raymond |
3 |
329 |
|
Co-ordinated Port Scans |
|
|
330 |
|
The official PGP user's guide |
Zimmermann, Philip R. |
|
331 |
|
Tor Darknet series: Master the Art of Invisibility |
Lance Henderson |
|
332 |
|
The secure information society: ethical, legal and political challenges [1 ed.] |
Chris Bronk (auth.), Jörg Krüger, Bertram Nickolay, Sandro Gaycken (eds.) |
1 |
333 |
|
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing |
Arun Vishwanath |
|
334 |
|
Critical Infrastructures State of the Art in Research and Application [1 ed.] |
P. M. Herder, W. A. H. Thissen (auth.), W. A. H. Thissen, P. M. Herder (eds.) |
1 |
335 |
|
We, the Data : Human Rights in the Digital Age |
Wendy H. Wong |
|
336 |
|
Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P |
Robert W. Gehl |
|
337 |
|
You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy) |
Josephine Wolff, Sandra Braman, Paul T. Jaeger |
|
338 |
|
Your Computer Is on Fire |
Thomas S. Mullaney, Benjamin Peters, Mar Hicks, Kavita Philip |
|
339 |
|
CEHV8 - Module 03 - Scanning Networks.pdf |
|
|
340 |
|
Ethical Hacking and Countermeasures: Secure Network Infrastructures |
EC-Council |
|
341 |
|
Privacy, Regulations, And Cybersecurity: The Essential Business Guide [1st Edition] |
Chris Moschovitis |
1 |
342 |
|
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit |
Sagar Rahalkar |
|
343 |
|
Rtfm: Red Team Field Manual |
Ben Clark |
|
344 |
|
Scanning Applications 2.0 Next generation scan, attacks and tools |
|
|
345 |
|
Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide |
|
|
346 |
|
SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention |
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Xun Yi |
|
347 |
|
Secure connected objects |
Huon, Jean-Paul, Paret, Dominique |
|
348 |
|
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition [3 ed.] |
David R. Miller, Michael Gregg |
3 |
349 |
|
Security engineering: a guide to building dependable distributed systems |
Ross J. Anderson |
2 |
350 |
|
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges |
Qing Li, Gregory Clark |
|
351 |
|
Applied Incident Response [1 ed.] |
Steve Anson |
1 |
352 |
|
Beyond cybersecurity: protecting your digital business |
Kaplan, James M,Bailey, Tucker,O'Halloran, Derek,Marcus, Alan J |
|
353 |
|
Carry On: Sound Advice from Schneier on Security |
Schneier, Bruce |
|
354 |
|
CEH Certified Ethical Hacker Study Guide |
Graves, Kimberly |
|
355 |
|
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions |
Ric Messier |
|
356 |
|
CEHv8: Certified Ethical Hacker Version 8 Study Guide |
Oriyano, Sean-Philip |
|
357 |
|
Cehv9: Certified Ethical Hacker Version 9 [3rd ed] |
Oriyano, Sean-Philip |
3 |
358 |
|
CISSP for Dummies [6th edition] |
Gregory, Peter H.,Miller, Lawrence C |
6 |
359 |
|
CISSP official (ISC)² practice tests |
Chapple, Mike,Seidl, David |
|
360 |
|
CISSP Official (ISC)2 Practice Tests |
Mike Chapple, David Seidl |
2 |
361 |
|
CISSP: Certified Information Systems Security Professional Study Guide [5th ed.] |
James M. Stewart, Ed Tittel, Mike Chapple |
5 |
362 |
|
Communications and Information Infrastructure Security |
John G. Voeller |
1 |
363 |
|
CompTIA CySA+ Study Guide: Exam CS0-001 |
Mike Chapple, David Seidl |
|
364 |
|
CompTIA Security+ Deluxe Study Guide [1st edition] |
Dulaney, Emmett |
1 |
365 |
|
CompTIA Security+ Review Guide: Sy0-201 |
Stewart, James M. |
|
366 |
|
Computer Fraud Casebook: The Bytes That Bite [1. ed.] |
Joseph T. Wells (editor) |
1 |
367 |
|
Computer Security Handbook [1, Sixth edition] |
Seymour Bosworth, Michel E. Kabay, Eric Whyne |
1 |
368 |
|
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk [1. ed.] |
Andrew Gorecki |
1 |
369 |
|
Cyber Security |
Voeller, John G. |
|
370 |
|
Cyber Security Policy Guidebook |
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt |
|
371 |
|
Cyber smart: five habits to protect your family, money, and identity from cyber criminals |
McDonough, Bart R |
|
372 |
|
Cyber-risk informatics: engineering evaluation with data science |
Sahinoglu, Mehmet |
|
373 |
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting |
Gregory C. Rasner |
|
374 |
|
Cybersecurity In Humanities And Social Sciences: A Research Methods Approach [1, 1st Edition] |
Hugo Loiseau, Daniel Ventre, Hartmut Aden |
1 |
375 |
|
Cybersecurity in Our Digital Lives |
Mowbray, Thomas J, LeClair, Jane |
|
376 |
|
Cybersecurity of Industrial Systems |
Jean-Marie Flaus |
|
377 |
|
Cybersecurity Program Development for Business: The Essential Planning Guide [1 ed.] |
Moschovitis, Christos J. P |
1 |
378 |
|
Data Security For Dummies®, Immuta Special Edition [1 ed.] |
Steve Kaelble |
1 |
379 |
|
Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States |
Matthew Webster |
|
380 |
|
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing |
Roger A. Grimes, Dr. John N. Just |
|
381 |
|
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming [1. ed.] |
Matthew Hickey |
1 |
382 |
|
Industrial Cyber Security for Dummies. |
David Meltzer and Jeff Lund |
|
383 |
|
Information security governance: a practical development and implementation approach |
Brotby, W. Krag |
|
384 |
|
Information Security: Principles and Practice |
Mark Stamp |
2 |
385 |
|
Access Control Systems: Security, Identity Management and Trust Models [1 ed.] |
Dr. Messaoud Benantar (auth.) |
1 |
386 |
|
Network Attacks and Exploitation: A Framework |
Matthew Monte |
|
387 |
|
Network Forensics |
John Wiley and Sons,Messier, Ric |
|
388 |
|
Next-Generation Firewalls For Dummies [2 ed.] |
Lawrence Miller |
2 |
389 |
|
Phishing dark waters the offensive and defensive sides of malicious e-mails |
Dreeke, Robin,Fincher, Michele,Hadnagy, Christopher |
|
390 |
|
Privacy Means Profit: Prevent identity theft and secure you and your bottom line [1 ed.] |
John D. Sileo |
1 |
391 |
|
Schneier on Security |
Schneier, Bruce |
|
392 |
|
Secrets and Lies: Digital Security in a Networked World [15th Anniversary Edition] |
Schneier, Bruce |
15 |
393 |
|
Security 2020: reduce security risks this decade |
Schneier, Bruce, Howard, Doug, Prince, Kevin &, Kevin Prince |
|
394 |
|
Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack |
Wallace, Matthew,Ottenheimer, Davi |
|
395 |
|
Security and privacy in the digital era Volume 1 |
Guerrier, Claudine |
|
396 |
|
Security designs for the cloud, IoT, and social networking [First edition] |
Bhatt, Chintan M., Le, Dac-Nhuong, Madhukar, Mani |
|
397 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems [3° ed.] |
Ross Anderson |
3 |
398 |
|
Security Fundamentals |
Crystal Panek |
|
399 |
|
Security Technologies and Social Implications |
Markarian, Garik,Karlovic, Ruza,Nitsch, Holger,Chandramouli, Krishna,, Ru?a Karlovi?, Holger Nitsch, Krishna Chandramouli |
|
400 |
|
Security, privacy and digital forensics in the cloud |
Chen, Lei, Le-Khac, Nhien-An, Takabi, Hassan |
|
401 |
|
Social Engineering |
Christopher Hadnagy |
|
402 |
|
Social Engineering The Science of Human Hacking [2nd Edition] |
Christopher Hadnagy |
2 |
403 |
|
Social engineering: the art of human hacking |
Hadnagy, Christopher, Wilson, Paul |
|
404 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers |
Simon, William L., Mitnick, Kevin D. |
|
405 |
|
The death of the internet |
Markus Jakobsson |
|
406 |
|
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity |
Phil Quade |
|
407 |
|
The Official (ISC)2 Guide to the SSCP CBK |
Gordon, Adam,Hernandez, Steven |
4 |
408 |
|
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer |
Perry Carpenter, Kai Roer |
|
409 |
|
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors [1. ed.] |
Perry Carpenter |
1 |
410 |
|
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity [1. ed.] |
Marcus J. Carey, Jennifer Jin |
1 |
411 |
|
Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity Leadership [1st Edition] |
Marcus J. Carey, Jennifer Jin |
1 |
412 |
|
Tribe Of Hackers: Cybersecurity Advice From The Best Hackers In The World |
Marcus J. Carey, Jennifer Jin |
|
413 |
|
Vulnerability management for dummies |
Qualys |
|
414 |
|
We Have Root: Even More Advice From Schneier On Security [1st Edition] |
Bruce Schneier |
1 |
415 |
|
WHOIS running the Internet : protocol, policy, and privacy [1 ed.] |
Garth O. Bruen |
1 |
416 |
|
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework |
Bullock, Jessey,Kadijk, Jan |
|
417 |
|
Advances in Information Security Management & Small Systems Security [1 ed.] |
Les Labuschagne (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon (eds.) |
1 |
418 |
|
Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium [1 ed.] |
Hideki Sakurada, Yasuyuki Tsukada (auth.), Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen (eds.) |
1 |
419 |
|
Disseminating Security Updates at Internet Scale |
Jun Li, Peter Reiher, Gerald J. Popek (auth.) |
1 |
420 |
|
Critical Information Infrastructures: Resilience and Protection [1 ed.] |
Director Maitland Hyslop (auth.) |
1 |
421 |
|
Critical Infrastructure Protection [1 ed.] |
Neil Robinson, Lorenzo Valeri (auth.), Associate Director Eric Goetz, Professor Sujeet Shenoi (eds.) |
1 |
422 |
|
Critical Infrastructure Protection II [1 ed.] |
Scott Dynes (auth.), Mauricio Papa, Sujeet Shenoi (eds.) |
1 |
423 |
|
Cyber Situational Awareness: Issues and Research [1 ed.] |
Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) |
1 |
424 |
|
Data and Application Security: Developments and Directions [1 ed.] |
Gio Wiederhold (auth.), Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari (eds.) |
1 |
425 |
|
Data Warehousing and Data Mining Techniques for Cyber Security [1 ed.] |
Anoop Singhal (auth.) |
1 |
426 |
|
Economics of information security and privacy [1 ed.] |
Tyler Moore, David Pym, Christos Ioannidis (auth.), Tyler Moore, David Pym, Christos Ioannidis (eds.) |
1 |
427 |
|
Electronic Healthcare Information Security [1 ed.] |
Professor Charles A. Shoniregun, Dr. Kudakwashe Dube, Dr. Fredrick Mtenzi (auth.) |
1 |
428 |
|
Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA [1 ed.] |
Colin J. Armstrong (auth.), Lynn Futcher, Ronald Dodge (eds.) |
1 |
429 |
|
Global Initiatives to Secure Cyberspace: An Emerging Landscape [1 ed.] |
Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) |
1 |
430 |
|
Hop Integrity in the Internet [1 ed.] |
Prof. Chin-Tser Huang, Dr. Mohamed G. Gouda (auth.) |
1 |
431 |
|
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES) [1 ed.] |
Charles A. Shoniregun (auth.) |
1 |
432 |
|
Information Security -the Next Decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95 |
Jan H. P. Eloff, Sebastiaan H. von Solms (eds.) |
|
433 |
|
Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China [1 ed.] |
Kai Rannenberg (auth.), Sihan Qing, Jan H. P. Eloff (eds.) |
1 |
434 |
|
Information Security Governance [1 ed.] |
S.H. Solms, Rossouw Solms (auth.) |
1 |
435 |
|
Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark [1 ed.] |
A. K. Stanley (auth.), Louise Yngström, Jan Carlsen (eds.) |
1 |
436 |
|
Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands [1 ed.] |
Rüdiger Weis (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren (eds.) |
1 |
437 |
|
Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France |
Johan Van Niekerk, Rossouw Von Solms (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) |
1 |
438 |
|
Information Systems Security: Facing the information society of the 21st century |
Sokratis K. Katsikas, Dimitris Gritzalis (eds.) |
|
439 |
|
Insider Threats in Cyber Security [1 ed.] |
Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) |
1 |
440 |
|
Intelligence and Security Informatics for International Security: Information Sharing and Data Mining [1 ed.] |
Hsinchun Chen Ph.D. (auth.) |
1 |
441 |
|
Malware Detection [1 ed.] |
Brian Witten, Carey Nachenberg (auth.), Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (eds.) |
1 |
442 |
|
Managing Information Risk and the Economics of Security [1 ed.] |
M. Eric Johnson (auth.), M. Eric Johnson (eds.) |
1 |
443 |
|
Network Infrastructure Security [1 ed.] |
Alan Yeung, Angus Wong (auth.) |
1 |
444 |
|
Network Intrusion Detection and Prevention: Concepts and Techniques [1 ed.] |
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee (auth.) |
1 |
445 |
|
Network Security [1 ed.] |
Carlo Blundo, Stelvio Cimato, Barbara Masucci (auth.), Scott C.-H. Huang, David MacCallum, Ding-Zhu Du (eds.) |
1 |
446 |
|
Network Security Policies and Procedures [1 ed.] |
Douglas W. Frye (auth.) |
1 |
447 |
|
Network-Aware Security for Group Communications [1 ed.] |
Yan Sun, Wade Trappe, K. J. R. Liu (auth.) |
1 |
448 |
|
Networking Security and Standards [1 ed.] |
Weidong Kou (auth.) |
1 |
449 |
|
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa [1 ed.] |
John Haggerty, Mark Taylor (auth.), Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms (eds.) |
1 |
450 |
|
Online Business Security Systems [1 ed.] |
Godfried B. Williams (auth.) |
1 |
451 |
|
Open Source Software for Digital Forensics [1 ed.] |
Stefano Zanero, Ewa Huebner (auth.), Ewa Huebner, Stefano Zanero (eds.) |
1 |
452 |
|
Practical Internet Security [1 ed.] |
John R. Vacca (auth.) |
1 |
453 |
|
Preserving Privacy in Data Outsourcing [1 ed.] |
Sara Foresti (auth.) |
1 |
454 |
|
Preserving Privacy in On-Line Analytical Processing (OLAP) [1 ed.] |
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (auth.) |
1 |
455 |
|
Principles of Data Security [1 ed.] |
Ernst L. Leiss (auth.) |
1 |
456 |
|
Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy [1 ed.] |
Karsten Nohl, David Evans (auth.), Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (eds.) |
1 |
457 |
|
Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain |
Lawrence H. Cox (auth.), Csilla Farkas, Pierangela Samarati (eds.) |
1 |
458 |
|
Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK |
András Belokosztolszki, David Eyers (auth.), Ehud Gudes, Sujeet Shenoi (eds.) |
1 |
459 |
|
Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden [1 ed.] |
Inger Anne Tøndel (auth.), Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog (eds.) |
1 |
460 |
|
Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece [1 ed.] |
Brian Toone, Michael Gertz, Premkumar Devanbu (auth.), Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas (eds.) |
1 |
461 |
|
Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France |
Mohamed Hamdi, Noureddine Boudriga (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) |
1 |
462 |
|
Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA |
Dorothy E. Denning (auth.), Cynthia Irvine, Helen Armstrong (eds.) |
1 |
463 |
|
Security of Data and Transaction Processing [1 ed.] |
Vijay Atluri, Pierangela Samarati (auth.), Vijay Atluri, Pierangela Samarati (eds.) |
1 |
464 |
|
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security [1 ed.] |
Edna Reid, Dr. Hsinchun Chen (auth.), Dr. Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor (eds.) |
1 |
465 |
|
Vulnerability Analysis and Defense for the Internet [1 ed.] |
Abhishek Singh, Baibhav Singh, Hirosh Joseph (auth.), Abhishek Singh, Baibhav Singh, Hirosh Joseph (eds.) |
1 |
466 |
|
Wireless Network Security [1 ed.] |
Jonathan Lutz, M. Anwarul Hasan (auth.), Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du (eds.) |
1 |
467 |
|
The Information Security Dictionary Defining The Terms That Define Security For E-Business, Internet, Information And Wireless Technology |
Urs E. Gattiker |
|
468 |
|
Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA |
Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray |
|
469 |
|
Striking Back: The End of Peace in Cyberspace - And How to Restore It [1 ed.] |
Lucas Kello |
1 |
470 |
|
Listening In: Cybersecurity in an Insecure Age |
Susan Landau |
|
471 |
|
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices [1 ed.] |
William Stallings |
1 |
472 |
|
Database and Application Security: A Practitioner's Guide [1 ed.] |
R. Sarma Danturthi |
1 |
473 |
|
Network Security: PRIVATE Communication in a PUBLIC World, Third Edition |
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner |
|
474 |
|
Ransomware and Cyber Extortion: Response and Prevention [1 ed.] |
Sherri Davidoff, Matt Durrin, Karen Sprenger |
1 |
475 |
|
Securing 5G and Evolving Architectures [1 ed.] |
Pramod Nair |
1 |
476 |
|
Modern Security Operations Center, The [1 ed.] |
Joseph Muniz |
1 |
477 |
|
Data Breaches: Crisis and Opportunity [1 ed.] |
Sherri Davidoff |
1 |
478 |
|
Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services [1 ed.] |
Silvano Gai |
1 |
479 |
|
Computer Security [Art and Science] [2nd ed.] |
Matthew Bishop |
2 |
480 |
|
Effective Cybersecurity: A Guide to Using Best Practices and Standards [1 ed.] |
William Stallings |
1 |
481 |
|
Cyber Security Engineering A Practical Approach for Systems and Software Assurance |
Carol Woody, Nancy R. Mead |
|
482 |
|
Extrusion detection: security monitoring for internal intrusions |
Bejtlich, Richard |
|
483 |
|
Troubleshooting Linux Firewalls |
Michael Shinn, Scott Shinn |
|
484 |
|
The Executive Guide to Information Security: Threats, Challenges, and Solutions [1 ed.] |
Mark Egan, Tim Mather |
1 |
485 |
|
Firewalls and Internet Security: Repelling the Wily Hacker [2 ed.] |
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
2 |
486 |
|
Managing information security risks: the OCTAVE approach |
Christopher Alberts, Audrey Dorofee |
|
487 |
|
Inside Internet Security: What Hackers Don't Want You To Know [1 ed.] |
Jeff Crume |
1 |
488 |
|
Linux Firewalls: Enhancing Security with nftables and Beyond [4th ed.] |
Steve Suehring |
4 |
489 |
|
SSL and TLS: Designing and Building Secure Systems |
Eric Rescorla |
|
490 |
|
Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn Step by Step How to Professionally Code and Protect Your Data. This Book Includes: Python, Java, C ++ and Cybersecurity |
Grid, Alan |
|
491 |
|
Cyber Minds |
Shira Rubinoff |
|
492 |
|
CompTIA CySA+ Practice Exams |
Dion, Jason |
|
493 |
|
Next Generation Red Teaming |
Henry Dalziel |
|
494 |
|
Build Your Own Cybersecurity Testing Lab |
Ric Messier |
|
495 |
|
Agile Application Security |
Laura Bell |
|
496 |
|
Developing Cybersecurity Programs and Policies, Third Edition (Christopher Mandelaris' Library) |
Omar Santos |
3 |
497 |
|
Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative |
|
|
498 |
|
Computer Networking First-Step: An introductory guide to understanding wireless and cloud technology, basic communications services and network security for beginners |
Laurence, Norman |
|
499 |
|
Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and |
Cody, Isaac D |
|
500 |
|
Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to Hack Websites, Smartphones, Wireless Networks) + Linux Basic for Hackers (Command line and all the essentials) + Hacking with Kali Linux |
Julian James McKinnon |
|
501 |
|
Penetration Testing For Dummies |
Robert Shimonski |
|
502 |
|
The Pocket Guide to Cyber Security |
James H &, Usha D |
|
503 |
|
HAZ CLIC AQUÍ PARA MATARLOS A TODOS |
Bruce Schneier |
|
504 |
|
Basic Security Testing with Kali Linux |
Dieterle, Daniel |
|
505 |
|
CEH - Ethical Hacking and Countermeasures v11 (CEH11) |
EC-Council |
|
506 |
|
CEH v11 - Appendix A |
F3thinker ! |
|
507 |
|
CEH v11 - Appendix B |
F3thinker ! |
|
508 |
|
CEH v11 - Module 1 |
F3thinker ! |
|
509 |
|
CEH v11 - Module 10 |
F3thinker ! |
|
510 |
|
CEH v11 - Module 11 |
F3thinker ! |
|
511 |
|
CEH v11 - Module 12 |
F3thinker ! |
|
512 |
|
CEH v11 - Module 13 |
F3thinker ! |
|
513 |
|
CEH v11 - Module 14 |
F3thinker ! |
|
514 |
|
CEH v11 - Module 15 |
F3thinker ! |
|
515 |
|
CEH v11 - Module 16 |
F3thinker ! |
|
516 |
|
CEH v11 - Module 17 |
F3thinker ! |
|
517 |
|
CEH v11 - Module 18 |
F3thinker ! |
|
518 |
|
CEH v11 - Module 19 |
F3thinker ! |
|
519 |
|
CEH v11 - Module 2 |
F3thinker ! |
|
520 |
|
CEH v11 - Module 20 |
F3thinker ! |
|
521 |
|
CEH v11 - Module 3 |
F3thinker ! |
|
522 |
|
CEH v11 - Module 4 |
F3thinker ! |
|
523 |
|
CEH v11 - Module 5 |
F3thinker ! |
|
524 |
|
CEH v11 - Module 6 |
F3thinker ! |
|
525 |
|
CEH v11 - Module 7 |
F3thinker ! |
|
526 |
|
CEH v11 - Module 8 |
F3thinker ! |
|
527 |
|
CEH v11 - Module 9 |
F3thinker ! |
|
528 |
|
CND - Exam 312-38 - Module 0 |
F3thinker ! |
|
529 |
|
CND - Exam 312-38 - Module 1 |
F3thinker ! |
|
530 |
|
CND - Exam 312-38 - Module 10 |
F3thinker ! |
|
531 |
|
CND - Exam 312-38 - Module 11 |
F3thinker ! |
|
532 |
|
CND - Exam 312-38 - Module 12 |
F3thinker ! |
|
533 |
|
CND - Exam 312-38 - Module 13 |
F3thinker ! |
|
534 |
|
CND - Exam 312-38 - Module 14 |
F3thinker ! |
|
535 |
|
CND - Exam 312-38 - Module 2 |
F3thinker ! |
|
536 |
|
CND - Exam 312-38 - Module 3 |
F3thinker ! |
|
537 |
|
CND - Exam 312-38 - Module 4 |
F3thinker ! |
|
538 |
|
CND - Exam 312-38 - Module 5 |
F3thinker ! |
|
539 |
|
CND - Exam 312-38 - Module 6 |
F3thinker ! |
|
540 |
|
CND - Exam 312-38 - Module 7 |
F3thinker ! |
|
541 |
|
CND - Exam 312-38 - Module 8 |
F3thinker ! |
|
542 |
|
CND - Exam 312-38 - Module 9 |
F3thinker ! |
|
543 |
|
Cybersecurity Blue Team Toolkit |
Nadean H. Tanner |
|
544 |
|
Ghost in the Wires |
Kevin Mitnick |
|
545 |
|
How to Hack a Hacker |
Sherwood, AJ |
|
546 |
|
Incident Response & Computer Forensics |
Prosise, Chris., Mandia, Kevin. |
|
547 |
|
Kali Linux CTF Blueprints |
Buchanan, Cam |
|
548 |
|
Kali Linux: Assuring Security by Penetration Testing |
Lee Allen,Tedi Heriyanto,Shakeel Ali |
|
549 |
|
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware |
K A, Monnappa |
|
550 |
|
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides |
Cameron H. Malin, Eoghan Casey, James M. Aquilina |
|
551 |
|
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides |
Casey, Eoghan,Malin, Cameron H.,Aquilina, James M. |
|
552 |
|
Mastering Kali Linux for Advanced Penetration Testing |
Beggs, Robert |
|
553 |
|
Mastering Kali Linux Wireless Pentesting |
|
|
554 |
|
Penetration Testing with Kali Linux 1 1 |
F3thinker ! |
|
555 |
|
Social Engineer |
Sutherland, Ian |
|
556 |
|
The Network |
Bateman, E. G. |
|
557 |
|
Untangle Network Security |
El-Bawab, Abd El-Monem A. |
|
558 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance |
Chuvakin, Anton &, Williams, Branden R. |
|
559 |
|
Bots: How to Detect and Prevent Them |
Dalziel, Max &, Bradley, Jaron |
|
560 |
|
Turning BYOD Risk Into Mobile Security Strength |
Dalziel, Max &, Bradley, Jaron |
|
561 |
|
Cyber Policy in China |
Greg Austin |
|
562 |
|
Information Governance and Security |
Iannarelli, John G., OShaughnessy, Michael |
|
563 |
|
Inside Anonymous |
Olson, Parmy |
|
564 |
|
Core Software Security: Security at the Source |
James Ransome &, Anmol Misra |
|
565 |
|
Multi-dimensional summarization in cyber-physical society |
Gregory S. Makowski |
1 |
566 |
|
PCI Compliance. Implementing Effective PCI Data Security Standards |
Tony Bradley, James D. Burton, Jr., Anton Chuvakin, Dr., Anatoly Elberg, Brian Freedman, David King, Scott Paladino and Paul Shcooping (Eds.) |
|
567 |
|
Guide to Computer Network Security |
Kizza, Joseph Migga |
|
568 |
|
Seven Deadliest Microsoft Attacks |
Kraus, Rob &, Barber, Brian &, Borkin, Mike &, Alpern, Naomi |
|
569 |
|
IoT Security |
Liyanage, Madhusanka, Braeken, An, Kumar, Pardeep |
|
570 |
|
Python Passive Network Mapping |
Hosmer, Chet |
|
571 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory |
Michael Hale Ligh &, Andrew Case &, Jamie Levy &, Aaron Walters |
|
572 |
|
Wi Fi Security |
Miller, Stewart |
|
573 |
|
Violent Python: a cookbook for hackers, forensic analysts, penetration testers, and security engineers |
O &, #39,Connor, TJ |
|
574 |
|
What Is Computer Science?: An Information Security Perspective |
Page, Daniel &, Smart, Nigel |
|
575 |
|
Cyber Adversary Characterization: Auditing the Hacker Mind |
Parker, Tom &, Sachs, Marcus &, Shaw, Eric &, Stroz, Ed |
|
576 |
|
Safety of Computer Control Systems 1992 (Safecomp ' 92). Computer Systems in Safety-Critical Applications [1st ed.] |
H.H. Frey |
1 |
577 |
|
Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals [1 ed.] |
Randy Harrison |
1 |
578 |
|
Security Careers. Skills, Compensation, and Career Paths |
Stephen W. Walker and James E. Foushée (Auth.) |
|
579 |
|
Mobile Data Loss: Threats and Countermeasures |
Raggo, Michael T. |
|
580 |
|
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects |
Shavers, Brett |
|
581 |
|
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace |
Shipley, Todd &, Bowker, Art &, Selby, Nick |
|
582 |
|
Cisco Software-Defined Access |
Srilatha Vemula, Jason Gooley, Roddie Hasan |
|
583 |
|
La cryptologie au coeur du numérique |
Stern, Jacques |
|
584 |
|
Security Risk Management: Building an Information Security Risk Management Program From the Ground Up |
Wheeler, Evan |
|
585 |
|
Integrated Security Technologies and Solutions - Volume I 1 1 |
Aaron Woland, Vivek Santuka, Mason Harris, Jamie Sanbower |
|
586 |
|
GRC 300 SAP ACCESS CONTROL IMPLEMENTATION AND CONFIGURATION |
SAP TRAINING |
|
587 |
|
Modern Cryptography. |
|
|
588 |
|
IT-Sicherheitsmanagement - Das umfassende Praxis-Handbuch für IT-Security und technischen Datenschutz nach ISO 27001 |
Thomas W. Harich |
|
589 |
|
Guide to Computer Network Security, Fourth Edition |
Joseph Migga Kizza |
4 |
590 |
|
SASE For Dummies®, Versa Networks Special Edition 1 |
Kumar Mehta &, Apurva Mehta |
|
591 |
|
Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial Intelligence |
Callaway, Jason |
|
592 |
|
COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing |
Mach, Dylan |
|
593 |
|
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro |
HOFFMAN, HUGO &, HOFFMAN, HUGO |
|
594 |
|
Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking With Kali Linux |
Kou, Jim |
|
595 |
|
A Machine-Learning Approach to Phishing Detection and Defense |
Akanbi, O.A., Amiri, Iraj Sadegh, Fazeldehkordi, E. |
|
596 |
|
Ciberseguridad para la i-generación: Usos y riesgos de las redes sociales y sus aplicaciones |
Giant, Nikki |
|
597 |
|
Educar niños y adolescentes en la era digital: El reto de la educación en el siglo XXI |
Rodríguez, Nora |
|
598 |
|
Cybersecurity Readiness |
Chatterjee, Dave |
|
599 |
|
Ciberleviatán |
Lassalle, José María |
|
600 |
|
Identity 5 |
Mar-Gerrison, Heather |
|
601 |
|
Penetration Testing mit mimikatz |
Brabetz, Sebastian |
|
602 |
|
Internet, Hackers y Software Libre |
Varios |
|
603 |
|
Breaking into Information Security |
Josh More &, Anthony J. Stieber &, Chris Liu |
|
604 |
|
Hacking: How to Make Your Own Keylogger in C++ Programming Language |
Norman, Alan T. |
|
605 |
|
HACKING GMAIL: How to Hack Gmail |
HAT, BLACK |
|
606 |
|
Black Hat Go |
Dan Kottmann &, Chris Patten &, Tom Steele |
|
607 |
|
Black Ice |
Valmore James &, John Gallagher |
|
608 |
|
Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow |
Karnel, Erickson |
|
609 |
|
Cryptography & Network Security : Express Learning |
ITL Education Solutions Limited |
|
610 |
|
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying |
Henderson, Lance |
|
611 |
|
Digitale Diktatur · Totalüberwachung Cyberkrieg Datenmissbrauch |
Aust, Stefan |
|
612 |
|
Spurlos & Verschlüsselt! · Von sicherer Kommunikation und anonymem Surfen |
Gillen, Tobias |
|
613 |
|
Transforming Information Security: Optimizing Five Concurrent Data Trends to Reduce Resource Drain |
Moriarty, Kathleen M. |
|
614 |
|
Das Phantom im Netz: Die Autobiographie des meistgesuchten Hackers der Welt |
Mitnick, Kevin &, Simon, William M. |
|
615 |
|
World Wide War: Angriff aus dem Internet |
Clarke, Richard A. &, Knake, Robert A. |
|
616 |
|
The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack |
Levi West |
|
617 |
|
Hacking: Fundamentals for Absolute Beginners |
Bell, Alexander |
|
618 |
|
Infinity Ethical Hacking: Learn basic to advance hacks |
Sapp, Arthur S |
|
619 |
|
The Hacker Playbook: Practical Guide To Penetration Testing |
Kim, Peter |
|
620 |
|
Applied network security monitoring collection, detection, and analysis |
Bianco, David J.,Sanders, Chris,Smith, Jason |
|
621 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android |
Andrew Hoog |
|
622 |
|
Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework [1 ed.] |
Abraham, Ajin, Dalziel, Henry |
1 |
623 |
|
Automating open source intelligence : algorithms for OSINT [1 ed.] |
Layton, Robert, Watters, Paul A |
1 |
624 |
|
Becoming a global chief security executive officer : a how to guide for next generation security leaders [1 ed.] |
Cloutier, Roland |
1 |
625 |
|
Building a corporate culture of security : strategies for strengthening organizational resiliency [1 ed.] |
Sullivant, John |
1 |
626 |
|
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency |
Sullivant, John |
|
627 |
|
Breakdowns in Computer Security. Commentary and Analysis |
Michael E Rentell and Peter M Jenner (Auth.) |
|
628 |
|
Building an information security awareness program: defending against social engineering and technical threats |
Gardner, Bill G.,Thomas, Valerie |
|
629 |
|
Building an information security awareness program : defending against social engineering hacks [1 ed.] |
Bill Gardner |
1 |
630 |
|
Cloud storage security : a practical guide [1 ed.] |
Wheeler, Aaron, Winburn, Michael |
1 |
631 |
|
Cloud storage security a practical guide [Online-Ausg ed.] |
Wheeler, Aaron,Winburn, Michael |
|
632 |
|
CISSP Study Guide [2nd ed] |
Feldman, Joshua, Misenar, Seth, Conrad, Eric,Seth Misenar,Joshua Feldman,Kevin Riggins |
2 |
633 |
|
Computer Fraud & Security Journel |
|
|
634 |
|
Computer Security in Financial Organisations |
J. Essinger (Auth.) |
|
635 |
|
Computer Security |
David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick and Robert L. Ashenhurst (Auth.) |
|
636 |
|
Computer Security [2nd ed.] |
John M. Carroll (Auth.) |
2 |
637 |
|
Computers, Business, and Security. The New Role for Security |
James A Schweitzer (Auth.) |
|
638 |
|
Cybersecurity and Applied Mathematics |
Casey, William,Metcalf, Leigh,William Casey |
|
639 |
|
Cyber Security Awareness for CEOs and Management [1 ed.] |
Dalziel, Henry, Willson, David |
1 |
640 |
|
Data Breach Preparation and Response |
Fowler, Kevvie |
|
641 |
|
Data Protection and Security for Personal Computers. A Manager's Guide to Improving the Confidentiality, Availability and Integrity of Data on Personal Computers and Local Area Networks |
R. Schifreen (Auth.) |
|
642 |
|
Data breach preparation and response - breaches are certain, impact is not |
Fowler, Kevvie (partner And National Cyber Response Leader |
|
643 |
|
Data hiding fundamentals and applications : content security in digital media |
Husrev T Sencar, Ramkumar Mahalingam., Ali N Akansu |
|
644 |
|
Cyber Security Awareness for Corporate Directors and Board Members |
Willson, David, Dalziel, Henry |
|
645 |
|
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols |
Hosmer, Chet,Raggo, Michael T.,McGrew, Wesley |
|
646 |
|
Detecting and Combating Malicious Email [1 ed.] |
Julie JCH Ryan, Cade Kamachi |
1 |
647 |
|
Digital forensics : threatscape and best practices [1 ed.] |
Sammons, John |
1 |
648 |
|
Digital Forensics with Open Source Tools |
Altheide, Cory,Carvey, Harlan A.,Davidson, Ray |
|
649 |
|
Digital Identity Management [1 ed.] |
Maryline Laurent, Samia Bouzefrane |
1 |
650 |
|
Digital.Investigation.February |
|
|
651 |
|
Dissecting the hack : the v3rb0ten network [1 ed.] |
Baskin, Brian, Martin, Brian, Sims, Kristin, Street, Jayson E |
1 |
652 |
|
Firewalls: jumpstart for network and systems administrators |
John R Vacca, Scott Ellis |
|
653 |
|
Eleventh Hour CISSP Study Guide [2 ed.] |
Conrad, Eric,Misenar, Seth,Feldman, Joshua,Riggins, Kevin |
2 |
654 |
|
Eleventh Hour CISSP [3rd edition] |
Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman |
3 |
655 |
|
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques |
Sudhanshu Chauhan, Nutan Kumar Panda |
|
656 |
|
Handbook of Social Media Use Online Relationships, Security, Privacy, and Society Volume 2 |
John McAlaney, |
|
657 |
|
How to Cheat at Configuring Open Source Security Tools [1 ed.] |
Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson |
1 |
658 |
|
How to Cheat at Configuring Open Source Security Tools |
Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty |
|
659 |
|
Implementing digital forensic readiness: from reactive to proactive process |
Ivtchenko, Dmitri,Sachowski, Jason |
|
660 |
|
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors |
Ron Ben-Natan |
|
661 |
|
Insider threat: prevention, detection, mitigration, and deterrence |
Turner, James,Gelles, Michael G |
|
662 |
|
Information security science: measuring the vulnerability to data compromises |
Young, Carl S |
|
663 |
|
Information Security. Playbook [1 ed.] |
Greg Kane and Lorna Koppel (Eds.) |
1 |
664 |
|
Infosec Management Fundamentals [1 ed.] |
Dalziel, Henry |
1 |
665 |
|
Information Security [First Edition] |
Marvin Zelkowitz |
|
666 |
|
Introduction to cyber-warfare: a multidisciplinary approach [1 ed.] |
Paulo Shakarian, Jana Shakarian, Andrew Ruef |
1 |
667 |
|
Introduction to US Cybersecurity Careers |
Dalziel, Max |
|
668 |
|
Job reconnaissance: using hacking skills to win the job hunt game [1 ed.] |
Josh More |
1 |
669 |
|
Elsevier's Dictionary of Information Security [Mul ed.] |
G. Manoilov, B. Radichkova |
|
670 |
|
How to defeat advanced malware new tools for protection and forensics |
Crosby, Simon,Dalziel, Henry |
|
671 |
|
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis |
Baird, John,Shavers, Brett |
|
672 |
|
Low Tech Hacking: Street Smarts for Security Professionals |
Gudaitis, Terry,Jabbusch, Jennifer,Lowther, Sean,Rogers, Russ,Wiles, Jack |
|
673 |
|
Lossless Information Hiding in Images [1 ed.] |
Zhe-Ming Lu, Shi-Ze Guo |
1 |
674 |
|
Managing online risk : apps, mobile, and social media security [1 ed.] |
Deborah Gonzalez |
1 |
675 |
|
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare |
Joel Brenner |
|
676 |
|
Mobile Malware Attacks and Defense |
Ken Dunham |
|
677 |
|
Network and System Security [2nd ed] |
Vacca, John R |
2 |
678 |
|
No Tech Hacking |
Long, Johnny, Mitnick, Kevin D. |
|
679 |
|
Ninja Hacking Unconventional Penetration Testing Tactics and Techniques |
Thomas Wilhelm, Jason Andress, Bryan (con) Garner |
|
680 |
|
PCI Compliance [3rd edition] |
Chuvakin, Anton,Williams, Branden |
3 |
681 |
|
PCI DSS 3.1. The Standard That Killed SSL [1 ed.] |
Williams, Branden R |
1 |
682 |
|
Penetration tester's open source toolkit |
Faircloth, Jeremy |
3 |
683 |
|
PCI Compliance [4th edition] |
Williams, Branden R.,Chuvakin, Anton.,Anton A. Chuvakin,Derek Milroy |
4 |
684 |
|
Penetration Tester's Open Source Toolkit [4th edition] |
Faircloth, Jeremy,Rogers, T. Michael |
4 |
685 |
|
Physical Security for IT |
Michael Erbschloe |
|
686 |
|
Physical Security Guidelines. Template [1 ed.] |
Bob Hayes (Eds.) |
1 |
687 |
|
Practical anonymity: hiding in plain sight online [1 ed.] |
Peter Loshin |
1 |
688 |
|
Practical anonymity hiding in plain sight online |
Loshin, Peter |
|
689 |
|
Preparing for Next Generation Security Leader Opportunities. Proven Practices |
Bob Hayes (Auth.) |
|
690 |
|
Professional Penetration Testing. Creating and Operating a Formal Hacking Lab |
Thomas Wilhelm |
|
691 |
|
Professional penetration testing: creating and learning in a hacking lab [2 ed.] |
Thomas Wilhelm |
2 |
692 |
|
Protecting Information on Local Area Networks |
James A Schweitzer (Auth.) |
|
693 |
|
Professional Penetration Testing [1st edition] |
Wilhelm, Thomas |
1 |
694 |
|
Securing the Cloud: Cloud Computer Security Techniques and Tactics [1st ed.] |
Graham Speake, Patrick Foxhoven |
1 |
695 |
|
Securing the cloud : cloud computer security techniques and tactics |
J R Winkler |
|
696 |
|
Securing Social Media in the Enterprise [1 ed.] |
Dalziel, Henry |
1 |
697 |
|
Security operations center guidebook - a practical guide for a successful s |
Mccoy, Scott (cpp Cissp Asis International (isc)2) |
|
698 |
|
Security Leader Insights for Information Protection. Lessons and Strategies from Leading Security Professionals [1 ed.] |
Bob Fahy |
1 |
699 |
|
Security controls evaluation, testing, and assessment handbook |
Johnson, Leighton |
|
700 |
|
Securing SQL Server [3rd edition] |
Cherry, Denny |
3 |
701 |
|
Security Leadership of the Future. Article Collection [1 ed.] |
Bob Hayes (Eds.) |
1 |
702 |
|
Securing the Smart Grid: Next Generation Power Grid Security |
Tony Flick, Justin Morehouse |
|
703 |
|
Seven Deadliest USB Attacks |
|
|
704 |
|
Seven Deadliest Wireless Technologies Attacks |
Brad Haines (Auth.) |
|
705 |
|
Seven deadliest social networks attacks |
Perez, Richard,Timm, Carl |
|
706 |
|
Simple steps to data encryption: a practical guide to secure computing |
Loshin, Peter |
|
707 |
|
Smart Grid Security. Innovative Solutions for a Modernized Grid [1 ed.] |
Florian Skopik, Paul Dr. Smith |
1 |
708 |
|
Smart Cities Cybersecurity and Privacy |
Danda B. Rawat (editor), Kayhan Zrar Ghafoor (editor) |
|
709 |
|
Smart Security : Proven Practices |
Quilter, J. David |
|
710 |
|
Smart Security: Practices That Increase Business Profits. Proven Practices |
J. David Quilter (Auth.) |
|
711 |
|
Social engineering penetration testing executing social engineering pen tests, assessments and defense |
Ackroyd, Richard,Mason, Andrew,Watson, Gavin |
|
712 |
|
SQL injection attacks and defense Description based on print version record |
Clarke, Justin |
|
713 |
|
The Basics of Information Security [2nd edition] |
Andress, Jason |
2 |
714 |
|
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy [2nd Edition] |
Engebretson, Patrick,David Kennedy |
2 |
715 |
|
The basics of hacking and penetration testing: ethical hacking and penetration testing made easy |
Broad, James, Engebretson, Patrick Henry |
|
716 |
|
The Basics of Information Security. Understanding the Fundamentals of Infosec in Theory and Practice [2 ed.] |
Jason Andress (Auth.) |
2 |
717 |
|
Trojans, Worms, And Spyware A Computer Security Professional's Guide To Malicious Code |
|
|
718 |
|
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments |
Diane Barrett, Greg Kipper |
|
719 |
|
Voice over Internet Protocol (VoIP) Security |
PhD, CISM, CISSP, James F. Ransome, PhD, CISM, John Rittinghouse |
|
720 |
|
Wireless reconnaissance in penetration testing [recurso electrónico] |
Hamerstone, Alex,Neely, Matthew,Sanyk, Chris |
|
721 |
|
Wireless reconnaissance in penetration testing [1 ed.] |
Neely, Matthew, Sanyk, Chris, Hamerstone, Alex |
1 |
722 |
|
The History of Information Security: A Comprehensive Handbook |
Karl Maria Michael de Leeuw, Jan Bergstra |
|
723 |
|
The Manager's Handbook for Business Security [2 ed.] |
George Campbell (Eds.) |
2 |
724 |
|
Theoretical and Experimental Methods for Defending Against DDOS Attacks [1 ed.] |
Amiri, Iraj Sadegh, Soltanian, Mohammad Reza Khalifeh |
1 |
725 |
|
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals |
Paul Mungo |
|
726 |
|
Prying Eyes : Protect Your Privacy From People Who Sell to You, Snoop on You, or Steal From You |
Eric Gertler |
|
727 |
|
The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats |
Clarke, Richard Alan,Knake, Robert K |
|
728 |
|
Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility |
Andrew Jones, Craig Valli |
|
729 |
|
Cyber-Attacks and the Exploitable Imperfections of International Law [1 ed.] |
Yaroslav Radziwill |
1 |
730 |
|
Cybersecurity (Computer Science Fundamentals) |
Edet, Theophilus |
|
731 |
|
Cyber Attacks: Protecting National Infrastructure [1 ed.] |
Edward Amoroso |
1 |
732 |
|
From Lambda calculus to cybersecurity through program analysis |
|
|
733 |
|
Hacker: Hack The System: The "Ethical" Python Hacking Guide [4 ed.] |
Takehiro Kanegi, Alice Schwartz |
4 |
734 |
|
Information Assurance: Managing Organizational IT Security Risks [1st ed.] |
Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security Manager European Command (EUCOM) |
1 |
735 |
|
Information Governance and Security: Protecting and Managing Your Company's Proprietary Information |
John G. Iannarelli, Michael O'Shaughnessy |
|
736 |
|
Managing Online Risk Apps, Mobile, and Social Media Security |
Deborah Gonzalez |
|
737 |
|
Networked Control Systems: Cloud Control and Secure Control |
Magdi S. Mahmoud, Yuanqing Xia |
|
738 |
|
Risk management for computer security : Protecting your network and information assets |
Andy Jones, Debi Ashenden |
|
739 |
|
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program [2 ed.] |
Gerald L. Kovacich CFE CPP CISSP |
2 |
740 |
|
Seven Deadliest Web Application Attacks |
Shema, Mike |
|
741 |
|
Hackers. au cœur de la résistance numérique |
Guiton Amaelle |
|
742 |
|
The darkening web: the war for cyberspace |
Klimburg, Alexander |
|
743 |
|
The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats [Original retail ed.] |
Richard A. Clarke, Robert K. Knake |
|
744 |
|
The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War |
Geoff White |
|
745 |
|
The Trust Manifesto: What you Need to do to Create a Better Internet |
Damian Bradfield |
|
746 |
|
Cyber Arms; Security in Cyberspace |
Martellini, Stanislav Abaimov, Maurizio |
|
747 |
|
Cyber Wars |
Charles Arthur |
|
748 |
|
Hackear al hacker |
Roger A. Grimes |
|
749 |
|
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us |
Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra |
|
750 |
|
Linux Firewalls |
Michael Rash |
|
751 |
|
Next Level Cybersecurity: Detect the Signals, Stop the Hack |
Huda, Sai |
|
752 |
|
Next Level Cybersecurity: Detect the Signals, Stop the Hack |
Sai Huda |
|
753 |
|
Tout ce qu'il faut savoir pour protéger votre vie privée sur Internet |
David, Daniel-Jean |
|
754 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook [2nd edition] |
Safari, an O'Reilly Media Company., Eagle, Chris, Harper, Allen, Harris, Shon, Ness, Jonathan |
2 |
755 |
|
AI Assurance: Towards Trustworthy, Explainable, Safe, and Ethical AI |
Feras A. Batarseh, Laura Freeman |
|
756 |
|
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) [1 ed.] |
Andrew A. Bochman, Sarah Freeman |
1 |
757 |
|
Network Security with OpenSSL: Cryptography for Secure Communications |
John Viega, Matt Messier, Pravir Chandra |
|
758 |
|
Practical Unix & Internet Security, 3rd Edition [3 ed.] |
Simson Garfinkel, Gene Spafford, Alan Schwartz |
3 |
759 |
|
Managing Security with Snort & IDS Tools |
Gerg, Christopher,Cox, Kerry J |
|
760 |
|
Network Security Tools [1 ed.] |
Nitesh Dhanjani, Justin Clarke |
1 |
761 |
|
Internet Forensics |
R Jones |
|
762 |
|
Network Security Assessment: Know Your Network |
Chris McNab |
|
763 |
|
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks [1 ed.] |
Chris Fry, Martin Nystrom |
1 |
764 |
|
Snort Cookbook |
Biles, Simon,Orebaugh, Angela,Babbin, Jacob |
|
765 |
|
Network Security Hacks [Second Edition] |
Andrew Lockhart |
|
766 |
|
97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts [1 ed.] |
Christina Morillo |
1 |
767 |
|
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware [1 ed.] |
Cassie Crossley |
1 |
768 |
|
Policy as Code: Improving Cloud Native Security [1 ed.] |
Jimmy Ray |
1 |
769 |
|
Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security [1 ed.] |
Russ Miles, Stephen Giguere, Taylor Smith |
1 |
770 |
|
Cloud Native Security Cookbook: Recipes for a Secure Cloud [1 ed.] |
Josh Armitage |
1 |
771 |
|
Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications |
Brendan Creane |
|
772 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure [2 ed.] |
Amanda Berlin, Lee Brotherston, William Reyor III |
2 |
773 |
|
Adversary Emulation with MITRE ATT&CK: Bridging the Gap between the Red and Blue Teams |
Drinor Selmanaj |
|
774 |
|
Intelligence-Driven Incident Response: Outwitting the Adversary [2 ed.] |
Rebekah Brown, Scott Roberts |
2 |
775 |
|
Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking [2 ed.] |
Ric Messier |
2 |
776 |
|
Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust [1 ed.] |
Ev Kontsevoy, Sakshyam Shah, Peter Conrad |
1 |
777 |
|
Web Application Security: Exploitation and Countermeasures for Modern Web Applications [2 ed.] |
Andrew Hoffman |
2 |
778 |
|
Building a Cyber Risk Management Program: Evolving Security for the Digital Age [1 ed.] |
Brian Allen, Brandon Bapst, Terry Allan Hicks |
1 |
779 |
|
Network Security Through Data Analysis: Building Situational Awareness [1 ed.] |
Michael Collins |
1 |
780 |
|
JUNOS Security [1 ed.] |
Rob Cameron, Brad Woodberg, Timothy Eberhard, Patricio Giecco, James Quinn |
1 |
781 |
|
Junos Security: A Practical Guide to Junos Enterprise Services Gateways, Software, and Certification |
Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn |
|
782 |
|
Network Security Assessment: Know Your Network [3 ed.] |
Chris McNab |
3 |
783 |
|
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems [Paperback ed.] |
Josiah Dykstra |
|
784 |
|
Intelligence-Driven Incident Response: Outwitting the Adversary [1 ed.] |
Scott J. Roberts, Rebekah Brown |
1 |
785 |
|
In Search of Certainty: The Science of Our Information Infrastructure [2 ed.] |
Mark Burgess |
1 |
786 |
|
Defensive Security Handbook: Best Practices for Securing Infrastructure [1 ed.] |
Lee Brotherston, Amanda Berlin |
1 |
787 |
|
Network Security Through Data Analysis: From Data to Action [2 ed.] |
Michael Collins |
2 |
788 |
|
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line [Original retail ed.] |
Paul Troncone, Carl Albing |
|
789 |
|
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan [1 ed.] |
Jeff Bollinger, Brandon Enright, Matthew Valites |
1 |
790 |
|
The Cybersecurity Manager's Guide: The Art of Building Your Security Program [1 ed.] |
Todd Barnum |
1 |
791 |
|
Zero Trust Networks [2 ed.] |
Razi Rais, Christina Morillo, Evan Gilman, Doug Barth |
2 |
792 |
|
Cyber Sovereignty: The Future of Governance in Cyberspace [1 ed.] |
Lucie Kadlecová |
1 |
793 |
|
Protecting Networks with SATAN [1st English ed.] |
Martin Freiss |
1 |
794 |
|
Practical Unix and Internet Security, 2nd Edition [Second Edition] |
Simson Garfinkel, Gene Spafford PH.D. |
|
795 |
|
Sicherheit im Internet 3. Auflage - O'Reilly Basics [3 ed.] |
Krzysztof Janowicz |
3 |
796 |
|
Hacking Exposed 7, 7th Edition [7th edition] |
Safari, an O'Reilly Media Company., Kurtz, George, McClure, Stuart, Scambray, Joel |
7 |
797 |
|
Kenne deinen Feind. Fortgeschrittene Sicherheitstechniken |
Anton Chuvakin |
|
798 |
|
Computer Security Fundamentals, 4th Edition [1st edition] |
Safari, an O'Reilly Media Company., Easttom, Chuck |
1 |
799 |
|
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [2nd edition] |
Safari, an O'Reilly Media Company., Engebretson, Patrick |
2 |
800 |
|
Network Security Hacks [1st ed.] |
Andrew Lockhart |
1 |
801 |
|
Network Security Assessment [1st ed.] |
Chris McNab |
1 |
802 |
|
Network Security Assessment (2007)(2nd)(en)(478s) [2 ed.] |
Chris McNab |
2 |
803 |
|
Network security assessment [2nd ed] |
Chris McNab |
2 |
804 |
|
Inside cyber warfare: mapping the cyber underworld |
Carr, Jeffrey |
|
805 |
|
CompTIA PenTest+ Cert Guide, First Edition [1st edition] |
Safari, an O'Reilly Media Company., Santos, Omar, Taylor, Ron |
1 |
806 |
|
Defensive Security Handbook, 2nd Edition |
Lee Brotherston, Amanda Berlin |
|
807 |
|
Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) [3 ed.] |
Kim Crawley |
3 |
808 |
|
Building a Cyber Risk Management Program |
Brian Allen |
|
809 |
|
The Developer's Playbook for Large Language Model Security |
Steve Wilson |
|
810 |
|
Ransomware and Data Extortion |
Ryan Golden, Anthony M. Freed |
|
811 |
|
Intelligence-Driven Incident Response, 2nd Edition (5th Early Release) [2 ed.] |
Rebekah Brown and Scott J. Roberts |
2 |
812 |
|
Software Supply Chain Security (First Early Release) [1 ed.] |
Cassie Crossley |
1 |
813 |
|
Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (2nd Early Release) |
Kim Crawley |
|
814 |
|
Ransomware and Data Extortion (for True Epub) |
Ryan Golden, Anthony M. Freed |
|
815 |
|
Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition [3 ed.] |
Jeffrey Caruso |
3 |
816 |
|
Managing the Insider Threat: No Dark Corners [1st edition] |
Safari, an O'Reilly Media Company., Catrantzos, Nick |
1 |
817 |
|
Network Security Assessment: Know Your Network [3rd ed.] |
Chris McNab |
3 |
818 |
|
Identity and data security for web development: best practices [First edition] |
LeBlanc, Jonathan,Messerschmidt, Tim |
|
819 |
|
Network Security Tools |
Clarke, Justin,Dhanjani, Nitesh |
|
820 |
|
Sharing big data safely managing data security [First edition (Online-Ausg.)] |
Dunning, Ted,Friedman, B. Ellen |
|
821 |
|
Practical Cloud Security, 2nd Edition (Third Early Release) [2 ed.] |
Chris Dotson |
2 |
822 |
|
Ransomware. Defending Against Digital Extortion |
Allan Liska, Timothy Gallo |
|
823 |
|
Tyrants on Twitter: Protecting Democracies from Information Warfare |
David L. Sloss |
|
824 |
|
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition [2nd edition] |
O'Reilly for Higher Education (Firm), Bryce, Chapin, Miller, Preston |
2 |
825 |
|
Cybercrime: Wie Sie Gefahren im Internet erkennen und sich schützen |
Jürgen Schuh |
|
826 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA [1 ed.] |
Denise Nicholson (eds.) |
1 |
827 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition [5th edition.] |
Matt Walker, Safari, an O'Reilly Media Company. |
5 |
828 |
|
Is Someone Watching You Online NOW?: Online Surveillance |
Ng, Freeman |
|
829 |
|
Blocking Spam & Spyware For Dummies [1 ed.] |
Peter H. Gregory, Mike Simon |
1 |
830 |
|
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings [1st ed.] |
Simon N. Foley |
1 |
831 |
|
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers [1 ed.] |
Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgerald (eds.) |
1 |
832 |
|
Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World [2 ed.] |
Simon Chesterman |
2 |
833 |
|
Configuring Check Point NGX VPN-1 Firewall-1 [1 ed.] |
Robert Stephens, Barry Stiefel, Stephen Watkins, Simon Desmeules, Eli Faskha |
1 |
834 |
|
Digital Forensic Investigation of Internet of Things (IoT) Devices [1st ed.] |
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson |
1 |
835 |
|
Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level [1 ed.] |
Robert M. Clark, Simon Hakim (eds.) |
1 |
836 |
|
Hacking Hacking Practical Guide for Beginners (Hacking With Python) |
Jeff Simon |
|
837 |
|
El arte de la intrusión: cómo ser un hacker o evitarlos |
Kevin D Mitnick, William L Simon |
|
838 |
|
Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach [1st ed.] |
Simon Parkinson, Andrew Crampton, Richard Hill |
1 |
839 |
|
L’art de la supercherie |
Kevin Mitnick, William L. Simon |
|
840 |
|
Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers [1 ed.] |
Simon Meurer, Roland Wismüller (auth.), Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian (eds.) |
1 |
841 |
|
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation |
David Routin, Simon Thoores, Samuel Rossier |
|
842 |
|
The art of deception: controlling the human element of security [1 ed.] |
Kevin D. Mitnick, William L. Simon, Steve Wozniak |
1 |
843 |
|
The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers |
Kevin D Mitnick, William L Simon |
|
844 |
|
The Art of Deception: Controlling the Human Element of Security |
Kevin D. Mitnick, William L. Simon, Steve Wozniak |
|
845 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers [1 ed.] |
Kevin D. Mitnick, William L. Simon |
1 |
846 |
|
Becoming an Ethical Hacker |
Gary Rivlin |
|
847 |
|
Application Security Program Handbook |
Derek Fisher, |
|
848 |
|
Cybersecurity in Finance: Getting the Policy Mix Right |
Sylvain Bouyon, Simon Krause |
|
849 |
|
Techo-Security in an Age of Globalization: Perspectives From the Pacific Rim |
Denis Fred Simon |
|
850 |
|
The Art of Deception: Controlling the Human Element of Security |
Kevin David Mitnick &, William L. Simon |
|
851 |
|
The NSA Hack and its Implications |
Simon Luria |
|
852 |
|
Net Neutrality: Towards a Co-regulatory Solution |
Christopher T. Marsden |
|
853 |
|
Security in Cyberspace: Targeting Nations, Infrastructures, Individuals |
Giampiero Giacomello (editor) |
|
854 |
|
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future |
Aaron Mauro |
|
855 |
|
The Hidden Potential of DNS in Security |
Joshua M. Kuo, Ross Gibson |
|
856 |
|
Cyber Operations Building, Defending, and Attacking Modern Computer Networks [2nd edition] |
O'Leary, Mike |
2 |
857 |
|
Professional Red Teaming: Conducting Successful Cybersecurity Engagements |
Oakley, Jacob G |
|
858 |
|
Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program [2 ed.] |
Ryan Leirvik |
2 |
859 |
|
DNS Security for Dummies [Infoblox special edition] |
Joshua M. Kuo, Robert Nagy, Cricket Liu |
|
860 |
|
Personal Cybersecurity. How to avoid and recover from Cybercrime |
Marvin Waschke |
|
861 |
|
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence |
Kevin Cardwell |
|
862 |
|
Managing Risk and Information Security: Protect to Enable [2 ed.] |
Malcolm W. Harkins (auth.) |
2 |
863 |
|
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies [3 ed.] |
Carey Parker |
3 |
864 |
|
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide |
Luis Ayala (auth.) |
|
865 |
|
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks [1 ed.] |
Mike O'Leary |
1 |
866 |
|
The New School of Information Security [1 ed.] |
Adam Shostack, Andrew Stewart |
1 |
867 |
|
Managing Risk and Information Security: Protect to Enable |
Malcolm Harkins |
|
868 |
|
Security and Privacy for Modern Networks : Strategies and Insights for Safeguarding Digital Infrastructures |
Seshagirirao Lekkala, Priyanka Gurijala |
|
869 |
|
Beginning Ethical Hacking with Python |
Sinha, Sanjib |
|
870 |
|
Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed |
Yuri Diogenes |
|
871 |
|
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment [1st ed.] |
Dan Blum |
1 |
872 |
|
Practical Information Security Management A Complete Guide to Planning and Implementation |
Tony Campbell |
|
873 |
|
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats [1 ed.] |
Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
1 |
874 |
|
Cybersecurity for Space: Protecting the Final Frontier [1st ed.] |
Jacob G. Oakley |
1 |
875 |
|
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents [Paperback ed.] |
Eric C. Thompson |
|
876 |
|
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails [1 ed.] |
Nicholas Oles |
1 |
877 |
|
Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines |
Abhishek Chopra, Mukund Chaudhary |
|
878 |
|
The Manager’s Guide to Web Application Security:: A Concise Guide to the Weaker Side of the Web [1 ed.] |
Ron Lepofsky (auth.) |
1 |
879 |
|
Linux Firewalls mit iptables & Co. |
Ralf Spenneberg |
|
880 |
|
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources [1 ed.] |
Morey J. Haber, Brian Chappell, Christopher Hills |
1 |
881 |
|
Honeypots for Windows [1 ed.] |
Roger A. Grimes (auth.) |
1 |
882 |
|
The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team |
Jacob G. Oakley, Michael Butler |
|
883 |
|
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls |
Jason Edwards |
|
884 |
|
The InfoSec Handbook: An Introduction to Information Security [1st ed.] |
Umesha Nayak, Umesh Rao |
1 |
885 |
|
Protective Security: Creating Military-Grade Defenses For Your Digital Business [1st Edition] |
James Seaman |
1 |
886 |
|
The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things [1 ed.] |
Aditya Gupta |
1 |
887 |
|
Managing risk and information security [2nd edition] |
Malcolm W. Harkins |
2 |
888 |
|
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level [1 ed.] |
Jordan Schroeder (auth.) |
1 |
889 |
|
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies [5 ed.] |
Carey Parker |
5 |
890 |
|
Handbuch IT-Sicherheit : Strategien, Grundlagen und Projekte |
Walter Gora |
|
891 |
|
Android Apps Security |
Sheran Gunasekera |
|
892 |
|
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server [1 ed.] |
Robert La Lau |
1 |
893 |
|
Penetration Testing Basics: a Quick-Start Guide to Breaking into Systems |
Messier, Ric |
|
894 |
|
Cube Farm [1 ed.] |
Bill Blunden (auth.) |
1 |
895 |
|
iOS Penetration Testing A Definitive Guide to iOS Security |
Kunal Relan |
|
896 |
|
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time |
Chet Hosmer |
|
897 |
|
Abenteuer Kryptologie : Methoden, Risiken und Nutzen der Datenverschlüsselung [3., überarb. Aufl] |
Reinhard Wobst |
3 |
898 |
|
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders |
Kodi A. Cochran |
|
899 |
|
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations [1 ed.] |
Morey J. Haber,Brad Hibbert (auth.) |
1 |
900 |
|
Cryptography and Data Security |
Dorothy Elizabeth Robling Denning |
|
901 |
|
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security [2nd ed.] |
Marshall Copeland, Matthew Jacobs |
2 |
902 |
|
Pci Dss: An Integrated Data Security Standard Guide [1 ed.] |
Jim Seaman |
1 |
903 |
|
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [2 ed.] |
Tyler Wall, Jarrett Rodrick |
2 |
904 |
|
Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed Systems) [3 ed.] |
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner |
3 |
905 |
|
The No-Nonsense Guide for CISOs and Security Managers |
Aaron Roberts |
|
906 |
|
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program [1 ed.] |
Ryan Leirvik |
1 |
907 |
|
Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers [1st ed.] |
Sreejith Keeriyattil |
1 |
908 |
|
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions [1st ed.] |
Paul Rohmeyer, Jennifer L. Bayuk |
1 |
909 |
|
Digital Archaeology: The Art and Science of Digital Forensics [1 ed.] |
Michael W. Graves |
1 |
910 |
|
Enterprise Cybersecurity Study Guide [1st ed.] |
Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
1 |
911 |
|
10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy [1 ed.] |
Daniel G. Bachrach, Eric J. Rzeszut (auth.) |
1 |
912 |
|
Privacy in the Age of Innovation: AI Solutions for Information Security |
Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala |
|
913 |
|
Enterprise Cyber Risk Management as a Value Creator : Leverage Cybersecurity for Competitive Advantage |
Bob Chaput |
|
914 |
|
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment [1st ed.] |
Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler |
1 |
915 |
|
Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide |
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu |
|
916 |
|
Cybersecurity Lexicon [1 ed.] |
Luis Ayala (auth.) |
1 |
917 |
|
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks [1 ed.] |
Gunikhan Sonowal |
1 |
918 |
|
PCI DSS: An Integrated Data Security Standard Guide |
Jim Seaman |
|
919 |
|
Identity Attack Vectors: Strategically Designing And Implementing Identity Security [2 ed.] |
Morey J. Haber, Darran Rolls |
2 |
920 |
|
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records [1 ed.] |
Bernard Peter Robichau |
1 |
921 |
|
70 Tips and Tricks for Mastering the CISSP Exam [1st ed.] |
R. Sarma Danturthi |
1 |
922 |
|
Cybersecurity for Space: A Guide to Foundations and Challenges [2 ed.] |
Jacob G. Oakley |
2 |
923 |
|
Securing PHP Apps [1 ed.] |
Ben Edmunds (auth.) |
1 |
924 |
|
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information [1 ed.] |
Eric C. Thompson (auth.) |
1 |
925 |
|
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing [1 ed.] |
Ahmed Sheikh |
1 |
926 |
|
Snowflake Security: Securing Your Snowflake Data Cloud [1 ed.] |
Ben Herzberg, Yoav Cohen |
1 |
927 |
|
Linux® firewalls: enhancing security with nftables and beyond [4th edition] |
Addison-Wesley.,Suehring, Steve |
4 |
928 |
|
Theoretical Cybersecurity: Principles and Advanced Concepts |
Jacob G. Oakley, Michael Butler, Matthew Puckett, J. Louis Sewell, Wayne York |
|
929 |
|
Lesson-Based Review of Ethical Hacking and Penetration Testing |
Ahmed Sheikh |
|
930 |
|
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention [1 ed.] |
Luis Ayala (auth.) |
1 |
931 |
|
Certified Ethical Hacker (CEH) Foundation Guide [1 ed.] |
Sagar Ajay Rahalkar (auth.) |
1 |
932 |
|
Big Breaches: Cybersecurity Lessons for Everyone |
Neil Daswani, Moudy Elbayadi |
|
933 |
|
Discovering Cybersecurity: A Technical Introduction For The Absolute Beginner [1 ed.] |
Seth James Nielson |
1 |
934 |
|
Privileged Attack Vectors: Building Effective Cyber-defense Strategies to Protect Organizations [2 ed.] |
Morey J. Haber |
2 |
935 |
|
The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management |
Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke |
|
936 |
|
NTP Security: A Quick-Start Guide [1 ed.] |
Allan Liska (auth.) |
1 |
937 |
|
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center [1 ed.] |
Marshall Copeland (auth.) |
1 |
938 |
|
Algebra for Secure and Reliable Communication Modeling |
Mustapha Lahyane, Edgar Martinez-moro |
|
939 |
|
The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War [1 ed.] |
Steve Grobman, Allison Cerra (auth.) |
1 |
940 |
|
Pirates de l’informatique : enquête sur les hackers français |
Blanchard, Philippe |
|
941 |
|
Firewall Policies And VPN Configurations [1 ed.] |
Laura E. Hunter |
1 |
942 |
|
Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations [1 ed.] |
Iwan Hoogendoorn |
1 |
943 |
|
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know |
John Viega |
|
944 |
|
Android Apps Security: Mitigate Hacking Attacks and Security Breaches [2nd ed.] |
Sheran Gunasekera |
2 |
945 |
|
Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners [1 ed.] |
Alexander J. Roxon |
1 |
946 |
|
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [1 ed.] |
Tyler Wall, Jarrett Rodrick |
1 |
947 |
|
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities [1st ed.] |
Sagar Rahalkar |
1 |
948 |
|
Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services |
Puthiyavan Udayakumar |
|
949 |
|
Mastering Cybersecurity: Strategies, Technologies, and Best Practices [1 ed.] |
Jason Edwards |
1 |
950 |
|
Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway [1 ed.] |
Greg Holden (auth.) |
1 |
951 |
|
Firewalls Don’t Stop Dragons: A Step-by-Step Guide To Computer Security And Privacy For Non-Techies [4th Edition] |
Carey Parker |
4 |
952 |
|
Ransomware Revealed: A Beginner’s Guide To Protecting And Recovering From Ransomware Attacks |
Nihad A. Hassan |
|
953 |
|
System Administration Ethics: Ten Commandments For Security And Compliance In A Modern Cyber World |
Igor Ljubuncic, Tom Litterer |
|
954 |
|
The Passion of Bradley Manning: The Story of the Suspect Behind the Largest Security Breach in U.S. History |
Chase Madar |
|
955 |
|
Full Stack Python Security: Cryptography, TLS, and attack resistance |
Dennis Byrne |
|
956 |
|
CCNA cyber ops SECOPS #210-255 official cert guide |
Santos, Omar,Joseph Muniz,Stefano De Crescenzo |
|
957 |
|
Network defense and countermeasures principles and practices [2nd ed] |
Easttom, Chuck |
2 |
958 |
|
Linux Essentials for Cybersecurity (for True EPUB) |
William “Bo” Rothwell, Denise Kinsey |
|
959 |
|
Democracy in danger. How hackers and activists exposed fatal flaws in the election system |
Jake Braun |
|
960 |
|
Self-Sovereign Identity: Decentralized digital identity and verifiable credentials [1 ed.] |
Alex Preukschat, Drummond Reed |
1 |
961 |
|
Cybersecurity Career Guide |
Alyssa Miller |
|
962 |
|
Hacked: The Inside Story Of America's Struggle To Secure Cyberspace [1 ed.] |
Charlie Mitchell |
1 |
963 |
|
The Unhackable Internet |
Thomas P. Vartanian, |
|
964 |
|
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam - The How To Pass on Your First Try Certification Study Guide |
William Manning |
|
965 |
|
Facing Cyber Threats Head on: Protecting Yourself and Your Business |
Brian Minick |
|
966 |
|
Personal Firewalls for Administrators and Remote Users [1st ed.] |
Lisa Yeo |
1 |
967 |
|
Securing Devops: Safe Services in the Cloud [1 ed.] |
Julien Vehent |
1 |
968 |
|
CCIE Security Exam Certification Guide |
Henry Benjamin |
|
969 |
|
Building Secure and Reliable Network Applications [1st ed.] |
Kenneth P Birman |
1 |
970 |
|
CCNA Cyber Ops SECFND 210-250 official cert guide |
De Crescenzo, Stefano,Muniz, Joseph,Santos, Omar |
|
971 |
|
Secure By Design |
Daniel Deogun, Dan Bergh Johnsson, Daniel Sawano |
|
972 |
|
CCNA Security Portable Command Guide |
Bob Vachon |
|
973 |
|
Constructing cybersecurity: Power, expertise and the internet security industry (Manchester University Press) |
Andrew Whiting |
|
974 |
|
The Art of Network Penetration Testing: Taking over any company in the world |
Royce Davis |
|
975 |
|
Information Security Management [2 ed.] |
Michael Workman |
2 |
976 |
|
Cryptography In The Database: The Last Line Of Defense |
Kevin Kenan |
|
977 |
|
Managing Information Risks: Threats, Vulnerabilities, and Responses |
Saffady, William |
|
978 |
|
Cybersecurity and Information Security Analysts: A Practical Career Guide |
Kezia Endsley |
|
979 |
|
50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them [2nd Edition] |
Weisman, Steve |
2 |
980 |
|
CISSP Cert Guide [3rd ed.] |
ROBIN ABERNATHY, TROY McMILLAN |
3 |
981 |
|
Governing Cyberspace: Behavior, Power, and Diplomacy |
Dennis Broeders (editor), Bibi van den Berg (editor) |
|
982 |
|
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family |
Theresa M. Payton, Ted Claypoole |
|
983 |
|
Cybersecurity And Human Rights In The Age Of Cyberveillance [1 ed.] |
Joanna Kulesza, Roy Balleste |
1 |
984 |
|
Making Sense of Cybersecurity |
Thomas Kranz |
|
985 |
|
Protecting Student Data Privacy: Classroom Fundamentals |
Linnette Attai |
|
986 |
|
Exploring Careers in Cybersecurity and Digital Forensics |
Lucy K. Tsado, Robert Osgood |
|
987 |
|
Hack by Dmitry Samarov [1ST ed.] |
Dmitry Samarov |
1 |
988 |
|
Data Privacy: A runbook for engineers |
NISHANT BHAJARIA |
|
989 |
|
The Art of Network Penetration Testing: How to take over any company in the world [1 ed.] |
Royce Davis |
1 |
990 |
|
End-To-End Network Security: Defense-In-Depth |
Santos, Omar |
|
991 |
|
API Security in Action [1 ed.] |
Neil Madden |
1 |
992 |
|
Information security: principles and practices [2nd edition] |
Breithaupt, Jim,Merkow, Mark S |
2 |
993 |
|
Application Security Program Handbook: A guide for software engineers and team leaders |
Derek Fisher |
|
994 |
|
Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System |
Jake Braun |
|
995 |
|
Cyber insecurity: navigating the perils of the next information age |
Harrison, Richard M.,Herr, Trey |
|
996 |
|
Pearson Education: Certified Ethical Hacker (CEH) Version 10 (Certification Guide) [3 ed.] |
Pearson Education, Omar Santos, Michael Gregg |
3 |
997 |
|
Casting Light On The Dark Web: A Guide For Safe Exploration |
Matthew Beckstrom, Brady Lund |
|
998 |
|
Microsoft Azure Security Center |
Yuri Diogenes, Tom Shinder |
|
999 |
|
Privacy in the age of big data: recognizing threats, defending your rights, and protecting your family [1st paperback ed] |
Claypoole, Theodore,Payton, Theresa M |
1 |
1000 |
|
Computer Security: Principles and Practice [Fourth Global edition] |
Stallings, William, Brown, Lawrie |
|
1001 |
|
Cisco ASA All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition) |
Jazib Frahim, Omar Santos, Andrew Ossipov |
|
1002 |
|
The Black Box Society: The Secret Algorithms That Control Money and Information |
Frank Pasquale |
|
1003 |
|
The Hacker And The State: Cyber Attacks And The New Normal Of Geopolitics [1st Edition] |
Ben Buchanan |
1 |
1004 |
|
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics |
Ben Buchanan |
|
1005 |
|
A Leader’s Guide to Cybersecurity: Why Boards Need to Lead–and How to Do It |
Thomas J. Parenty, Jack J. Domet |
|
1006 |
|
TECHNOLOGY AS SECURITY |
Declan McCullagh |
|
1007 |
|
Cybersecurity: The Insights You Need from Harvard Business Review |
Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg, Roman V. Yampolskiy |
|
1008 |
|
The U.S. Cybersecurity and Intelligence Analysis Challenges |
John Michael Weaver |
|
1009 |
|
Digitalisation and Human Security: A Multi-Disciplinary Approach to Cybersecurity in the European High North [1st ed.] |
Mirva Salminen, Gerald Zojer, Kamrul Hossain |
1 |
1010 |
|
Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices |
Joseph MacMillan |
|
1011 |
|
Digital Platform Regulation: Global Perspectives on Internet Governance (Palgrave Global Media Policy and Business) |
Terry Flew (editor), Fiona R. Martin (editor) |
|
1012 |
|
Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative Perspectives |
Gertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo |
|
1013 |
|
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry: A Comparative Study within the G-20 |
Felix I. Lessambo |
|
1014 |
|
The Turn to Infrastructure in Internet Governance |
Francesca Musiani, Derrick L. Cogburn, Laura DeNardis, Nanette S. Levinson (eds.) |
|
1015 |
|
A Closer Look at Cybersecurity and Cryptanalysis |
C. Rupa (editor), Sirajuddin (editor) |
|
1016 |
|
Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism |
Michael Miller |
|
1017 |
|
Cyberwarfare: Threats to Critical Infrastructure |
Kristan Stoddart |
|
1018 |
|
Cyber Attack |
Margaret J. Goldstein,Martin Gitlin |
|
1019 |
|
Computer Security Within Organizations |
Adrian R. Warman (auth.) |
|
1020 |
|
Living With Hacktivism: From Conflict to Symbiosis [1 ed.] |
Vasileios Karagiannopoulos (auth.) |
1 |
1021 |
|
Countering Cyber Threats to Financial Institutions: A Private and Public Partnership Approach to Critical Infrastructure Protection [1st ed.] |
Pierre-Luc Pomerleau, David L. Lowery |
1 |
1022 |
|
Human Privacy In Virtual And Physical Worlds: Multidisciplinary Perspectives [1 ed.] |
Mary C. Lacity, Lynda Coon |
1 |
1023 |
|
Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance: Analyzing IANA Transition [1st ed.] |
Nicola Palladino, Mauro Santaniello |
1 |
1024 |
|
Cybercrime in the Pandemic Digital Age and Beyond (Palgrave Studies in Cybercrime and Cybersecurity) |
Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), Laurie Yiu-Chung Lau (editor) |
|
1025 |
|
Cyber war versus cyber realities : cyber conflict in the international system [1 ed.] |
Maness, Ryan C., Valeriano, Brandon |
1 |
1026 |
|
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain |
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron |
|
1027 |
|
Binary bullets : the ethics of cyberwarfare [1 ed.] |
Allhoff, Fritz, Henschke, Adam, Strawser, Bradley Jay |
1 |
1028 |
|
The cybersecurity dilemma : hacking, trust, and fear between nations [1 ed.] |
Buchanan, Ben |
1 |
1029 |
|
Bulk Collection: Systematic Government Access To Private-Sector Data |
Fred H. Cate, James X. Dempsey |
|
1030 |
|
Inside the Enemy's Computer: Identifying Cyber Attackers [1 ed.] |
Clement Guitton |
1 |
1031 |
|
Cyberwar. How Russian hackers and trolls helped elect a president - what we don’t, can’t, and do know. |
Jamieson, Kathleen Hall |
|
1032 |
|
Breached!: Why Data Security Law Fails and How to Improve It |
Daniel J. Solove, Woodrow Hartzog |
|
1033 |
|
Internet governance: infrastructure and institutions |
Lee A. Bygrave, Jon Bing (editors) |
|
1034 |
|
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity |
Gregory J. Falco, Eric Rosenbach |
|
1035 |
|
Escalation Dynamics in Cyberspace |
Erica D. Lonergan,Shawn W. Lonergan, |
|
1036 |
|
Escalation Dynamics in Cyberspace |
Erica D. Lonergan, Shawn W. Lonergan |
|
1037 |
|
Semi-State Actors in Cybersecurity |
Florian J. Egloff |
|
1038 |
|
Data Sovereignty: From the Digital Silk Road to the Return of the State |
Anupam Chander (editor), Haochen Sun (editor) |
|
1039 |
|
Cyber Persistence Theory: Redefining National Security in Cyberspace |
Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett |
|
1040 |
|
Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power |
Charles D. Freilich, Matthew S. Cohen, Gabi Siboni |
|
1041 |
|
The Oxford Handbook of Cyber Security |
Paul Cornish (ed.) |
|
1042 |
|
Negotiating Internet Governance |
Roxana Radu |
|
1043 |
|
Cyber War Will Not Take Place |
Thomas Rid |
|
1044 |
|
Lessons From The Identity Trail: Anonymity, Privacy And Identity In A Networked Society [1st Edition] |
Ian Kerr, Carole Lucock, Valerie Steeves |
1 |
1045 |
|
Cybersecurity and Cyberwar: What Everyone Needs to Know® [1 ed.] |
P.W. Singer, Allan Friedman |
1 |
1046 |
|
Cybersecurity and cyberwar : what everyone needs to know |
Singer, Peter Warren, Friedman, Allan |
|
1047 |
|
Cyber-attacks: Effects on UK Companies |
anon. |
|
1048 |
|
Access Control and Identity Management (Information Systems Security & Assurance) [3 ed.] |
Mike Chapple |
3 |
1049 |
|
Advanced persistent threat : understanding the danger and how to protect your organization [1 ed.] |
Cole, Eric |
1 |
1050 |
|
Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies [1st Edition] |
Ira Winkler and Araceli Treu Gomes (Auth.) |
1 |
1051 |
|
Advanced Persistent Threat |
|
|
1052 |
|
Aggressive Network Self-defense [1 ed.] |
Neil R. Wyler, Bruce Potter, Chris Hurley |
1 |
1053 |
|
Aggressive Network Self-Defense [1st ed.] |
Chris Hurley |
1 |
1054 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android |
Hoog, Andrew |
|
1055 |
|
Android Forensics: Investigation, Analysis and Mobile Security for Google Android [1 ed.] |
Andrew Hoog |
1 |
1056 |
|
Antivirus Engines : From Methods to Innovations, Design, and Applications |
Paul A. Gagniuc |
|
1057 |
|
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure [1 ed.] |
Eric D. Knapp, Raj Samani |
1 |
1058 |
|
Applied Network Security Monitoring: Collection, Detection, and Analysis [1 ed.] |
Chris Sanders, Jason Smith |
1 |
1059 |
|
Applied network security monitoring : collection, detection, and analysis |
Chris Sanders, Jason Smith |
|
1060 |
|
AVIEN Malware Defense Guide for the Enterprise |
David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja |
|
1061 |
|
Audio Content Security. Attack Analysis on Audio Watermarking [1 ed.] |
Sogand Ghorbani, Iraj Sadegh Amiri |
1 |
1062 |
|
Black Hat Physical Device Security: Exploiting Hardware and Software [1 ed.] |
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services |
1 |
1063 |
|
Botnets- The Killer Web App |
|
|
1064 |
|
Botnets: The Killer Web App |
Craig Schiller, Jim Binkley, Gadi Evron, Carsten Willems, Tony Bradley, David Harley, Michael Cross |
|
1065 |
|
Buffer Overflow Attacks: Detect, Exploit, Prevent |
James C. Foster &, Vitaly Osipov &, Nish Bhalla,Deckard, Jason |
|
1066 |
|
Building a Practical Information Security Program [1 ed.] |
Jason Andress, Mark Leary |
1 |
1067 |
|
Building an Intelligence-Led Security Program [1 ed.] |
Allan Liska |
1 |
1068 |
|
Buffer Overflow Attacks: Detect, Exploit, Prevent |
James C. Foster |
|
1069 |
|
Building a Practical Information Security Program |
Jason Andress, Mark Leary |
|
1070 |
|
Check Point Next Generation Security Administration [1 ed.] |
Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon |
1 |
1071 |
|
Check Point NGX R65 Security Administration |
Ralph Bonnell |
|
1072 |
|
Check Point™ Next Generation with Application Intelligence Security [1st ed.] |
Chris Tobkin, Daniel Kligerman |
1 |
1073 |
|
Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting [1 ed.] |
Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon |
1 |
1074 |
|
Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting |
|
|
1075 |
|
Check Point NG/AI: Next Generation with Application Intelligence Security Administration [1st ed.] |
Chris Tobkin, Daniel Kligerman |
1 |
1076 |
|
CheckPoint NG Security Administration [2 ed.] |
Dan Kaminsky |
2 |
1077 |
|
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity [1st ed.] |
Dale Liu |
1 |
1078 |
|
CISSP Study Guide [1 ed.] |
Eric Conrad, Seth Misenar, Joshua Feldman |
1 |
1079 |
|
Cisco Security Professional's Guide to Secure Intrusion Detection Systems |
Baumrucker C.T., Burton J.D., Dentler S. |
|
1080 |
|
Cisco Security Professionals Guide To Secure Intrusion Detection Systems Ebook [1 ed.] |
Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky |
1 |
1081 |
|
CISSP® Study Guide [4 ed.] |
Eric Conrad, Seth Misenar, Joshua Feldman |
4 |
1082 |
|
Cisco PIX Firewall Einrichtung und Betrieb einer sicheren Firewall |
|
|
1083 |
|
Cisco security specialist's guide to PIX Firewall [1 ed.] |
Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver |
1 |
1084 |
|
CISSP Study Guide [3rd edition] |
Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman |
3 |
1085 |
|
Client-Side Attacks and Defense [1 ed.] |
Oriyano Sean-Philip, Robert Shimonski |
1 |
1086 |
|
Client-side Attacks and Defense |
Oriyano, Sean-Philip,Shimonski, Robert |
|
1087 |
|
Cisco PIX Firewalls: configure / manage / troubleshoot [2 ed.] |
Charles Riley (Editor) |
2 |
1088 |
|
CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E [3 ed.] |
Ido Dubrawsky, Jeremy Faircloth |
3 |
1089 |
|
Configuring Juniper Networks NetScreen & SSG Firewalls |
Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin |
|
1090 |
|
Configuring SonicWALL firewalls |
Chris Lathem, Daniel H Bendell, Benjamin W Fortenberry, Kevin Lynn, Joshua Reed |
|
1091 |
|
Configuring ISA Server 2000 Building Firewalls for Windows 2000 [1 ed.] |
Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal |
1 |
1092 |
|
Configuring Net: Screen Firewalls [1 ed.] |
Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell and Kenneth Tam (Auth.) |
1 |
1093 |
|
Configuring Sonicwall Firewalls [2 ed.] |
Charles Riley (Editor) |
2 |
1094 |
|
Configuring Check Point NGX VPN-1/FireWall-1 [2 ed.] |
Charles Riley (Editor) |
2 |
1095 |
|
Configuring NetScreen Firewalls [1 ed.] |
Rob Cameron |
1 |
1096 |
|
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation |
Ted G. Lewis |
|
1097 |
|
Cross Site Scripting Attacks [2nd ed.] |
Jay Beale |
2 |
1098 |
|
Cyber adversary characterization : auditing the hacker mind |
Tom Parker, et al |
|
1099 |
|
Cyber Security and IT Infrastructure Protection |
John R. Vacca |
|
1100 |
|
Cyber Security and IT Infrastructure Protection [1 ed.] |
John R. Vacca |
1 |
1101 |
|
Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners [2 ed.] |
Jason Andress and Steve Winterfeld (Auth.) |
2 |
1102 |
|
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners [1 ed.] |
Jason Andress, Steve Winterfeld |
1 |
1103 |
|
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard [1 ed.] |
Brett Shavers |
1 |
1104 |
|
Cyberwarfare: Information Operations in a Connected World [2 ed.] |
Mike Chapple, David Seidl |
2 |
1105 |
|
Cya Securing Exchange Server 2003 & Outlook Web Access |
|
|
1106 |
|
CYA Securing IIS 6.0. Cover Your A** by Getting It Right the First Time |
Chun Hai (Bernard) Cheah, Ken Schaefer and Chris Peiris (Auth.) |
|
1107 |
|
CYA: Securing Exchange Server 2003 & Outlook Web Access [1st ed.] |
Henrik Walther, Patrick Santry |
1 |
1108 |
|
Cyberspaces and Global Affairs |
Perry, Jake, Costigan, Sean S, Professor |
|
1109 |
|
Cyber Security Awareness for Accountants and CPAs [1 ed.] |
David Willson, Henry Dalziel |
1 |
1110 |
|
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives [1st ed.] |
Ted Fair, Michael Nordfelt, Sandra Ring |
1 |
1111 |
|
Cyber Security Awareness for Lawyers [1 ed.] |
David Willson, Henry Dalziel |
1 |
1112 |
|
Cybersecurity and Applied Mathematics [1 ed.] |
Leigh Metcalf, William Casey |
1 |
1113 |
|
Detecting and Combating Malicious Email |
Cade Kamachi, Julie JCH Ryan |
|
1114 |
|
Dictionary of Information Security |
Robert Slade |
|
1115 |
|
Digital Forensics, Investigation, and Response [4 ed.] |
Chuck Easttom |
4 |
1116 |
|
Digital Forensics Processing and Procedures [1 ed.] |
|
1 |
1117 |
|
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data [1 ed.] |
Terrence V. Lillard |
1 |
1118 |
|
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition [Revised] |
Jayson E Street, Kent Nabors, Dustin L. Fritz |
|
1119 |
|
Dissecting the hack the V3rb0ten network [Online-Ausg ed.] |
Baskin, Brian,Martin, Brian,Sims, Kristin,Street, Jayson E |
|
1120 |
|
DNS Security. Defending the Domain Name System [1 ed.] |
Allan Liska, Geoffrey Stowe |
1 |
1121 |
|
Dr Tom Shinder's ISA Server and Beyond : Real World Security Solutions for Microsoft Enterprise Networks |
Syngress |
|
1122 |
|
Dr. Tom Shinder's ISA Server 2006 Migration Guide |
Thomas W Shinder, Debra Littlejohn Shinder, Adrian F. Dimcev, James Eaton-Lee, Jason Jones, Steve Moffat |
|
1123 |
|
Dr. Tom Shinder's ISA Server and Beyond. Real World Security Solutions for Microsoft Enterprise Networks |
M.D. Thomas W. Shinder, Debra Littlejohn Shinder and Martin Grasdal (Auth.) |
|
1124 |
|
Elementary Information Security [2 ed.] |
Richard E. Smith |
2 |
1125 |
|
Elementary Information Security [3 ed.] |
Richard E. Smith |
3 |
1126 |
|
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures [1 ed.] |
Brian Contos, Dave Kleiman |
1 |
1127 |
|
E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets |
Michael R. Overly |
|
1128 |
|
Essential Skills for Hackers [1 ed.] |
Kevin Cardwell, Henry Dalziel |
1 |
1129 |
|
Ethical Hacking: Techniques, Tools, and Countermeasures [4 ed.] |
Michael G. Solomon, Sean-Philip Oriyano |
4 |
1130 |
|
Ethereal Packet Sniffing [1 ed.] |
Syngress |
1 |
1131 |
|
Executing Windows Command Line Investigations. While Ensuring Evidentiary Integrity [1 ed.] |
Chet Hosmer, Joshua Bartolomie, Rosanne Pelli |
1 |
1132 |
|
Firewall policies and VPN configurations |
Anne Henmi, Mark Lucas, Abhishek Singh, Chris Cantrell |
|
1133 |
|
FISMA Certification & Accreditation Handbook [1 ed.] |
Laura P. Taylor, L. Taylor |
1 |
1134 |
|
FISMA Compliance Handbook: Second Edition [1 ed.] |
Laura P. Taylor |
1 |
1135 |
|
FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security |
Stephen D. Gantz and Daniel R. Philpott (Eds.) |
|
1136 |
|
FISMA certification & accreditation handbook |
Laura Taylor, Matthew Shepherd |
|
1137 |
|
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security [1 ed.] |
Stephen D. Gantz, Daniel R. Philpott |
1 |
1138 |
|
Fundamentals of information systems security [3 ed.] |
Kim, David, Solomon, Michael G |
3 |
1139 |
|
GFI Network Security and PCI Compliance Power Tools [1st ed.] |
Brien Posey |
1 |
1140 |
|
Google Hacking for Penetration Testers [3 ed.] |
Johnny Long, Bill Gardner, Justin Brown |
3 |
1141 |
|
Google hacking for penetration testers. / Volume 2 |
Long, Johnny |
|
1142 |
|
Hack Proofing Sun Solaris 8 [1 ed.] |
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress |
1 |
1143 |
|
Hack Proofing Windows 2000 Server |
Syngress, Syngress Publishing, Ryan Russell |
|
1144 |
|
HACK PROOFING XML [1 ed.] |
Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis, Jr. Franklin |
1 |
1145 |
|
Hack Proofing Your E-commerce Site [1 ed.] |
Ryan Russell |
1 |
1146 |
|
Hack Proofing Your Identity [1 ed.] |
Teri Bidwell |
1 |
1147 |
|
Hack proofing your network |
David R Mirza Ahmad, Ryan Russell, et al |
|
1148 |
|
Hack Proofing Your Network: Internet Tradecraft [1 ed.] |
Ryan Russell |
1 |
1149 |
|
Hack proofing your wireless network |
Christian Barnes, Neal O'Farrell, et al |
|
1150 |
|
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network |
Michael Gregg |
|
1151 |
|
Hacking Web Apps: Detecting and Preventing Web Application Security Problems [1 ed.] |
Mike Shema |
1 |
1152 |
|
Hackproofing Your Wireless Network [1 ed.] |
Syngress, Eric Ouellet, Neal O'Farrell |
1 |
1153 |
|
Hacking a Terror Network: The Silent Threat of Covert Channels [1 ed.] |
Ryan Russell |
1 |
1154 |
|
Hack Proofing Your Network [1 ed.] |
Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress |
1 |
1155 |
|
Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems [1 ed.] |
Edward Griffor |
1 |
1156 |
|
HCISPP Study Guide [1 ed.] |
Timothy Virtue, Justin Rainey |
1 |
1157 |
|
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis [1 ed.] |
Bair, John, Shavers, Brett |
1 |
1158 |
|
Host and Network Security for Microsoft, UNIX, and Oracle |
Chris Adams |
|
1159 |
|
How to Cheat at Managing Information Security |
Mark Osborne |
|
1160 |
|
How to cheat at securing your network |
Ido Dubrawsky |
|
1161 |
|
How to Define and Build an Effective Cyber Threat Intelligence Capability [1 ed.] |
Henry Dalziel, Eric Olson, James Carnall |
1 |
1162 |
|
i: Phone and i: OS Forensics. Investigation, Analysis and Mobile Security for Apple i: Phone, i: Pad and i: OS Devices [1 ed.] |
Andrew Hoog And Katie Strzempka (Auth.) |
1 |
1163 |
|
Implementing digital forensic readiness : from reactive to proactive process [1 ed.] |
Ivtchenko, Dmitri, Sachowski, Jason |
1 |
1164 |
|
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems |
Eric Knapp |
|
1165 |
|
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [1 ed.] |
Eric D. Knapp |
1 |
1166 |
|
Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [2 ed.] |
Eric D. Knapp, Joel Thomas Langill |
2 |
1167 |
|
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data [1 ed.] |
Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin |
1 |
1168 |
|
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis |
Mark Talabis, Jason Martin |
|
1169 |
|
Information Security Principles and Practice |
Mark Stamp |
|
1170 |
|
InfoSec Career Hacking Sell Your Skillz, Not Your Soul |
Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley |
|
1171 |
|
InfoSec Career Hacking [1 ed.] |
Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley, James C. Foster, Christopher W. Klaus |
1 |
1172 |
|
InfoSecurity 2008 Threat Analysis [1 ed.] |
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg |
1 |
1173 |
|
Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders |
Susan E. McGregor |
|
1174 |
|
Information Security Illuminated [1 ed.] |
Michael G. Solomon, Mike Chapple |
1 |
1175 |
|
Insider Threat. Protecting the Enterprise from Sabotage, Spying, and Theft |
Eric Cole and Sandra Ring (Auth.) |
|
1176 |
|
Internet and Web Application Security [3 ed.] |
Mike Harwood, Ron Price |
3 |
1177 |
|
Introduction to Information Security. A Strategic-Based Approach [1 ed.] |
Timothy Shimeall and Jonathan Spring (Auth.) |
1 |
1178 |
|
Intrusion Prevention and Active Response [1 ed.] |
Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin |
1 |
1179 |
|
Intrusion Prevention and Active Response. Deploying Network and Host IPS |
Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard and Jake Babbin (Eds.) |
|
1180 |
|
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices [1 ed.] |
Andrew Hoog, Katie Strzempka |
1 |
1181 |
|
JavaScript for hackers: Learn to think like a hacker |
Gareth Heyes |
|
1182 |
|
Legal and Privacy Issues in Information Security |
Grama, Joanna Lyn, |
|
1183 |
|
Legal and Privacy Issues in Information Security [3 ed.] |
Joanna Lyn Grama |
3 |
1184 |
|
Legal Issues in Information Security, 2nd Edition [2 ed.] |
Joanna Lyn Grama |
2 |
1185 |
|
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems [1 ed.] |
Cameron H. Malin, Eoghan Casey BS MA, James M. Aquilina |
1 |
1186 |
|
Managing Cisco Network Security [2 ed.] |
|
2 |
1187 |
|
Managing Information Security [2 ed.] |
John R. Vacca (editor) |
2 |
1188 |
|
Managing Risk in Information Systems, 3rd Edition [3 ed.] |
Darril Gibson, Andy Igonor |
3 |
1189 |
|
Managing Cisco Network Security [1 ed.] |
Florent Parent, Oliver Steudler |
1 |
1190 |
|
Managing Information Security [1 ed.] |
John R. Vacca |
1 |
1191 |
|
Managing Cisco Network Security Building Rock-Solid Networks |
|
|
1192 |
|
MCSE (Exam 70-298) Study Guide. Designing security for a Windows Server 2003 network: Exam 70-298 |
Elias N. Khnaser, Susan Snedaker, Chris Peiris, Rob Amini and Laura E. Hunter (Eds.) |
|
1193 |
|
MCSE Designing Security for a Windows Server 2003 Network [1st ed.] |
Elias Khasner, Laura E. Hunter |
1 |
1194 |
|
MCSE Implementing and Administering Security in a Windows 2000 Network Study Guide [1 ed.] |
Will Schmied, Thomas W. Shinder |
1 |
1195 |
|
Mission Critical Internet Security [1 ed.] |
Bradley Dunsmore |
1 |
1196 |
|
Mobile Security and Privacy. Advances, Challenges and Future Research Directions [1 ed.] |
Man Ho Au, Raymond Choo |
1 |
1197 |
|
Mobile Data Loss: Threats and Countermeasures [1 ed.] |
Michael T. Raggo |
1 |
1198 |
|
Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series) [1 ed.] |
Neil Archibald, Gilbert Ramirez, Noam Rathaus |
1 |
1199 |
|
Network performance and security: testing and analyzing using open source and low-cost tools |
Chapman, Chris |
|
1200 |
|
Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance) [1 ed.] |
J. Stewart |
1 |
1201 |
|
Nessus Network Auditing [1 ed.] |
Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson |
1 |
1202 |
|
Nessus Network Auditing [2 ed.] |
Russ Rogers |
2 |
1203 |
|
Netcat Power Tools [1 ed.] |
Jan Kanclirz, Brian Baskin, Thomas Wilhelm |
1 |
1204 |
|
Netcat Power Tools |
Jan Kanclirz, Brian Baskin, Thomas Wilhelm |
|
1205 |
|
Network and System Security |
John R. Vacca |
|
1206 |
|
Network Security Assessment: From Vulnerability to Patch [1 ed.] |
Steve Manzuik, Andre Gold, Chris Gatford |
1 |
1207 |
|
Network and System Security [2nd Edition] |
John R. Vacca |
2 |
1208 |
|
Network Intrusion Analysis |
|
|
1209 |
|
Network Security, Firewalls, and VPNs, 3rd Edition |
J. Michael Stewart, Denise Kinsey |
|
1210 |
|
Network security firewalls and VPNs [2nd ed.] |
Stewart, James Michael |
2 |
1211 |
|
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques |
Thomas Wilhelm, Jason Andress |
|
1212 |
|
No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing |
Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick |
|
1213 |
|
Nokia Firewall, VPN, and IPSO Configuration Guide |
Andrew Hay, Keli Hay, Peter Giannoulis |
|
1214 |
|
Nmap in the Enterprise: Ваше руководство к сети Сканирование |
Angela Orebaugh, Becky Pinkard |
|
1215 |
|
Nmap in the Enterprise: Your Guide to Network Scanning |
Angela Orebaugh, Becky Pinkard |
|
1216 |
|
Nokia network security : solutions handbook |
Doug Maxwell, Cherie Amon |
|
1217 |
|
Nokia Network Security Solutions Handbook [1 ed.] |
Syngress, Doug Maxwell |
1 |
1218 |
|
OSSEC Host-Based Intrusion Detection Guide |
Andrew Hay, Daniel Cid, Rory Bray |
|
1219 |
|
PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance [4 ed.] |
Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY |
4 |
1220 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [3° ed.] |
Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY. |
3 |
1221 |
|
PCI Compliance |
Bradley T. (ed.) |
|
1222 |
|
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [2 ed.] |
Anton Chuvakin, Branden R. Williams |
2 |
1223 |
|
Perfect Password: Selection, Protection, Authentication |
Mark Burnett |
|
1224 |
|
Perfect Password: Selection, Protection, Authentication [1 ed.] |
Mark Burnett, Dave Kleiman |
1 |
1225 |
|
Perfect Passwords. Selection, Protection, Authentication |
Mark Burnett and Dave Kleiman (Auth.) |
|
1226 |
|
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft [1 ed.] |
Markus Jakobsson, Steven Myers |
1 |
1227 |
|
Phishing Exposed |
Lance James, (Auth.) |
|
1228 |
|
Physical and logical security convergence: powered by enterprise security management [1 ed.] |
Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole |
1 |
1229 |
|
Power and security in the information age: investigating the role of the state in cyberspace [1 ed.] |
Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) |
1 |
1230 |
|
Practical Deployment of Cisco Identity Services Engine [1 ed.] |
Andy Richter, Jeremy Wood |
1 |
1231 |
|
Protecting Patient Information. A Decision-Maker's Guide to Risk, Prevention, and Damage Control [1 ed.] |
Paul Cerrato |
1 |
1232 |
|
Publishing IT Security Project Management Handbook |
|
|
1233 |
|
Research Methods for Cyber Security [1st Edition] |
Thomas Edgar and David Manz (Auth.) |
1 |
1234 |
|
Rogue Code: A Jeff Aiken Novel |
Mark Russinovich |
|
1235 |
|
HACKING: Become The Ultimate Hacker - Computer Virus, Cracking, Malware, IT Security |
Joseph Connor |
|
1236 |
|
Hacking: Hacking for Beginners - Computer Virus, Cracking, Malware, IT Security - 2nd Edition (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security) |
Connor, Joseph |
|
1237 |
|
The little black book of computer viruses Volume 1 |
Mark A. Ludwig |
|
1238 |
|
Scene of the Cybercrime: Computer Forensics Handbook |
Debra Littlejohn Shinder, Ed Tittel (editor) |
|
1239 |
|
Scene of the CyberCrime - Computer Forensics Handbook |
|
|
1240 |
|
Scene of the Cybercrime, Second Edition [2 ed.] |
Debra Littlejohn Shinder, Michael Cross |
2 |
1241 |
|
Scene of the Cybercrime: Computer Forensics Handbook [1 ed.] |
Debra Littlejohn Shinder, Ed Tittel |
1 |
1242 |
|
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century |
Christopher Burgess, Richard Power |
|
1243 |
|
Securing the Smart Grid: Next Generation Power Grid Security |
Tony Flick, Justin Morehouse |
|
1244 |
|
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT |
Eric Seagren |
|
1245 |
|
Securing SQL Server, Third Edition: Protecting Your Database from Attackers [3 ed.] |
Denny Cherry |
3 |
1246 |
|
Securing SQL Server: Protecting Your Database from Attackers [2 ed.] |
Denny Cherry |
2 |
1247 |
|
Securing the Internet of Things [1st Edition] |
Shancang Li and Li Da Xu (Auth.) |
1 |
1248 |
|
Securing VoIP: Keeping Your VoIP Network Safe [1 ed.] |
Regis J. Jr (Bud) Bates |
1 |
1249 |
|
Securing Windows Server 2008: Prevent Attacks from Outside |
Aaron Tiensivu |
|
1250 |
|
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization |
Aaron Tiensivu |
|
1251 |
|
Security Assessment: Case Studies for Implementing the NSA IAM [2 ed.] |
Sean Thurston |
2 |
1252 |
|
Security Assessment [1st ed.] |
Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra |
1 |
1253 |
|
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts |
Derrick Rountree |
|
1254 |
|
Security sage's guide to hardening the network infrastructure |
Steven Andrés, et al |
|
1255 |
|
Security+ study guide |
Michael Cross, Norris L Jr Johnson, Tony Piltzecker, Robert J Shimonski, Debra Littlejohn Shinder |
|
1256 |
|
Security+ Study Guide and DVD Training System [1 ed.] |
Norris L. Johnson, Michael Cross, Tony Piltzecker, Robert J. Shimonski, Debra Littlejohn Shinder |
1 |
1257 |
|
Security+ Study Guide and DVD Training System [1 ed.] |
Norris L. Johnson, Michael Cross, Tony Piltzecker |
1 |
1258 |
|
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks) |
Dan York |
|
1259 |
|
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks) |
Stacy Prowell, Rob Kraus, Mike Borkin |
|
1260 |
|
Seven Deadliest USB Attacks |
Brian Anderson, Barbara Anderson |
|
1261 |
|
Seven Deadliest Wireless Technologies Attacks |
Haines, Brad |
|
1262 |
|
Simple Steps to Data Encryption: A Practical Guide to Secure Computing |
Pete Loshin |
|
1263 |
|
Smart Technologies And The End(s) Of Law: Novel Entanglements Of Law And Technology [1st Edition] |
Mireille Hildebrandt |
1 |
1264 |
|
Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense [1 ed.] |
Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.) |
1 |
1265 |
|
Snort 2.0 Intrusion Detection [1 ed.] |
Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth |
1 |
1266 |
|
Snort 2.1 Intrusion Detection, Second Edition [1 ed.] |
Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin |
1 |
1267 |
|
Snort 2.1 Intrusion Detection [1 ed.] |
Johnny Long, Ed Skoudis, Alrik van Eijkelenborg |
1 |
1268 |
|
Smart Technologies and the End(s) of Law: Novel Entanglements of Law and Technology |
Mireille Hildebrandt |
|
1269 |
|
Snort IDS and IPS Toolkit |
Brian Caswell, Jay Beale, Andrew Baker |
|
1270 |
|
Sniffer Pro Network Optimization and Troubleshooting Handbook [1 ed.] |
Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko |
1 |
1271 |
|
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle [1 ed.] |
Erik Pace Birkholz, Stuart McClure |
1 |
1272 |
|
SQL Injection Attacks and Defense [2 ed.] |
Justin Clarke |
2 |
1273 |
|
SSCP Systems Security Certified Practitioner Study Guide |
Syngress |
|
1274 |
|
SSCP Study Guide [1 ed.] |
Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth |
1 |
1275 |
|
SSCP Systems Security Certified Practitioner Study Guide and DVD Training System [1 ed.] |
Syngress |
1 |
1276 |
|
SSCP : study guide and & DVD training system |
Josh Jacobs |
|
1277 |
|
SQL injection attacks and defense [2nd ed.] |
Clarke, Justin |
2 |
1278 |
|
SQL Injection Attacks and Defense [2nd Edition] |
Justin Clarke, Kevvie Fowler, Erlend Oftedal, Rodrigo Marcos Alvarez |
2 |
1279 |
|
Stealing the Network: How to Own a Continent [1st ed.] |
FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale |
1 |
1280 |
|
Stealing the Network: How to Own a Shadow. The Chase for Knuth |
Johnny Long, Timothy (Thor) Mullen and Ryan Russell (Auth.) |
|
1281 |
|
State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law |
Eliza Watt |
|
1282 |
|
Stealing The Network How To Own A Continent |
|
|
1283 |
|
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD [1 ed.] |
Johnny Long, Ryan Russell, Timothy Mullen |
1 |
1284 |
|
Syngress force emerging threat analysis : from mischief to malicious |
David Maynor, et al |
|
1285 |
|
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious |
Michael Gregg, Brian Baskin |
|
1286 |
|
System Forensics, Investigation, and Response [3rd ed.] |
Chuck Easttom |
3 |
1287 |
|
Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware [1 ed.] |
Aditya Sood and Richard Enbody (Auth.) |
1 |
1288 |
|
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook [Pap/DVD ed.] |
Jack Wiles |
|
1289 |
|
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators |
Wiles J., Long J., Rogers R. |
|
1290 |
|
Techno Security's Guide to Securing SCADA. A Comprehensive Handbook On Protecting The Critical Infrastructure |
Jack Wiles (Auth.) |
|
1291 |
|
Techno Securitys Guide to Managing Risks for IT Managers, Auditors and Investigators |
Jack Wiles, Johnny Long, Russ Rogers, Ron Green |
|
1292 |
|
Terrorism in cyberspace : the next generation |
Weimann, Gabriel |
|
1293 |
|
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online [1 ed.] |
Denny Cherry |
1 |
1294 |
|
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice [1 ed.] |
Jason Andress |
1 |
1295 |
|
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [1 ed.] |
Patrick Engebretson |
1 |
1296 |
|
The Best Damn Firewall Book Period [1 ed.] |
Syngress Media Inc |
1 |
1297 |
|
The Best Damn Firewall Book Period [2 ed.] |
Thomas W Shinder |
2 |
1298 |
|
The Complete Guide to Internet Security [1st ed.] |
Mark S. Merkow Jim Breithaupt |
1 |
1299 |
|
The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age [1st ed.] |
Mark S. Merkow CCP, James Breithaupt |
1 |
1300 |
|
The History of Information Security: A Comprehensive Handbook [1 ed.] |
Karl M. M. de Leeuw, Jan Bergstra, Karl Maria Michael de Leeuw |
1 |
1301 |
|
The international handbook of computer security |
Jae K. Shim |
|
1302 |
|
Trojan Horse: A Jeff Aiken Novel |
Mark Russinovich, Kevin Mitnick |
|
1303 |
|
War: Driving and Wireless Penetration Testing [1 ed.] |
Chris Hurley, Russ Rogers, Frank Thornton, Daniel Connelly and Brian Baker (Auth.) |
1 |
1304 |
|
CISSP Practice Exams [3e edition] |
Harris, Shon |
3 |
1305 |
|
Advanced malware analysis [1 ed.] |
Elisan, Christopher C |
1 |
1306 |
|
CompTIA security+ (exam SY0-401) [4th ed] |
Dunkerley, Dawn, Meyers, Mike, Samuelle, T. J |
4 |
1307 |
|
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments [1 ed.] |
Ric Messier |
1 |
1308 |
|
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) [5th ed.] |
Wm. Arthur Conklin, Gregory White |
5 |
1309 |
|
CompTIA Security+ All-in-One Exam Guide [2 ed.] |
Gregory White, Wm. Arthur Conklin, Dwayne Williams, Roger Davis, Chuck Cothren |
2 |
1310 |
|
CompTIA Security+ (Exam SY0-501) [5 ed.] |
Dawn Dunkerley |
5 |
1311 |
|
Hacking Exposed Linux, 3rd Edition [3 ed.] |
ISECOM |
3 |
1312 |
|
Anti-Hacker Tool Kit [2 ed.] |
Mike Shema, Bradley C. Johnson |
2 |
1313 |
|
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions |
Bodungen, Clint E.,Hilt, Stephen,Shbeeb, Aaron,Singer, Bryan L.,Wilhoit, Kyle |
|
1314 |
|
CompTIA security+ all-in-one exam guide, (Exam SY0-501) [Fifth edition] |
Conklin, W. Arthur,White, Greg,Williams, Dwayne,Cothren, Chuck,Davis, Roger L |
|
1315 |
|
Network Security: A Beginner’s Guide [2 ed.] |
Maiwald, Eric |
2 |
1316 |
|
Anti-Hacker Tool Kit [Fourth edition /] |
Shema, Mike |
|
1317 |
|
Network security: the complete reference |
Bragg, Roberta,Strassberg, Keith,Rhodes-Ousley, Mark |
|
1318 |
|
Securing the Clicks Network Security in the Age of Social Media |
Gary Bahadur, Jason Inasi, Alex de Carvalho |
|
1319 |
|
Network Security: A Beginners Guide |
Eric Maiwald |
|
1320 |
|
Anti-Spam Tool Kit [1 ed.] |
Paul Wolfe, Charlie Scott, Mike Erwin |
1 |
1321 |
|
CompTIA Security+ Certification Practice Exams (Exam SY0-501) [3 ed.] |
Daniel Lachance, Glen E. Clarke |
3 |
1322 |
|
CompTIA Security+ Certification Bundle (Exam SY0-601) |
Glen E. Clarke |
|
1323 |
|
Gray Hat Hacking: The Ethical Hacker’s Handbook [4 ed.] |
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims |
4 |
1324 |
|
The Law and Economics of Cybersecurity |
Mark F. Grady, Francesco Parisi |
|
1325 |
|
Data Analytics for Cybersecurity |
Vandana P. Janeja |
|
1326 |
|
Wireless Internet Security: Architecture and Protocols [1 ed.] |
James Kempf |
1 |
1327 |
|
The Net And The Nation State: Multidisciplinary Perspectives On Internet Governance [1 ed.] |
Uta Kohl |
1 |
1328 |
|
Privacy And Power: A Transatlantic Dialogue In The Shadow Of The NSA-Affair [1 ed.] |
Russell A. Miller |
1 |
1329 |
|
Cyber Security And The Politics Of Time [1st Edition] |
Tim Stevens |
1 |
1330 |
|
Cyber Mercenaries: The State, Hackers, and Power |
Tim Maurer |
|
1331 |
|
Cyber Peace: Charting A Path Toward A Sustainable, Stable, And Secure Cyberspace [1 ed.] |
Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen |
1 |
1332 |
|
Governing New Frontiers In The Information Age: Toward Cyber Peace [1st Edition] |
Scott J. Shackelford |
1 |
1333 |
|
Network Security: A Decision and Game-Theoretic Approach [1 ed.] |
Tansu Alpcan, Tamer Baar |
1 |
1334 |
|
Information Theoretic Security and Privacy of Information Systems [1 ed.] |
Rafael F. Schaefer, Holger Boche, Ashish Khisti, H. Vincent Poor |
1 |
1335 |
|
Hacking exposed, network security secrets and solutions [Notations ed.] |
Joel Scambray |
|
1336 |
|
Wireless security |
Merritt Maxim, David Pollino |
|
1337 |
|
Wi-Fi security |
Miller, Stewart S |
|
1338 |
|
IT Auditing Using Controls to Protect Information Assets, 2nd Edition [2 ed.] |
Chris Davis, Mike Schiller, Kevin Wheeler |
2 |
1339 |
|
IT Auditing: Using Controls to Protect Information Assets [1 ed.] |
Chris Davis, Mike Schiller, Kevin Wheeler |
1 |
1340 |
|
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) |
Jonathan S. Weissman |
|
1341 |
|
IT Auditing Using Controls to Protect Information Assets [3rd ed.] |
Mike Kegerreis,Mike Schiller,Chris Davis |
3 |
1342 |
|
Hacking Exposed: Mobile Security Secrets & Solutions |
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
|
1343 |
|
Certification and Security in Health-Related Web Applications: Concepts and Solutions |
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis |
|
1344 |
|
Medical Device Cybersecurity for Engineers and Manufacturers [2 ed.] |
Axel Wirth |
2 |
1345 |
|
Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT) |
Sunil Gupta, Hitesh Kumar Sharma, Monit Kapoor |
|
1346 |
|
Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States [1 ed.] |
Matthew Webster |
1 |
1347 |
|
Cybersecurity for Connected Medical Devices [1 ed.] |
Arnab Ray |
1 |
1348 |
|
Future Trends in Biomedical and Health Informatics and Cybersecurity in Medical Devices: Proceedings of the International Conference on Biomedical and Health Informatics, ICBHI 2019, 17-20 April 2019, Taipei, Taiwan [1st ed. 2020] |
Kang-Ping Lin, Ratko Magjarevic, Paulo de Carvalho |
1 |
1349 |
|
How HIPAA Can Crush Your Medical Practice: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It |
Craig a Petronella |
|
1350 |
|
Health Data in the Information Age : Use, Disclosure, and Privacy [1 ed.] |
Institute of Medicine, Committee on Regional Health Data Networks, Kathleen N. Lohr, Molla S. Donaldson |
1 |
1351 |
|
Biometrics: Theory, Applications, and Issues : Theory, Applications, and Issues [1 ed.] |
Ellen R. Nichols |
1 |
1352 |
|
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security |
John Medicine |
|
1353 |
|
Decrypting the Encryption Debate: A Framework for Decision Makers [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Law Enforcement and Intelligence Access to Plaintext Information |
1 |
1354 |
|
Recoverability As a First-Class Security Objective: Proceedings of a Workshop [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Frances Johnson |
1 |
1355 |
|
Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Peter J. Weinberger, Baruch Fischhoff, Lynette I. Millett |
1 |
1356 |
|
Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop [1 ed.] |
and Medicine Engineering National Academies of Sciences, Forum on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Johnson |
1 |
1357 |
|
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop [1 ed.] |
and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Planning Committee for a Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext, Jon Eisenberg, Emily Grumbling, Anne Johnson |
1 |
1358 |
|
Hacking AI: Big and Complete Guide to Hacking, Security, AI and Big Data. |
Hans Weber |
|
1359 |
|
AI in Cybersecurity [1 ed.] |
Leslie F. Sikos (editor) |
1 |
1360 |
|
Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies [1 ed.] |
Alessandro Parisi |
1 |
1361 |
|
AI in Cybersecurity |
Leslie F. Sikos (Editor) |
|
1362 |
|
Confluence of AI, Machine, and Deep Learning in Cyber Forensics |
Sanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (editor) |
|
1363 |
|
Cyber defense mechanisms security, privacy, and challenges |
Kumar, Gautam(Editor),Saini, Dinesh Kumar(Editor),Cuong, Nguyen Ha Huy(Editor) |
|
1364 |
|
AI-Enabled Threat Detection and Security Analysis for Industrial IoT |
Hadis Karimipour, Farnaz Derakhshan |
|
1365 |
|
Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications) |
Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Nishan Chelvachandran (editor), Jaime Ibarra (editor) |
|
1366 |
|
Policing In The Era Of AI And Smart Societies [1st Edition] |
Hamid Jahankhani, Babak Akhgar, Peter Cochrane, Mohammad Dastbaz |
1 |
1367 |
|
Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making |
Hamid Jahankhani, Liam M. O’Dell, Gordon Bowen, Daniel Hagan, Arshad Jamal |
|
1368 |
|
AI in the Age of Cyber-Disorder. Actors, Trends, and Prospects |
Fabio Rugge |
|
1369 |
|
The NICE Cyber Security Framework: Cyber Security Management |
Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh |
|
1370 |
|
The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms |
Raj Badhwar |
|
1371 |
|
Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |
Parisi, Alessandro |
|
1372 |
|
Practical AI for Cybersecurity [1 ed.] |
Ravi Das |
1 |
1373 |
|
Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications [1 ed.] |
Gautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor) |
1 |
1374 |
|
Secure and Smart Internet of Things (IoT) Using Blockchain and AI |
Ahmed Banafa |
|
1375 |
|
Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) [1 ed.] |
Gautam Kumar (editor), Dinesh Kumar Saini (editor), Nguyen Ha Huy Cuong (editor) |
1 |
1376 |
|
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence, 1030) |
Nadia Nedjah (editor), Ahmed A. Abd El-Latif (editor), Brij B. Gupta (editor), Luiza M. Mourelle (editor) |
|
1377 |
|
Practical AI for Cybersecurity |
Ravi Das |
|
1378 |
|
Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21 |
Yassine Maleh, Mamoun Alazab, Noreddine Gherabi, Lo’ai Tawalbeh, Ahmed A. Abd El-Latif |
|
1379 |
|
AI, Machine Learning and Deep Learning: A Security Perspective |
Fei Hu, Xiali Hei |
|
1380 |
|
Advanced Computer Science Applications: Recent Trends in AI, Machine Learning, and Network Security [1 ed.] |
Karan Singh (editor), Latha Banda (editor), Manisha Manjul (editor) |
1 |
1381 |
|
Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers |
Chunhua Su, Kouichi Sakurai |
|
1382 |
|
Explainable AI for Cybersecurity [1st ed. 2023] |
Zhixin Pan, Prabhat Mishra |
1 |
1383 |
|
Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022 Matsue, Japan, August 10–12, 2022 Revised Selected Papers |
Chunhua Su, Kouichi Sakurai |
|
1384 |
|
Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things) |
Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor) |
|
1385 |
|
Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies |
Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat |
|
1386 |
|
10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques |
Rajvardhan Oak |
|
1387 |
|
Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing) [1 ed.] |
Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor) |
1 |
1388 |
|
Privacy in the Age of Innovation : AI Solutions for Information Security |
Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala |
|
1389 |
|
Privacy in the Age of Innovation: AI Solutions for Information Security [1 ed.] |
Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala |
1 |
1390 |
|
Emerging Role of AI Based Expert Systems in Cyber Defense and Security |
Kirti Raj Bhatele, Astitwa Bhargava, Anand Jha |
|
1391 |
|
Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments |
Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu |
|
1392 |
|
Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) [1 ed.] |
Ravindra Das |
1 |
1393 |
|
Adversarial AI Attacks, Mitigations, and Defense Strategies [1 ed.] |
John Sotiropoulos |
1 |
1394 |
|
Combating Cyberattacks Targeting the AI Ecosystem |
Aditya K. Sood |
|
1395 |
|
Next-Generation Cybersecurity: AI, ML, and Blockchain (Blockchain Technologies) [2024 ed.] |
Keshav Kaushik (editor), Ishu Sharma (editor) |
2024 |
1396 |
|
AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability [2024 ed.] |
Iqbal H. Sarker |
2024 |
1397 |
|
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills [1 ed.] |
Clint Bodungen |
1 |
1398 |
|
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills |
Clint Bodungen |
|
1399 |
|
AI Embedded Assurance for Cyber Systems |
Cliff Wang, S. S. Iyengar, Kun Sun |
|
1400 |
|
Adaptive Anomalies: AI in Intrusion Detection Systems |
amie Flux |
|
1401 |
|
Mastering AI, Machine Learning and Cyber Security |
Rahul Vadisetty |
|
1402 |
|
Supply Chain Software Security: AI, IoT, and Application Security |
Aamiruddin Syed |
|
1403 |
|
Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions [1 ed.] |
Ahmed A. Abd El-Latif (editor), Lo'ai Tawalbeh (editor), Manoranjan Mohanty (editor), Brij B. Gupta (editor), Konstantinos E. Psannis (editor) |
1 |
1404 |
|
Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions [1 ed.] |
Pethuru Raj (editor), B. Sundaravadivazhagan (editor), V. Kavitha (editor) |
1 |
1405 |
|
Generative AI, Cybersecurity, and Ethics |
Mohammad Rubyet Islam |
|
1406 |
|
AI and Emerging Technologies; Automated Decision-Making, Digital Forensics, and Ethical Considerations |
Purvi Pokhariyal, Archana Patel, Shubham Pandey |
|
1407 |
|
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 |
Hamid Jahankhani |
|
1408 |
|
AI-Driven: Social Media Analytics and Cybersecurity |
Wael M. S. Yafooz, Yousef Al-Gumaei (Eds.) |
|
1409 |
|
Inside Cyber : How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security |
Chuck Brooks |
|
1410 |
|
Safeguarding the Future: Security and Privacy by Design for AI, Metaverse, Blockchain, and Beyond [1 ed.] |
Alan Tang |
1 |
1411 |
|
Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps |
John Sotiropoulos |
|
1412 |
|
Hacking und Cyber Security mit KI: Prompt Engineering, Phishing, Pentesting, IT security uvm. mithilfe von ChatGPT Inkl. vielen Challenges |
Florian Dalwigk |
|
1413 |
|
Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) |
Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) |
|
1414 |
|
Deep Learning Applications for Cyber Security [1st ed. 2019] |
Mamoun Alazab, MingJian Tang |
1 |
1415 |
|
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions |
Marwan Omar |
|
1416 |
|
Hacking Artificial Intelligence: A Leader's Guide from Deepfakes to Breaking Deep Learning [1 ed.] |
Davey Gibian |
1 |
1417 |
|
Malware Analysis Using Artificial Intelligence and Deep Learning |
Mark Stamp, Mamoun Alazab, Andrii Shalaginov |
|
1418 |
|
Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence, 997) [1st ed. 2022] |
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding |
1 |
1419 |
|
Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks) |
Kwangjo Kim, Harry Chandra Tanuwidjaja |
|
1420 |
|
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (SpringerBriefs in Computer Science) |
Marwan Omar |
|
1421 |
|
Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript |
J. D. Glaser |
|
1422 |
|
Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) |
Stanislav Abaimov, Maurizio Martellini |
|
1423 |
|
Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem |
Soma Halder, Sinan Ozdemir |
|
1424 |
|
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python |
Chiheb Chebbi |
|
1425 |
|
Data Mining and Machine Learning in Cybersecurity |
Sumeet Dua, Xian Du |
|
1426 |
|
Data Mining and Machine Learning in Cybersecurity [1 ed.] |
Sumeet Dua, Xian Du |
1 |
1427 |
|
Machine Learning and Cryptographic Solutions for Data Protection and Network Security |
J Anitha Ruth, Vijayalakshmi G V Mahesh, P Visalakshi |
|
1428 |
|
Hands-on Machine Learning for Cyber Security |
Soma Halder |
|
1429 |
|
Machine learning et security: protecting systems with data and algorithms |
Chio, Clarence,Freeman, David |
|
1430 |
|
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings [1 ed.] |
Shlomi Dolev, Sachin Lodha (eds.) |
1 |
1431 |
|
Social Network Forensics, Cyber Security, and Machine Learning [1st ed.] |
P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat |
1 |
1432 |
|
Machine Learning for Cybersecurity Cookbook |
Emmanuel Tsukerman |
|
1433 |
|
Machine learning for computer and cyber security: principles, algorithms, and practices |
Gupta, Brij, Sheng, Quan Z |
|
1434 |
|
Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings [1st ed. 2019] |
Xiaofeng Chen, Xinyi Huang, Jun Zhang |
1 |
1435 |
|
Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python [1 ed.] |
Emmanuel Tsukerman |
1 |
1436 |
|
Introduction to Machine Learning with Applications in Information Security |
Mark Stamp |
|
1437 |
|
Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals |
Zach Codings |
|
1438 |
|
Cyber Security Cryptography and Machine Learning [1st ed.] |
Itai Dinur, Shlomi Dolev, Sachin Lodha |
1 |
1439 |
|
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I [1st ed.] |
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang |
1 |
1440 |
|
Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings [1st ed.] |
Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss |
1 |
1441 |
|
Cyber Security Meets Machine Learning |
Xiaofeng Chen, Willy Susilo, Elisa Bertino |
|
1442 |
|
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III [1st ed.] |
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang |
1 |
1443 |
|
Machine Learning Approaches in Cyber Security Analytics [1 ed.] |
Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel |
1 |
1444 |
|
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II [1st ed.] |
Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang |
1 |
1445 |
|
Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings |
Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann |
|
1446 |
|
Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] |
Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) |
1 |
1447 |
|
Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings (Communications in Computer and Information Science) |
Gang Wang (editor), Arridhana Ciptadi (editor), Ali Ahmadzadeh (editor) |
|
1448 |
|
Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) [1st ed. 2022] |
Stanislav Abaimov, Maurizio Martellini |
1 |
1449 |
|
Machine Learning for Cyber Security |
Preeti Malik, Lata Nautiyal, Mangey Ram |
|
1450 |
|
Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301) [1st ed. 2022] |
Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor) |
1 |
1451 |
|
Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks) |
Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li |
|
1452 |
|
Introduction to Machine Learning with Applications in Information Security [2 ed.] |
Mark Stamp |
2 |
1453 |
|
Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part I |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
1454 |
|
Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them |
Ram Shankar, Siva Kumar, Hyrum Anderson |
|
1455 |
|
Machine Learning, Image Processing, Network Security and Data Sciences. 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings [Part II] |
Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni |
|
1456 |
|
Machine Learning Techniques for Cybersecurity |
Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub |
|
1457 |
|
Machine Learning for Cyber Security |
Preeti Malik (editor), Lata Nautiyal (editor), Mangey Ram (editor) |
|
1458 |
|
Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings |
Shlomi Dolev, Jonathan Katz, Amnon Meisels |
|
1459 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on MIND 2021 |
Rajesh Doriya, Badal Soni, Anupam Shukla, Xiao-Zhi Gao |
|
1460 |
|
Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part I |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
1461 |
|
Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
1462 |
|
Machine Learning under Malware Attack |
Raphael Labaca-Castro |
|
1463 |
|
Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part III] |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
1464 |
|
Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part II] |
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li |
|
1465 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings, Part II |
Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni |
|
1466 |
|
Not with a Bug, But with a Sticker : Attacks on Machine Learning Systems and What To Do About Them |
Ram Shankar Siva Kumar, Hyrum Anderson |
|
1467 |
|
10 Machine Learning Blueprints You Should Know for Cybersecurity [1 ed.] |
Rajvardhan Oak |
1 |
1468 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, Proceedings, Part II |
Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni |
|
1469 |
|
Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, ... in Computer and Information Science) |
Nilay Khare (editor), Deepak Singh Tomar (editor), Mitul Kumar Ahirwal (editor), Vijay Bhaskar Semwal (editor), Vaibhav Soni (editor) |
|
1470 |
|
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems) |
Bimal Kumar Roy (editor), Atul Chaturvedi (editor), Boaz Tsaban (editor), Sartaj Ul Hasan (editor) |
|
1471 |
|
Autorschaftserkennung und Verstellungsstrategien: Textanalysen und -vergleiche im Spektrum forensischer Linguistik, Informationssicherheit und Machine-Learning |
Steffen Hessler |
|
1472 |
|
Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security |
Arun Kumar Rana, Rashmi Gupta, Sharad Sharma, Ahmed A. Elngar, Sachin Dhawan |
|
1473 |
|
Intelligent Systems Modeling and Simulation III: Artificial Intelligent, Machine Learning, Intelligent Functions and Cyber Security |
Samsul Ariffin, Abdul Karim |
|
1474 |
|
Python Web Penetration Testing Cookbook |
Buchanan C., Ip T., Mabbitt A. et al. |
|
1475 |
|
Python Penetration Testing Essentials |
Mohit Raj. |
|
1476 |
|
Gray Hat Python - Python Programming for Hackers and Reverse Engineers |
|
|
1477 |
|
Python Ethical Hacking from Scratch |
Fahad Ali Sarwar |
|
1478 |
|
Cyber Security: Python for Penetration Testing |
Travis Czech |
|
1479 |
|
Ethical Hacking with Python - Build your own Hacking Scripts and Tools with Python from Scratch |
Abdeladim Fadheli |
|
1480 |
|
Python for Cybersecurity |
Howard E. Poston lll |
|
1481 |
|
Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker Attacks |
Alan Grid |
|
1482 |
|
The secret of bug hunting. Bug bounty automation with python |
Syed Abuthahir |
|
1483 |
|
Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python [1 ed.] |
Bastian Ballmann (auth.) |
1 |
1484 |
|
Understanding Network Hacks: Attack and Defense with Python [1 ed.] |
Bastian Ballmann (auth.) |
1 |
1485 |
|
Understanding Network Hacks Attack and Defense with Python [Softcover reprint of the original 1st ed. 2015] |
Bastian Ballmann |
1 |
1486 |
|
Hacking: Hacking With Python - The Complete Beginner's Course to Learn Ethical Hacking With Python in 7 Clear-Cut Lessons - Including Dozens of Practical Examples & Exercises (Hacking Series Book 1) |
Alphy Books, Hacking |
|
1487 |
|
Effective Python Penetration Testing |
Rejah Rehim |
|
1488 |
|
Beginning Ethical Hacking with Python [1 ed.] |
Sanjib Sinha (auth.) |
1 |
1489 |
|
Python and Hacking Made Simple: Full Beginners Bundle To Master Python & Hacking |
Project Syntax |
|
1490 |
|
Python Digital Forensics Cookbook |
Preston Miller, Chapin Bryce |
|
1491 |
|
Python Penetration Testing Cookbook: Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation [1st edition] |
Rehim, Rejah |
1 |
1492 |
|
Hacking with Python: Beginner's Guide to Ethical Hacking, Basic Security, Penetration Testing, and Python Hacking |
Lane, Evan |
|
1493 |
|
Python Penetration Testing Essentials: Techniques for ethical hacking with Python [2nd Edition] |
Raj, Mohit |
2 |
1494 |
|
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python |
Hussam Khrais |
|
1495 |
|
Python for Offensive PenTest: A Complete Practical Guide to Ethical Hacking and Penetration Testing Using Python |
Hussam Khrais |
|
1496 |
|
Hands-On Penetration Testing with Python Enhance your ethical hacking skills to build automated and intelligent systems |
Furqan Khan |
|
1497 |
|
Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems |
Khan, Furqan |
|
1498 |
|
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition [2 ed.] |
Preston Miller, Chapin Bryce |
2 |
1499 |
|
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition. Code |
Preston Miller, Chapin Bryce |
|
1500 |
|
Python for Beginners : An Essential Guide to Easy Learning with Basic Exercises : Python programming Crash Course for Data Analysis and for Beginner Hackers |
Walsh, Conley |
|
1501 |
|
COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing |
Mach, Dylan |
|
1502 |
|
COMPUTER PROGRAMMING 4 Books In 1: Data Science, Hacking with Kali Linux, Computer Networking for Beginners, Python Programming |
Jason Callaway |
|
1503 |
|
COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing |
Dylan Mach |
|
1504 |
|
Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 [2. Aufl.] |
Bastian Ballmann |
2 |
1505 |
|
LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERS |
DARWIN, TYE |
|
1506 |
|
Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 |
Bastian Ballmann |
|
1507 |
|
Understanding Network Hacks: Attack and Defense with Python 3 [2 ed.] |
Bastian Ballmann |
2 |
1508 |
|
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity |
Grid, Alan |
|
1509 |
|
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware |
Fahad Ali Sarwar |
|
1510 |
|
Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition [2 ed.] |
Bastian Ballmann |
2 |
1511 |
|
Understanding Network Hacks: Attack and Defense with Python 3 [2nd ed. 2021] |
Bastian Ballmann |
2 |
1512 |
|
Python for Cybersecurity: Using Python for Cyber Offense and Defense |
Howard E Poston |
|
1513 |
|
Python for Cybersecurity: Using Python for Cyber Offense and Defense [1 ed.] |
Howard E. Poston |
1 |
1514 |
|
Python for Cybersecurity: Using Python for Cyber Offense and Defense |
Howard E. Poston III |
|
1515 |
|
Black Hat Python, 2nd Edition |
Justin Seitz, Tim Arnold |
|
1516 |
|
Python for OSINT. 21 day course for beginners [First ed.] |
cyb_detective |
|
1517 |
|
Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python |
Tony Snake |
|
1518 |
|
Top 10 Hacking Scripts in Python, C#, and ASP.NET: 2 Books in 1 |
Devwebtuts Publishing |
|
1519 |
|
Mastering Computer Programming: A Comprehensive Guide to Python, C, C++, C#, HTML Coding, and Ethical Hacking |
Kameron Hussain, Frahaan Hussain |
|
1520 |
|
Learn Penetration Testing with Python 3.x : An ethical hacker’s blueprint for offensive security [2 ed.] |
Yehia Elghaly |
2 |
1521 |
|
Ethical Hacking with Python: Developing Cybersecurity Tools |
Nate Phoetean |
|
1522 |
|
Python For Cybersecurity : Securing Systems And Networks With Python Programming |
Jackson, Marley |
|
1523 |
|
Python Programming For Cybersecurity With PyShark And Cryptography: A Hands-On Beginner's Guide To Leveraging PyShark for Network Traffic Analysis and Cryptography for Secure Communication |
Caldwell, Alex |
|
1524 |
|
Master Python Cybersecurity 2024 |
Rodrigues, Diego |
|
1525 |
|
Java 2 network security |
Marco Pistoia, International Business Machines Corporation., et al |
|
1526 |
|
Java 2 Network Security [2nd ed.] |
Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani |
2 |
1527 |
|
Cryptography for Internet and database applications: developing secret and public key techniques with Java [1st ed.] |
Nick Galbreath |
1 |
1528 |
|
The Decision to Attack: Military and Intelligence Cyber Decision-Making |
Brantly Aaron Franklin, Keller William. |
|
1529 |
|
The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You |
Matherly John. |
|
1530 |
|
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense |
Jean Nestor M. Dahj |
|
1531 |
|
Cyber Security Intelligence and Analytics |
Zheng Xu |
|
1532 |
|
Romanian Intelligence Service - OSINT Handbook |
|
|
1533 |
|
Intelligence-Driven Incident Response: Outwitting the Adversary |
Brown, Roberts |
|
1534 |
|
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks |
Aditya K. Sood PhD |
|
1535 |
|
Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT [1 ed.] |
Rajdeep Chowdhury |
1 |
1536 |
|
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques |
Vinny Troia |
|
1537 |
|
Dark Web and Deep Web Intelligence |
Schuster Louis |
|
1538 |
|
Check Point Advanced Technical Reference Guide NG with Application Intelligence |
|
|
1539 |
|
Intelligent Multimedia Data Hiding: New Directions [1 ed.] |
Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain, Wai-Chi Fang |
1 |
1540 |
|
Intelligence and Security Informatics: Techniques and Applications [1 ed.] |
Bhavani Thuraisingham (auth.), Hsinchun Chen, Christopher C. Yang (eds.) |
1 |
1541 |
|
Intelligence and Security Informatics: IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Lecture Notes in Computer Science, 5075) |
Christopher C. Yang (editor), Hsinchun Chen (editor), Michael Chau (editor), Kuiyu Chang (editor), Sheau-Dong Lang (editor), Patrick Chen (editor), Raymond Hsieh (editor), Daniel Zeng (editor), Fei-Yue Wang (editor), Kathleen M. Carley (editor), Wenji Mao (editor), Justin Zhan (editor) |
|
1542 |
|
Safeguards in a world of ambient intelligence [1. softcover print ed.] |
Wright, David,Vildjiounaite, Elena,Gutwirth, Serge,Punie, Yves,Friedewald, Michael |
1 |
1543 |
|
Internet searches for vetting, investigations, and open-source intelligence [1 ed.] |
Edward J. Appel |
1 |
1544 |
|
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System [1 ed.] |
Álvaro Herrero, Emilio Corchado (auth.) |
1 |
1545 |
|
Chaos-Based Cryptography: Theory,Algorithms and Applications [1 ed.] |
Dimitar Solev, Predrag Janjic, Ljupco Kocarev (auth.), Ljupco Kocarev, Shiguo Lian (eds.) |
1 |
1546 |
|
Enabling Open Source Intelligence (OSINT) in Private Social Networks [12347] |
Benjamin Robert Holland |
12347 |
1547 |
|
Verification of security intelligence for a resilient SCADA system |
Sumit Chakraborty |
|
1548 |
|
Risk Assessment and Management in the Networked Economy [1 ed.] |
Omar K. Hussain, Tharam S. Dillon, Farookh K. Hussain, Elizabeth J. Chang (auth.) |
1 |
1549 |
|
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings [1 ed.] |
Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang (eds.) |
1 |
1550 |
|
Open Source Intelligence in a Networked World |
Anthony Olcott |
|
1551 |
|
Intelligent Methods for Cyber Warfare [1 ed.] |
Ronald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.) |
1 |
1552 |
|
Cybercrime, Digital Forensics and Jurisdiction [1 ed.] |
Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.) |
1 |
1553 |
|
Advanced Research in Data Privacy [1 ed.] |
Guillermo Navarro-Arribas, Vicenç Torra (eds.) |
1 |
1554 |
|
(OSINT) Open Source Intelligence Glossary: Guide to keywords, phrases for improved Internet research results |
Nicholas Crowder |
|
1555 |
|
The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You |
Matherly, John |
|
1556 |
|
Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges |
Qing Li, Gregory Clark |
|
1557 |
|
The Tao of Open Source Intelligence |
IT Governance Publishing |
|
1558 |
|
Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks |
Claude Fachkha |
|
1559 |
|
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 [1 ed.] |
Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) |
1 |
1560 |
|
Hacking : The Ultimate Hacking for Beginners : How to Hack : Hacking Intelligence : Certified Hacking Book |
kevin smith |
|
1561 |
|
(OSINT) Open Source Intelligence Glossary Volume I: Guide to Keywords, Phrases for Improved Internet Research Results [1] |
Nicholas Crowder |
1 |
1562 |
|
Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach [1 ed.] |
Roman Gumzej (auth.) |
1 |
1563 |
|
The Tao of Open Source Intelligence [1 ed.] |
Stewart K. Bertram |
1 |
1564 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [5 ed.] |
Michael Bazzell |
5 |
1565 |
|
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level [1 ed.] |
Florian Skopik |
1 |
1566 |
|
Introduction to Artificial Intelligence for Security Professionals [1 ed.] |
The Cylance Data Science Team |
1 |
1567 |
|
Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings [1 ed.] |
G. Alan Wang, Michael Chau, Hsinchun Chen (eds.) |
1 |
1568 |
|
Darkweb cyber threat intelligence mining |
Robertson, John |
|
1569 |
|
Information Fusion for Cyber-Security Analytics |
Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George |
|
1570 |
|
Intelligence-driven incident response outwitting the adversary [First edition] |
Brown, Rebekah,Roberts, Scott J |
|
1571 |
|
Intelligence-driven incident response: outwitting the adversary [First edition] |
Roberts, Scott J,Brown, Rebekah,Maxwell, Kyle R |
|
1572 |
|
Cyber Security for Cyber Physical Systems [1 ed.] |
Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) |
1 |
1573 |
|
Information Fusion for Cyber-Security Analytics [1st edition] |
Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George |
1 |
1574 |
|
Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level [1 ed.] |
Florian Skopik |
1 |
1575 |
|
International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence [1 ed.] |
Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) |
1 |
1576 |
|
Artificial Intelligence Tools for Cyber Attribution |
Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef |
|
1577 |
|
Artificial Intelligence Tools for Cyber Attribution [1 ed.] |
Eric Nunes,Paulo Shakarian,Gerardo I. Simari,Andrew Ruef (auth.) |
1 |
1578 |
|
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection |
Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela |
|
1579 |
|
Cyber Threat Intelligence [1st ed.] |
Ali Dehghantanha, Mauro Conti, Tooska Dargahi |
1 |
1580 |
|
Digital Defence: Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics |
Kumar, Ahlad, Kumar Chaudhary, Naveen, Shastri, Apoorva S., Singh, Mangal, Kulkarni, Dr Anand J. |
|
1581 |
|
Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (River Publishers Series in Digital Security and Forensics) [1 ed.] |
Akansha Singh (editor), Krishna Kant Singh (editor) |
1 |
1582 |
|
The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity. |
M. A. Jabbar, Sanju Tiwari, Subhendu Kumar Pani, Stephen Huang |
|
1583 |
|
Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117) |
Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor) |
|
1584 |
|
Open Source Intelligence (OSINT) — A Practical Introduction: A Field Manual |
Varin Khera, Anand R. Prasad, Suksit Kwanoran |
|
1585 |
|
Advanced OSINT Strategies: Online Investigations and Intelligence Gathering |
Rob Botwright |
|
1586 |
|
Mathematics of Computer Science, Cybersecurity and Artificial Intelligence |
Cheikh Thiecoumba Gueye, Papa Ngom, Idy Diop (Eds.) |
|
1587 |
|
Network Security Empowered by Artificial Intelligence |
Yingying Chen, Jie Wu, Paul Yu, Xiaogang Wang |
|
1588 |
|
Advanced Techniques of Artificial Intelligence in IT Security Systems (Studies in Big Data, 146) [1st ed. 2024] |
Marcin Korytkowski |
1 |
1589 |
|
Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications) [2024 ed.] |
Hamid Jahankhani (editor), Gordon Bowen (editor), Mhd Saeed Sharif (editor), Osama Hussien (editor) |
2024 |
1590 |
|
Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107) [2024 ed.] |
Yingying Chen (editor), Jie Wu (editor), Paul Yu (editor), Xiaogang Wang (editor) |
2024 |
1591 |
|
Artificial Intelligence for Cyber-Physical Systems Hardening |
Issa Traore, Isaac Woungang, Sherif Saad |
|
1592 |
|
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection [1 ed.] |
Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) |
1 |
1593 |
|
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons |
Erendor, Mehmet Emin |
|
1594 |
|
Computational Intelligence Applications in Cyber Security [1 ed.] |
Suhel Ahmad Khan (editor), Mohammad Faisal (editor), Nawaf Alharbe (editor), Rajeev Kumar (editor), Raees Ahmad Khan (editor) |
1 |
1595 |
|
Deep Dive : Exploring the Real‐world Value of Open Source Intelligence |
Rae Baker |
|
1596 |
|
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence [1 ed.] |
Youssef Baddi (editor), Mohammed Amin Almaiah (editor), Omar Almomani (editor), Yassine Maleh (editor) |
1 |
1597 |
|
Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics [1 ed.] |
Adam Tilmar Jakobsen |
1 |
1598 |
|
Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities |
Sharma, Smita, Thirumalaisamy, Manikandan, Balusamy, Balamurugan, Chilamkurti, Naveen |
|
1599 |
|
Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 |
Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman |
|
1600 |
|
Artificial Intelligence and Cyber Security in Industry 4.0 |
Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi |
|
1601 |
|
Artificial Intelligence and Cybersecurity. Theory and Applications |
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen |
|
1602 |
|
Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications |
Ouaissa, Mariya, Ouaissa, Mariyam, Boulouard, Zakaria, Kumar, Abhishek |
|
1603 |
|
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security, 101) [1st ed. 2023] |
Reza Montasari |
1 |
1604 |
|
The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense |
Donnie W. Wendt |
|
1605 |
|
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics |
Izzat Alsmadi |
|
1606 |
|
The OSINT Codebook: Cracking Open Source Intelligence Strategies |
Alexandre DeGarmo |
|
1607 |
|
Deep Dive: Exploring the Real-world Value of Open Source Intelligence [1 ed.] |
Rae L. Baker |
1 |
1608 |
|
Kids Cybersecurity Using Computational Intelligence Techniques |
Wael Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara |
|
1609 |
|
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 |
Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang |
|
1610 |
|
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2 |
Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang |
|
1611 |
|
Computational Intelligence for Cybersecurity Management and Applications [1 ed.] |
Yassine Maleh (editor), Mamoun Alazab (editor), Soufyane Mounir (editor) |
1 |
1612 |
|
Intelligence-Driven Incident Response [2 ed.] |
Rebekah Brown and Scott J. Roberts |
2 |
1613 |
|
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [2 ed.] |
Izzat Alsmadi |
2 |
1614 |
|
Cyber Threat Intelligence |
Martin Lee |
|
1615 |
|
International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th ... (Lecture Notes in Networks and Systems, 748) |
Pablo García Bringas (editor), Hilde Pérez García (editor), Francisco Javier Martínez de Pisón (editor), Francisco Martínez Álvarez (editor), Alicia Troncoso Lora (editor), Álvaro Herrero (editor), José Luis Calvo Rolle (editor), Héctor Quintián (editor), Emilio Corchado (editor) |
|
1616 |
|
Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography |
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam |
|
1617 |
|
Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 |
Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman |
|
1618 |
|
Cyber Threat Intelligence [1 ed.] |
Martin Lee |
1 |
1619 |
|
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks [2 ed.] |
Aditya K. Sood PhD |
2 |
1620 |
|
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks, 2nd Edition [2 ed.] |
Aditya K. Sood |
2 |
1621 |
|
Dancho Danchev's Cyber Intelligence Cybercrime Research Memoir Second Edition [2 ed.] |
Dancho Danchev |
2 |
1622 |
|
The OSINT Codebook : Cracking Open Source Intelligence Strategies |
Alexandre DeGarmo |
|
1623 |
|
Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications |
Ahmed A. Abd El-Latif, Mohammed Adel Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk |
|
1624 |
|
Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting |
Roberto Martinez |
|
1625 |
|
Artificial Intelligence and Blockchain in Digital Forensics (River Publishers Series in Digital Security and Forensics) [1 ed.] |
P. Karthikeyan (editor), Hari Mohan Pande (editor), Velliangiri Sarveshwaran (editor) |
1 |
1626 |
|
Open Source Intelligence 101 : From Novice to Expert |
Lyam Arnaud |
|
1627 |
|
Artificial Intelligence for Intrusion Detection Systems |
Mayank Swarnkar, Shyam Singh Rajput |
|
1628 |
|
Advancing Computational Intelligence Techniques for Security Systems Design |
Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan |
|
1629 |
|
Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) [1st ed. 2022] |
Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) |
1 |
1630 |
|
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers |
Thomas Roccia |
|
1631 |
|
The OSINT Codebook: Cracking Open Source Intelligence Strategies [1 ed.] |
Alexandre DeGarmo |
1 |
1632 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [9 ed.] |
Michael Bazzell |
9 |
1633 |
|
Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) [1 ed.] |
Ishaani Priyadarshini (editor), Rohit Sharma (editor) |
1 |
1634 |
|
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs |
Kyle Wilhoit, Joseph Opacki |
|
1635 |
|
Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies, 109) [1st ed. 2022] |
Sanjay Misra (editor), Chamundeswari Arumugam (editor) |
1 |
1636 |
|
Finding Beacons in the Dark [1 ed.] |
BlackBerry Research and Intelligence Team |
1 |
1637 |
|
Cybersecurity for Artificial Intelligence |
Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo, Fabio Di Troia |
|
1638 |
|
Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007) |
Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor) |
|
1639 |
|
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices |
Dr. Erdal Ozkaya |
|
1640 |
|
Big Data Analytics and Computational Intelligence for Cybersecurity |
Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar |
|
1641 |
|
Mastering Cyber Intelligence |
Jean Nestor M. Dahj, |
|
1642 |
|
Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT |
Rajdeep Chowdhury, S. K. Niranjan |
|
1643 |
|
Artificial Intelligence and Cybersecurity: Theory and Applications |
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen |
|
1644 |
|
The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program [4 ed.] |
CyberEdge Group, LLC |
4 |
1645 |
|
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics |
Jena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar |
|
1646 |
|
Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) |
Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) |
|
1647 |
|
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631) |
Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor) |
|
1648 |
|
Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123) |
Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor) |
|
1649 |
|
Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies) |
Sanjay Misra (editor), Chamundeswari Arumugam (editor) |
|
1650 |
|
Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity (The Human Element in Smart and Intelligent Systems) [1 ed.] |
Abbas Moallem (editor) |
1 |
1651 |
|
Artificial Intelligence and Blockchain for Future Cybersecurity Applications (Studies in Big Data, 90) [1st ed. 2021] |
Yassine Maleh (editor), Youssef Baddi (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor) |
1 |
1652 |
|
Artificial Intelligence for Cybersecurity (Advances in Information Security, 54) [1st ed. 2022] |
Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) |
1 |
1653 |
|
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools [1 ed.] |
Valentina Palacín |
1 |
1654 |
|
Machine Intelligence and Big Data Analytics for Cybersecurity Applications |
Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi |
|
1655 |
|
Practical Threat Intelligence and Data-Driven Threat Hunting |
Valentina Palacin |
|
1656 |
|
Offensive Intelligence: 300 Techniques, Tools and Tips to Know Everything [2 ed.] |
Philippe Dylewski |
2 |
1657 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [8, 8 ed.] |
Michael Bazzell |
8 |
1658 |
|
Artificial Intelligence and Blockchain for Future Cybersecurity Applications [1 ed.] |
Yassine Maleh, Youssef Baddi, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani |
1 |
1659 |
|
Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) |
Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop |
|
1660 |
|
Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler |
Ravi Devarasetty |
|
1661 |
|
Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence, 978) |
Madhusudan Singh |
|
1662 |
|
Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) [1st ed. 2022] |
Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop |
1 |
1663 |
|
Offensive Intelligence: 300 techniques, tools and tips to know everything about everyone, in companies and elsewhere |
Philippe Dylewski |
|
1664 |
|
Cyber Security Intelligence and Analytics [1st ed.] |
Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh |
1 |
1665 |
|
Cyber Intelligence: Actors, Policies, Practices |
Constance S. Uthoff |
|
1666 |
|
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147) [1 ed.] |
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) |
1 |
1667 |
|
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction (SpringerBriefs in Computer Science) |
Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
|
1668 |
|
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities [1st ed. 2021] |
Sanjay Misra (editor), Amit Kumar Tyagi (editor) |
1 |
1669 |
|
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities [1 ed.] |
Sanjay Misra (editor), Amit Kumar Tyagi (editor) |
1 |
1670 |
|
Cyber Security, Artificial Intelligence, Data Protection & the Law |
Robert Walters, Marko Novak |
|
1671 |
|
Artificial Intelligence, Cybersecurity and Cyber Defence |
Daniel Ventre |
|
1672 |
|
2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) ... and Communications Technologies, 81) |
Jemal Abawajy (editor), Zheng Xu (editor), Mohammed Atiquzzaman (editor), Xiaolu Zhang (editor) |
|
1673 |
|
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques [1 ed.] |
Vinny Troia |
1 |
1674 |
|
Artificial Intelligence, Cybersecurity and Cyber Defence Book |
Daniel Ventre |
|
1675 |
|
Open Source Intelligence and Cyber Crime: Social Media Analytics [1st ed.] |
Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn |
1 |
1676 |
|
Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II [1st ed.] |
Xingming Sun, Jinwei Wang, Elisa Bertino |
1 |
1677 |
|
Combating Security Challenges in the Age of Big Data: Powered by State-of-the-Art Artificial Intelligence Techniques [1st ed.] |
Zubair Md. Fadlullah, Al-Sakib Khan Pathan |
1 |
1678 |
|
Data Science In Cybersecurity And Cyberthreat Intelligence [1st Edition] |
Leslie F. Sikos, Kim-Kwang Raymond Choo |
1 |
1679 |
|
Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I [1st ed.] |
Xingming Sun, Jinwei Wang, Elisa Bertino |
1 |
1680 |
|
Artificial Intelligence, Cybersecurity and Cyber Defence [1 ed.] |
Daniel Ventre |
1 |
1681 |
|
Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [1st ed.] |
Xingming Sun, Zhaoqing Pan, Elisa Bertino |
1 |
1682 |
|
Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part II [1st ed. 2019] |
Huansheng Ning |
1 |
1683 |
|
Artificial Intelligence and Global Security: Future Trends, Threats and Considerations |
Yvonne R. Masakowski |
|
1684 |
|
The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research |
Open Source Researchers |
|
1685 |
|
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146) |
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) |
|
1686 |
|
Artificial Intelligence and Security Challenges in Emerging Networks (Advances in Computational Intelligence and Robotics) [1 ed.] |
Ryma Abassi (editor) |
1 |
1687 |
|
Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources |
US Department of Justice |
|
1688 |
|
Cyber-Enabled Intelligence [1 ed.] |
Huansheng Ning (Editor), Liming Chen (Editor), Ata Ullah (Editor), Xiong Luo (Editor) |
1 |
1689 |
|
Artificial Intelligence, Cybersecurity and Cyber Defence [2] |
Daniel Ventre |
2 |
1690 |
|
The Threat Intelligence Handbook [2 ed.] |
Christopher Ahlberg |
2 |
1691 |
|
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [1st ed.] |
Izzat Alsmadi |
1 |
1692 |
|
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147) |
Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) |
|
1693 |
|
The Threat Intelligence Handbook [ebook ed.] |
Chris Pace (ed.) |
|
1694 |
|
Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202 |
Richard Medlin, Nitin Sharma, Justin Casey |
|
1695 |
|
The decision to attack: military and intelligence cyber decision-making [Paperback edition] |
Brantly, Aaron Franklin |
|
1696 |
|
Practical cyber intelligence how action-based intelligence can be an effective response to incidents |
Wilson Bautista Jr |
|
1697 |
|
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and Intelligence [1st ed.] |
Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman |
1 |
1698 |
|
Open Source (OSINT) Intelligence Gathering and Analysis - SANS SEC487 |
Micah Hoffman |
|
1699 |
|
Big Data Security |
Shibakali Gupta (editor), Indradip Banerjee (editor), Siddhartha Bhattacharyya (editor) |
|
1700 |
|
Practical cyber intelligence how action-based intelligence can be an effective response to incidents |
Wilson Bautista Jr |
|
1701 |
|
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents [Paperback ed.] |
Wilson Bautista |
|
1702 |
|
Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks) [1st ed. 2018] |
Darren Quick, Kim-Kwang Raymond Choo |
1 |
1703 |
|
Open Source Intelligence Techniques: Resources For Searching And Analyzing Online Information 6th Edition [6 ed.] |
Michael Bazzell |
6 |
1704 |
|
Cyber terrorism: a guide for facility managers [1 ed.] |
Gustin, Joseph F |
1 |
1705 |
|
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) [1 ed.] |
Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko |
1 |
1706 |
|
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004 [1 ed.] |
Andrzej Białas (auth.), Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko (eds.) |
1 |
1707 |
|
Mathematics in cyber research |
Paul L. Goethals (editor), Natalie Michele Scala (editor), Daniel T. Bennett (editor) |
|
1708 |
|
A Multidisciplinary Introduction to Information Security |
Mjolsnes, Stig F. |
|
1709 |
|
A Multidisciplinary Introduction to Information Security |
Stig F. Mjolsnes |
|
1710 |
|
Modern Cryptography Applied Mathematics for Encryption and Information Security |
William Easttom |
|
1711 |
|
Modern Cryptograph.y Applied Mathematics for Encryption and Information Security [2 ed.] |
Chuck Easttom |
2 |
1712 |
|
Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology [1 ed.] |
Nicholas J. Daras, Themistocles M. Rassias (eds.) |
1 |
1713 |
|
Mathematics in Cyber Research |
Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett |
|
1714 |
|
Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology [1st ed.] |
Nicholas J. Daras, Themistocles M. Rassias (eds.) |
1 |
1715 |
|
A Human Readable Guide to Cyber Security |
Christian, Dane |
|
1716 |
|
Analyzing Human Behavior In Cyberspace |
Zheng Yan |
|
1717 |
|
Advances in Human Factors in Cybersecurity [1st ed.] |
Tareq Z. Ahram, Denise Nicholson |
1 |
1718 |
|
Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA [1st ed.] |
Isabella Corradini, Enrico Nardelli, Tareq Ahram |
1 |
1719 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA [1st ed.] |
Tareq Ahram, Waldemar Karwowski |
1 |
1720 |
|
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17–21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA |
Denise Nicholson (editor) |
|
1721 |
|
Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (Lecture Notes in Networks and Systems) [1st ed. 2021] |
Matteo Zallio (editor), Carlos Raymundo Ibañez (editor), Jesus Hechavarria Hernandez (editor) |
1 |
1722 |
|
A Human Readable Guide to Cyber Security |
Dane Christian |
|
1723 |
|
Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure |
Derrick Rountree |
|
1724 |
|
Wireshark & Ethereal Network Protocol Analyzer Toolkit |
Angela Orebaugh, Gilbert Ramirez, Jay Beale, Joshua Wright |
|
1725 |
|
X-Ways Forensics Practitioner's Guide [1 ed.] |
Brett Shavers, Eric Zimmerman |
1 |
1726 |
|
Zen and the Art of Information Security [1 ed.] |
Ira Winkler |
1 |
1727 |
|
Zero Day |
Mark Russinovich |
|
1728 |
|
Zero Day Exploit: Countdown to Darkness [First Edition] |
Rob Shein, David Litchfield, Marcus Sachs |
|
1729 |
|
Zero To Mastery In Information Security And Cyber Laws: No.1 Book To Become Zero To Hero In Information Security And Cyber Laws, This Amazing Book Covers ... Edition (Zero To Mastery Computer Series) |
Rajiv Jain, Vei Publishing |
|
1730 |
|
Zero To Mastery In Network Security- No.1 Network Security Book To Become Zero To Hero In Network Security, This Amazing Network Security Book Covers A-Z ... Edition (Zero To Mastery Computer Series) |
Rajiv Jain, Vei Publishing, Ayaz Uddin (editor) |
|
1731 |
|
Zero-Day Exploit |
Rob Shein, David Litchfield, Marcus Sachs |
|
1732 |
|
The Cybersecurity Body of Knowledge-The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity [1 ed.] |
Daniel Shoemaker (Author), Anne Kohnke (Author), Ken Sigler (Author) |
1 |
1733 |
|
Wireless security |
Maxim M, Pollino D. |
|
1734 |
|
Distributed Denial of Service Attacks-Real-world Detection and Mitigation [1 ed.] |
İlker Özçelik (Author), Richard Brooks (Author) |
1 |
1735 |
|
Network security: a beginner's guide [Third edition] |
Maiwald, Eric |
|
1736 |
|
Hacking Exposed Mobile Security Secrets & Solutions |
Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse |
|
1737 |
|
Ccsp Certified Cloud Security Professional All-In-One Exam Guide [ebook ed.] |
Daniel Carter |
|
1738 |
|
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition [4 ed.] |
Daniel Lachance, Glen E. Clarke |
4 |
1739 |
|
Cryptography & Network Security (McGraw-Hill Forouzan Networking) [1 ed.] |
Behrouz Forouzan |
1 |
1740 |
|
Network Security Portable Reference [1 ed.] |
Michael Horton |
1 |
1741 |
|
Network Security Illustrated [1 ed.] |
Jason Albanese, Wes Sonnenreich |
1 |
1742 |
|
Hacking Exposed Mobile: Security Secrets & Solutions |
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price |
|
1743 |
|
Cryptography and network security |
Atul Kahate |
|
1744 |
|
Network Security Illustrated |
|
|
1745 |
|
Cryptography And Network Security [2 ed.] |
Atul Kahate |
2 |
1746 |
|
CompTIA Security+ Certification Study Guide (Exam SY0-601) |
Glen E. Clarke |
|
1747 |
|
Cipm Certified Information Privacy Manager All-In-One Exam Guide |
Peter H. Gregory |
|
1748 |
|
Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions |
Rich Cannings, Himanshu Dwivedi, Zane Lackey |
|
1749 |
|
Comptia Security+ Certification Study Guide, Third Edition (Exam Sy0-501) [Third edition] |
Clarke, Glen E |
|
1750 |
|
CIPM Certified Information Privacy Manager All-in-One Exam Guide [1 ed.] |
Peter Gregory |
1 |
1751 |
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions |
David Endler, Mark Collier |
|
1752 |
|
Special OPS: Host and Network Security for Microsoft, Unix and Oracle [1st ed.] |
Joel Scambray, Stuart McClure |
1 |
1753 |
|
CCSP Certified Cloud Security Professional. Exam Guide [3 ed.] |
|
3 |
1754 |
|
Cryptography InfoSec Pro Guide [1 ed.] |
Sean-Philip Oriyano |
1 |
1755 |
|
Network Security A Beginner’s Guide, Third Edition [3 ed.] |
Eric Maiwald |
3 |
1756 |
|
Principles of Computer Security CompTIA Security+ and Beyond Lab Manual [2. Auflage.] |
Vincent J. Nestler, Gregory B. White, W. Arthur Conklin |
2 |
1757 |
|
Firewalls complete. |
Marcus Goncalves |
|
1758 |
|
Network security |
Eric Maiwald |
|
1759 |
|
Principles of Computer Security - CompTIA Security+ and Beyond, 2nd Edition [2 ed.] |
Dr. Wm. Arthur Conklin, Dr. Gregory White, Dwayne Williams, Roger L. Davis, Chuck Cothren |
2 |
1760 |
|
Botnets: The Killer Web Applications [3 ed.] |
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi |
3 |
1761 |
|
Cryptography InfoSec Pro Guide |
Sean-Philip Oriyano |
|
1762 |
|
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI) [1 ed.] |
Robert Larson |
1 |
1763 |
|
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization |
Tyler Wrightson |
|
1764 |
|
Hacking Exposed Web Applications [3rd edition] |
Liu, Vincent,Scambray, Joel,Sima, Caleb |
3 |
1765 |
|
Hacking Exposed Wireless, 2nd Edition: Wireless Security Secrets and Solutions |
Johnny Cache, Joshua Wright, Vincent Liu |
|
1766 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide [1 ed.] |
Matt Walker |
1 |
1767 |
|
CEH Certified Ethical Hacker all-in-one exam guide [2nd edition] |
Horton, Bradley B.,Walker, Matthew |
2 |
1768 |
|
Ceh Certified Ethical Hacker All-In-One Exam Guide [Fourth edition] |
Walker, Matthew |
|
1769 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide [3rd edition] |
Walker, Matthew |
3 |
1770 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition [5 ed.] |
Matt Walker |
5 |
1771 |
|
Gray Hat Hacking - The Ethical Hacker's Handbook [2 ed.] |
Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness |
2 |
1772 |
|
All in One CISSP Exam Guide [9 ed.] |
Fernando Maymí, Shon Harris |
9 |
1773 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition [4 ed.] |
Walker, Matt |
4 |
1774 |
|
CEH Certified Ethical Hacker All-in-One Exam Guide, Premium Third Edition with Online Practice Labs (Allinone Exam Guides) [Hardcover ed.] |
Matt Walker |
|
1775 |
|
Gray hat hacking : the ethical hacker’s handbook [4 ed.] |
Daniel Regalado et al. |
4 |
1776 |
|
Hacking Exposed, 6th Edition: Network Security Secrets and Solutions |
Stuart McClure, Joel Scambray, George Kurtz |
|
1777 |
|
Hacking Exposed. Linux [3 ed.] |
ISECOM |
3 |
1778 |
|
CEH Certified Ethical Hacker Bundle |
Walker, Matt |
|
1779 |
|
CEH Certified Ethical Hacker Exam Guide [3rd ed.] |
Matt Walker |
3 |
1780 |
|
CEH Certified Ethical Hacker Bundle [5 ed.] |
Matt Walker |
5 |
1781 |
|
Hacking exposed: bnetwork security secrets and solutions [2nd ed] |
Kurtz, George, McClure, Stuart, Scambray, Joel |
2 |
1782 |
|
CEH Certified Ethical Hacker Practice Exams [3 ed.] |
Matt Walker |
3 |
1783 |
|
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition [3 ed.] |
Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams |
3 |
1784 |
|
CEH Certified Ethical Hacker Practice Exams [1 ed.] |
Matt Walker |
1 |
1785 |
|
Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions [First (1st) ed.] |
Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt |
1 |
1786 |
|
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition |
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims |
|
1787 |
|
CEH Certified Ethical Hacker Practice Exams [5 ed.] |
Matt Walker |
5 |
1788 |
|
Gray Hat Hacking The Ethical Hacker’s Handbook [5th ed.] |
coll. |
5 |
1789 |
|
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) |
Walker, Matt |
|
1790 |
|
Gray Hat Hacking the Ethical Hacker’s Handbook |
coll. |
|
1791 |
|
Computer Forensics InfoSec Pro Guide [1 ed.] |
David Cowen |
1 |
1792 |
|
SSCP systems security certified practitioner: all-in-one exam guide [2nd edition] |
Gibson, Darril |
2 |
1793 |
|
CEH Certified Ethical Hacker Practice Exams, Second Edition (All-in-One) |
Matt Walker |
|
1794 |
|
CEH Certified Ethical Hacker Practice Exams, Fourth Edition [4 ed.] |
Matt Walker |
4 |
1795 |
|
Hacking Exposed: Network Security Secrets & Solutions [3 ed.] |
Jean Letessier, Johann Rafelski |
3 |
1796 |
|
Hacking Exposed: Network Security Secrets & Solutions [3rd ed.] |
Stuart McClure, Joel Scambray, George Kurtz |
3 |
1797 |
|
Modern Cryptography: Applied Mathematics for Encryption and Information Security [1st ed.] |
Chuck Easttom |
1 |
1798 |
|
Modern cryptography : applied mathematics for encryption and information security |
Easttom, Chuck |
|
1799 |
|
CEH, Certified Ethical Hacker bundle [Third edition] |
Walker, Matthew |
|
1800 |
|
CSSLP Certification All-in-One Exam Guide |
Arthur Conklin |
|
1801 |
|
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook [2 ed.] |
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness |
2 |
1802 |
|
Reverse Deception: Organized Cyber Threat Counter-Exploitation [1 ed.] |
Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones |
1 |
1803 |
|
CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide [3 ed.] |
Wm. Arthur Conklin, Daniel Shoemaker |
3 |
1804 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook |
Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams |
|
1805 |
|
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) |
Bobby E. Rogers |
|
1806 |
|
CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002) [2 ed.] |
SPARKS |
2 |
1807 |
|
Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-501) [Fifth edition] |
Dunkerley, Dawn |
|
1808 |
|
Comptia Cysa+ Cybersecurity Analyst Certification Practice Exams (Exam Cs0-001) |
Rogers, Bobby E |
|
1809 |
|
Hacking Exposed™ Web applications [1 ed.] |
Joel Scambray, Mike Shema |
1 |
1810 |
|
Introduction to Cryptography and Network Security |
Behrouz A. Forouzan |
|
1811 |
|
Certified Ethical Hacker Exam Guide [2 ed.] |
Matt Walker |
2 |
1812 |
|
Reverse Deception: Organized Cyber Threat Counter-Exploitation [1st edition] |
Bodmer, Sean,Carpenter, Gregory,Jones, Jade,Kilger, Max |
1 |
1813 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook [6 ed.] |
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost |
6 |
1814 |
|
Information security: the complete reference [2 ed.] |
Mark Rhodes-Ousley |
2 |
1815 |
|
Information Security The Complete Reference [2nd edition] |
Rhodes-Ousley, Mark |
2 |
1816 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook [1 ed.] |
Shon Harris |
1 |
1817 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook 2nd Edition [2 ed.] |
Shon Harris |
2 |
1818 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook Sixth Edition [6 ed.] |
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost |
6 |
1819 |
|
Hardening Network Infrastructure: Bulletproof Your Systems Before You Are Hacked! [1 ed.] |
Wes Noonan |
1 |
1820 |
|
Seguridad informática para empresas y particulares |
Gonzalo Alvarez Marañón, Pedro Pablo Pérez Garía, Pedro Bustamante |
|
1821 |
|
HackNotes(tm) Network Security Portable Reference [1 ed.] |
Michael Horton, Clinton Mugge |
1 |
1822 |
|
Intrusion Detection and Prevention [1 ed.] |
Carl Endorf, Gene Schultz, Jim Mellander |
1 |
1823 |
|
Gray Hat Hacking: The Ethical Hacker’s Handbook [2 ed.] |
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness |
2 |
1824 |
|
Extreme Exploits: Advanced Defenses Against Hardcore Hacks |
Victor Oppleman, Oliver Friedrichs, Brett Watson |
|
1825 |
|
Gray Hat Hacking: The Ethical Hacker’s Handbook [6 ed.] |
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost |
6 |
1826 |
|
Hacker's Challenge 3 [3rd ed] |
Bradley, Tony,Dwivedi, Himanshu,Pennington, Bill,Pollino, David |
3 |
1827 |
|
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition [2 ed.] |
Peter Gregory |
2 |
1828 |
|
Cism Certified Information Security Manager Practice Exams, Second Edition |
Peter H. Gregory |
|
1829 |
|
CISM Certified Information Security Manager. Exam Guide [2 ed.] |
Peter H. Gregory |
2 |
1830 |
|
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios [Edition Unstated] |
Mike Schiffman |
|
1831 |
|
CISSP All in One Exam Guide [4 ed.] |
|
4 |
1832 |
|
Hacker's challenge: test your incident response skills using 20 scenarios |
Schiffman, Mike |
|
1833 |
|
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them [1 ed.] |
Michael Howard, David LeBlanc, John Viega |
1 |
1834 |
|
Hacker’s challenge: test your incident response skills using 20 scenarios [First edition.] |
Mike Schiffman |
|
1835 |
|
Incident Response & Computer Forensics [3 edition] |
Jason Luttgens, Matthew Pepe, Kevin Mandia |
3 |
1836 |
|
CISSP All in one Exam Guide [8 ed.] |
Shon Harris, Fernando Maymí |
8 |
1837 |
|
GCIH GIAC Certified Incident Handler All-in-One Exam Guide [1 ed.] |
Nick Mitropoulos |
1 |
1838 |
|
Casp+ Comptia Advanced Security Practitioner Certification All-in-one Exam Guide, Exam Cas-003 |
Lane, Nicholas, Conklin, Arthur, White, Gregory B., Williams, Dwayne |
|
1839 |
|
Incident Response and Computer Forensics [2 ed.] |
Chris Prosise, Kevin Mandia, Matt Pepe |
2 |
1840 |
|
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration [1st ed.] |
Guy Hart-Davis |
1 |
1841 |
|
CISSP All-in-One Exam Guide [7th edition] |
Harris, Shon,Maymi, Fernando |
7 |
1842 |
|
CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide |
Brooks, Charles L |
|
1843 |
|
Security Sage's Guide to Hardening the Network Infrastructure [4 ed.] |
Stuart McClure |
4 |
1844 |
|
CISSP All-in-One Exam Guide [Eighth edition] |
Maymi, Fernando,Harris, Shon |
|
1845 |
|
Hacking Exposed [5 ed.] |
Stuart McClure, Joel Scambray, George Kurtz |
5 |
1846 |
|
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition [Paperback ed.] |
Lee Reiber |
|
1847 |
|
Hacking Exposed - Linux: Linux Security Secrets |
|
|
1848 |
|
CISSP All-in-One Exam Guide, [9 ed.] |
Fernando Maymi, Shon Harris |
9 |
1849 |
|
Hacking Exposed [2nd ed] |
Cowen, David,Davis, Chris,Philipp, Aaron |
2 |
1850 |
|
CISSP All-in-One Exam Guide, Fifth Edition [5 ed.] |
Shon Harris |
5 |
1851 |
|
People-centric security : transforming your enterprise security culture [1 ed.] |
Hayden, Lance |
1 |
1852 |
|
Hacking exposed 6 : network security secrets & solutions |
Stuart McClure, Joel Scambray, George Kurtz |
|
1853 |
|
Hacking exposed 6: network security secrets & solutions [10th anniversary ed] |
McClure, Stuart,Scambray, Joel,Kurtz, George |
10 |
1854 |
|
CC Certified in Cybersecurity All-in-One Exam Guide [1 ed.] |
Jordan Genung, Steven Bennett |
1 |
1855 |
|
CISSP Certification All-in-One Exam Guide [4 ed.] |
Shon Harris |
4 |
1856 |
|
Mobile application security |
Himanshu Dwivedi, Chris Clark, David V Thiel |
|
1857 |
|
CompTIA PenTest+ Certification All-in-One Exam Guide [2 ed.] |
Heather Linn, Raymond Nutting |
2 |
1858 |
|
Hacking Exposed 7. Network Security Secrets and Solutions [7th Edition] |
Stuart McClure and Joel Scambray |
7 |
1859 |
|
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-002) |
Heather Linn |
|
1860 |
|
CompTIA PenTest+ certification all-in-one exam guide (exam PT0-001) |
Nutting, Raymond |
|
1861 |
|
Hacking Exposed 7: Network Security Secrets & Solutions [7 ed.] |
Stuart McClure, Joel Scambray, George Kurtz |
7 |
1862 |
|
Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002) |
Heather Linn, Raymond Nutting |
|
1863 |
|
CompTIA PenTest+ certification practice exams (exam PT0-001) |
Ammerman, Jonathan |
|
1864 |
|
Hacking exposed Cisco networks: Cisco security secrets & solutions |
Vladimirov, Andrew A |
|
1865 |
|
CISSP Passport |
Bobby E. Rogers |
|
1866 |
|
Hacking exposed computer forensics : secrets & solutions [2nd ed] |
Aaron Philipp, David Cowen, Chris Davis, CISSP |
2 |
1867 |
|
CISSP Practice Exams [5 ed.] |
Shon Harris, Jonathan Ham |
5 |
1868 |
|
CCISO Certified Chief Information Security Officer All-in-One Exam Guide |
Steve Bennett, Jordan Genung |
|
1869 |
|
Mike Meyers CompTIA Security+ Certification Passport (Exam SY0-601) |
Dawn Dunkerley |
|
1870 |
|
Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity |
Leeza Garber, Scott Olson |
|
1871 |
|
Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems [1 ed.] |
G. B. Baecher |
1 |
1872 |
|
Cognitive hack : the new battleground in cybersecurity... the human mind [1 ed.] |
Bone, James |
1 |
1873 |
|
Cyber Deception: Techniques, Strategies, and Human Aspects |
Tiffany Bao, Milind Tambe, Cliff Wang |
|
1874 |
|
Cyber Security Social Engineering - Hacking Human Firewalls |
Nishad, Bharat Bhuval |
|
1875 |
|
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications [1st ed.] |
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger |
1 |
1876 |
|
Cognitive Hack. The New Battleground in Cybersecurity ... the Human Mind |
James Bone |
|
1877 |
|
Cyber Deception: Techniques, Strategies, and Human Aspects |
Tiffany Bao, MilindTambe, Cliff Wang |
|
1878 |
|
Die Kunst des Human Hacking: Social Engineering in der Praxis |
Christopher Hadnagy |
|
1879 |
|
Cyber justice : human rights and good governance for the internet |
Mihr, Anja |
|
1880 |
|
Cybersecurity Systems for Human Cognition Augmentation [1 ed.] |
Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.) |
1 |
1881 |
|
Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factor [2 ed.] |
Andreas Von Grebmer |
2 |
1882 |
|
From Encryption to Quantum Computing: The Governance of Information Security and Human Rights |
Ot van Daalen |
|
1883 |
|
Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings [1st ed.] |
Nathan Clarke, Steven Furnell |
1 |
1884 |
|
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, ... and Communication Technology, 613) [1st ed. 2021] |
Steven Furnell (editor), Nathan Clarke (editor) |
1 |
1885 |
|
Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings |
Tryfonas, Theo |
|
1886 |
|
Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings [1 ed.] |
Theo Tryfonas, Ioannis Askoxylakis (eds.) |
1 |
1887 |
|
Hacking the human: social engineering techniques and security countermeasures |
Ian Mann |
|
1888 |
|
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, ... and Communication Technology, 613) |
Steven Furnell (editor), Nathan Clarke (editor) |
|
1889 |
|
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, ... and Communication Technology, 658) |
Nathan Clarke (editor), Steven Furnell (editor) |
|
1890 |
|
Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings [1 ed.] |
Theo Tryfonas (eds.) |
1 |
1891 |
|
Human Aspects of Information Security, Privacy, and Trust: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings [1 ed.] |
Sourav Bhuyan, Joel S. Greenstein, Kevin A. Juang (auth.), Louis Marinos, Ioannis Askoxylakis (eds.) |
1 |
1892 |
|
Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings [1 ed.] |
Theo Tryfonas, Ioannis Askoxylakis (eds.) |
1 |
1893 |
|
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022 Mytilene, Lesbos, Greece, July 6–8, 2022 Proceedings |
Nathan Clarke, Steven Furnell |
|
1894 |
|
Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings ... and Communication Technology, 674) [1st ed. 2023] |
Steven Furnell (editor), Nathan Clarke (editor) |
1 |
1895 |
|
Human Hacking |
Christopher Hadnagy |
|
1896 |
|
Human Dimensions of Cybersecurity [1 ed.] |
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury |
1 |
1897 |
|
Human Dimensions of Cybersecurity |
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury |
|
1898 |
|
Human Factors Analysis of 23 Cyberattacks |
Moallem, Abbas |
|
1899 |
|
Human Hacked: My Life and Lessons as the World’s First Augmented Ethical Hacker [1 ed.] |
Len Noe |
1 |
1900 |
|
Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security) |
B. Ganor, K. Von Knop, C. Duarte |
|
1901 |
|
Human-Centered Security |
Heidi Trost |
|
1902 |
|
Humans and Cyber Security: How Organisations Can Enhance Resilience Through Human Factors |
Widdowson, Amanda |
|
1903 |
|
Human-computer interaction and cybersecurity handbook |
Moallem, Abbas |
|
1904 |
|
Internet Freedom Software and Illicit Activity : Supporting Human Rights Without Enabling Criminals [1 ed.] |
Sasha Romanosky, Martin C. Libicki, Zev Winkelman, Olesya Tkacheva |
1 |
1905 |
|
Invisible Threats: Financial and Information Technology Crimes and National Security, Volume 10 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science) |
U. Gori, I. Paparela |
|
1906 |
|
Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert |
Ozkaya, Erdal |
|
1907 |
|
Learn Social Engineering Learn the art of human hacking with an internationally renowned expert |
Erdal Ozkaya |
|
1908 |
|
Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for Peace and Security Series - E: Human and Societal Dynamics |
U. Gori |
|
1909 |
|
Managing the Human Factor in Information Security: How to win over staff and influence business managers [1 ed.] |
David Lacey |
1 |
1910 |
|
Psybersecurity Human Factors of Cyber Defence |
Oliver Guidetti, Mohiuddin Ahmed, Craig Speelman |
|
1911 |
|
Research agenda. The human factor in cybercrime and cybersecurity. |
Eric Rutger Leukfeldt |
|
1912 |
|
Resistance, liberation technology and human rights in the digital age [1 ed.] |
Giovanni Ziccardi (auth.) |
1 |
1913 |
|
Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility |
Emily B. Laidlaw |
|
1914 |
|
Social engineering: the art of human hacking |
Christopher Hadnagy |
|
1915 |
|
Security The Human Factor |
Paul Kearney |
|
1916 |
|
Social Engineering: The Art of Human Hacking |
Christopher Hadnagy,Paul Wilson |
|
1917 |
|
Social Engineering: The Art of Human Hacking [1 ed.] |
Christopher Hadnagy |
1 |
1918 |
|
Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception [1 ed.] |
Vince Reynolds |
1 |
1919 |
|
Social Engineering: The Art of Human Hacking |
Hadnagy, Christopher(Foreword),Wilson, Paul(Foreword) |
|
1920 |
|
Social Engineering: The Science of Human Hacking |
Hadnagy, Christopher |
|
1921 |
|
Social Engineering : The Science of Human Hacking |
Christopher Hadnagy |
|
1922 |
|
Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception |
Vince Reynolds |
|
1923 |
|
Social Engineering: The Science of Human Hacking [2 ed.] |
Christopher Hadnagy |
2 |
1924 |
|
Social Engineering: The Science of Human Hacking [2 edition] |
Christopher Hadnagy |
2 |
1925 |
|
Stopping Human Hacks |
Ira Winkler, Tracy Celaya |
|
1926 |
|
Techniques and applications for advanced information privacy and security: emerging organizational, ethical, and human issues |
Hamid R. Nemati, Hamid R. Nemati |
|
1927 |
|
Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy) [1 ed.] |
Hamid R. Nemati |
1 |
1928 |
|
Surveillance Law, Data Retention and Human Rights: A Risk to Democracy |
Matthew White |
|
1929 |
|
The Android Malware Handbook: Detection and Analysis by Human and Machine |
Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, Yanhai Xiong |
|
1930 |
|
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity |
Cesar Bravo, Desilda Toska |
|
1931 |
|
The art of deception: controlling the human element of security |
Simon, William L.,Mitnick, Kevin D |
|
1932 |
|
The Human Firewall: Wie eine Kultur der Cyber-Sicherheit geschaffen wird |
Florian Jörgens |
|
1933 |
|
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer [1 ed.] |
Perry Carpenter, Kai Roer |
1 |
1934 |
|
Trust in Cyber-societies: Integrating the Human and Artificial Perspectives (Lecture Notes in Computer Science, 2246) |
Rino Falcone (editor), Munindar Singh (editor), Yao-Hua Tan (editor) |
|
1935 |
|
Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools [1 ed.] |
Abbas Moallem |
1 |
1936 |
|
Unmasking the social engineer: the human element of security |
Ekman, Paul,Hadnagy, Christopher |
|
1937 |
|
Unmasking the Social Engineer: The Human Element of Security [1 ed.] |
Christopher Hadnagy, Paul Kelly F., Paul Ekman |
1 |
1938 |
|
The art of intrusion: the real stories behind the exploits of hackers, intruders & deceivers |
Simon, William L., Mitnick, Kevin David |
|
1939 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers [1 ed.] |
Kevin D. Mitnick, William L. Simon |
1 |
1940 |
|
The Stories of My Hackers and I |
Beatrice, Mrs, Walsh, Lin |
|
1941 |
|
Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe |
Nirmal John |
|
1942 |
|
Information Security Analyst |
Wil Mara |
|
1943 |
|
Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers [1 ed.] |
Ping Li, Bing Sun, Chao Li (auth.), Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing (eds.) |
1 |
1944 |
|
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door |
Brian Krebs |
|
1945 |
|
Exam Ref SC-100 Microsoft Cybersecurity Architect [1 ed.] |
Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez |
1 |
1946 |
|
Look Both Ways: Help Protect Your Family on the Internet [1 ed.] |
Linda Criddle |
1 |
1947 |
|
Exam Ref MS-101 Microsoft 365 Mobility and Security |
Brian Svidergol, Bob Clements |
|
1948 |
|
A Cryptography Primer: Secrets and Promises [draft ed.] |
Klein P.N. |
|
1949 |
|
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! |
Occupytheweb |
|
1950 |
|
Hunting Security Bugs [1 ed.] |
Tom Gallagher, Lawrence Landauer, Bryan Jeffries |
1 |
1951 |
|
Analysis and design of networked control systems under attacks |
Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan |
|
1952 |
|
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion |
Jim Harrison, Yuri Diogenes, Mohit Saxena, Tom Shinder |
|
1953 |
|
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business [1 ed.] |
George Finney |
1 |
1954 |
|
Deploying Secure 802 11 Wireless Networks with Microsoft Windows |
|
|
1955 |
|
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant |
Bud Ratliff, Jason Ballard |
|
1956 |
|
Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers [1 ed.] |
Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo (auth.), Heung Youl Youm, Moti Yung (eds.) |
1 |
1957 |
|
Microsoft Azure Sentinel |
Yuri Diogenes, Nicholas Dicola, Jonathan Trull |
|
1958 |
|
Maintaining Network Separations with Trusted Solaris 8 Software |
Sun Microsystems, Inc. |
|
1959 |
|
Hacked: the inside story of America's struggle to secure cyberspace |
Charlie Mitchell |
|
1960 |
|
Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544) |
Tesch, Dale., Greg Abelar |
|
1961 |
|
Microsoft Azure Sentinel: Planning and implementing Microsoft s cloud-native SIEM solution |
Jonathan Trull, Nicholas DiCola, Yuri Diogenes |
|
1962 |
|
She’s In CTRL: How women can take back tech – to communicate, investigate, problem-solve, broker deals and protect themselves in a digital world |
Anne Imafidon |
|
1963 |
|
Surviving a Ransomware Attack with Azure Site Recovery |
Dave Kawula, Emile Cabot, Cary Sun, Cristal Kawula, John O'Neill Sr. |
|
1964 |
|
Exam Ref AZ-500 Microsoft Azure Security Technologies |
Yuri Diogenes , Orin Thomas |
|
1965 |
|
Computer Security in the 21st Century [1 ed.] |
D.T. Lee, S. P. Shieh, J. Doug Tygar |
1 |
1966 |
|
Security monitoring with Cisco security MARS Includes index |
Halleen, Gary, Kellogg, Greg |
|
1967 |
|
Cutthroat: high stakes & killer moves on the electronic frontier |
Stephen Keating |
|
1968 |
|
Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science, 1683) |
Luis Bathen (editor), Gokay Saldamli (editor), Xiaoyan Sun (editor), Thomas H. Austin (editor), Alex J. Nelson (editor) |
|
1969 |
|
The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting (Business Skills) [1 ed.] |
Mark Morowczynski, Rod Trent, Matthew Zorich |
1 |
1970 |
|
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server 2003 Network |
Roberta Bragg |
|
1971 |
|
Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science) [1st ed. 2021] |
Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) |
1 |
1972 |
|
Secure and Trustworthy Transportation Cyber-Physical Systems [1 ed.] |
Yunchuan Sun,Houbing Song (eds.) |
1 |
1973 |
|
Hacked: The Inside Story of America’s Struggle to Secure Cyberspace |
Charlie Mitchell |
|
1974 |
|
MCSA/MCSE Self-paced Training Kit (exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 [1 ed.] |
Stan Reimer, Orin Thomas |
1 |
1975 |
|
Cyber Security Defense with Microsoft Defender |
Kawula, Dave, O'Neill Sr, John, Kawula, Cristal, Cabot, Emile, Sun, Cary |
|
1976 |
|
Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia |
Sarah Katz |
|
1977 |
|
Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion (Pro -Administrator's Campanion) [1 ed.] |
Jim Harrison, Yuri Diogenes, Mohit Saxena |
1 |
1978 |
|
Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century [1 ed.] |
Demetrius Klitou (auth.) |
1 |
1979 |
|
Web and Information Security |
Ferrari E. |
|
1980 |
|
CISSP Training Kit |
David R. Miller |
|
1981 |
|
Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Security and Cryptology) |
Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) |
|
1982 |
|
Information Security and Ethics: Social and Organizational Issues |
Marian Quigley |
|
1983 |
|
Internet Policy in China : A Field Study of Internet Cafés |
Helen Sun |
|
1984 |
|
Reinventing Cybersecurity [1 ed.] |
Jasmine Henry, Alison Gianotto, Coleen Shane, Tracy Bannon, Dr. Meg Layton, Breanne Boland, Angela Marafino, Latha Maripuri, Carlota Sage, Carla Sun |
1 |
1985 |
|
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals |
Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski |
|
1986 |
|
Exam Ref AZ-500 Microsoft Azure Security Technologies |
Yuri Diogenes, Orin Thomas |
|
1987 |
|
Breaking and Entering: The Extraordinary Story of a Hacker Called 'Alien' |
Jeremy Smith, Sue Buswell (editor) |
|
1988 |
|
The news machine : hacking : the untold story |
Hanning, James, Mulcaire, Glenn |
|
1989 |
|
Enumerating Esoteric Attack Surfaces: Recon for Bug Bounty Hunters, Penetration Testers and OSINT Aggressors |
Jann Moon |
|
1990 |
|
International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors |
U. S. Department Of Defense, Strategic Studies Institute, United States Army War College, Department Of Homeland Security, Federal Bureau Of Investigation |
|
1991 |
|
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals [2 ed.] |
Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski |
2 |
1992 |
|
Out of the Inner Circle. A Hacker's Guide to Computer Security |
Bill Landreth, Howard Rheingold |
|
1993 |
|
Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III [1st ed.] |
Xingming Sun, Zhaoqing Pan, Elisa Bertino |
1 |
1994 |
|
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century |
Shimon Brathwaite |
|
1995 |
|
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century [1 ed.] |
Shimon Brathwaite |
1 |
1996 |
|
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004: Implementing Microsoft(r) Internet ... Acceleration Server 2004 (Pro-Certification [1 ed.] |
Stan Reimer, Orin Thomas |
1 |
1997 |
|
CISSP Rapid Review |
Darril Gibson |
|
1998 |
|
Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II [1 ed.] |
Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino (eds.) |
1 |
1999 |
|
Deploying Microsoft Forefront Threat Management Gateway 2010 (TMG) [1 ed.] |
Yuri Diogenes, Thomas W. Shinder Dr |
1 |
2000 |
|
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks [1st ed.] |
Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun |
1 |
2001 |
|
How to do Privacy in the 21st Century: The True Story of Hacktivism [1 ed.] |
Peter Burnett, Valeria Vescina |
1 |
2002 |
|
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft® Internet Security and Acceleration Server 2004 |
Reimer Stan |
|
2003 |
|
Microsoft Azure Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution (IT Best Practices - Microsoft Press) [2 ed.] |
Yuri Diogenes, Nicholas DiCola, Tiander Turpijn |
2 |
2004 |
|
Hacking Cyberspace |
David J. Gunkel |
|
2005 |
|
Project Zero Trust : A Story about a Strategy for Aligning Security and the Business |
Finney, George,Kindervag, John, |
|
2006 |
|
Microsoft Internet Security and Acceleration (ISA) Server 2000: Administrator's Pocket Consultant [illustrated edition] |
Jason Ballard, Bud Ratliff |
|
2007 |
|
The Darkest Web Drugs, death and destroyed lives ... the inside story of the internet’s evil twin |
Eileen Ormsby |
|
2008 |
|
The Hacker Crackdown: Law and Disorder on the Electronic Frontier |
Michael Bruce Sterling |
|
2009 |
|
Analysis and design of networked control systems under attacks [First edition] |
Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan |
|
2010 |
|
Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings [1 ed.] |
Ruilin Li, Bing Sun, Chao Li, Longjiang Qu (auth.), Ron Steinfeld, Philip Hawkes (eds.) |
1 |
2011 |
|
A British Hacker in America: The story of PMF & 'Operation Cybersnare' - The U.S. Secret Service's first online sting |
Pmf |
|
2012 |
|
Improving Web Application Security: Threats and Countermeasures [1 ed.] |
Microsoft Corporation |
1 |
2013 |
|
Breaking and entering: the extraordinary story of a hacker called |
Smith, Jeremy N |
|
2014 |
|
Exam Ref AZ-700 Designing and Implementing Microsoft Azure Networking Solutions [1 ed.] |
Charles Pluta |
1 |
2015 |
|
Assessing Network Security |
Kevin Lam, David LeBlanc, Ben Smith |
|
2016 |
|
Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II [1st ed.] |
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena |
1 |
2017 |
|
Internet Wars: The Struggle for Power in the 21st Century [1st ed.] |
Fergus Hanson |
1 |
2018 |
|
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World |
Stefanick, Lorna |
|
2019 |
|
The Internet in Everything: Freedom and Security in a World with No Off Switch |
Laura Denardis |
|
2020 |
|
Economics of Information Security and Privacy III [1 ed.] |
Sam Ransbotham, Sabyasachi Mitra (auth.), Bruce Schneier (eds.) |
1 |
2021 |
|
Economics of Information Security (Advances in Information Security) [1 ed.] |
L. Jean Camp, Stephen Lewis |
1 |
2022 |
|
Securing Freedom in the Global Commons (Stanford Security Studies) |
Scott Jasper |
|
2023 |
|
Cyber Terrorism: Political And Economic Implications |
Andrew M. Colarik |
|
2024 |
|
Cybersecurity Investments: Decision Support Under Economic Aspects [1 ed.] |
Stefan Beissel (auth.) |
1 |
2025 |
|
Coding freedom: the ethics and aesthetics of hacking |
Enid Gabriella Coleman |
|
2026 |
|
Protecting America's Freedom in the Information Age (A Report of the Markle Foundation Task Force) |
Zoe Baird, James Barksdale |
|
2027 |
|
Dark Web and Deep Web: Place of anonymity and freedom of expression |
Smin Oienen |
|
2028 |
|
The Economics of Information Security and Privacy [1 ed.] |
Matthias Brecht, Thomas Nowey (auth.), Rainer Böhme (eds.) |
1 |
2029 |
|
Cyber War and Cyber Peace: Digital Conflict in the Middle East |
Mike Sexton, Eliza Campbell (editors) |
|
2030 |
|
Digital Whoness: Identity, Privacy And Freedom In The Cyberworld [1st Edition] |
Rafael Capurro, Michael Eldred, Daniel Nagel |
1 |
2031 |
|
OECD guidelines for the security of information systems and networks : towards a culture of security = Lignes directrices de l’OCDE régissant la sécurité des systèmes et réseaux d’information : vers un culture de la sécurité. |
OECD |
|
2032 |
|
The real cyber war : the political economy of Internet freedom [1st Edition] |
Jablonski, Michael, Powers, Shawn M |
1 |
2033 |
|
The Economics of Computer Hacking |
Peter T., Christopher J. |
|
2034 |
|
Digital whoness : identity, privacy and freedom in the cyberworld |
Capurro, Rafael, Eldred, Michael, Nagel, Daniel |
|
2035 |
|
Hacking University: Mobile Phone & App Hacking & Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps & Precisely ... (Hacking Freedom and Data Driven Book 5) |
Isaac D. Cody |
|
2036 |
|
This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information |
Andy Greenberg |
|
2037 |
|
Information Security Across Federal Agencies: Analysis Of Adequacy And Effectiveness |
Shane Palmer |
|
2038 |
|
Developing a Cybersecurity Immune System for Industry 4.0 |
Sergei Petrenko (author) |
|
2039 |
|
Managing Information Risk and the Economics of Security (Medizinische Informatik Und Satistik) [1 ed.] |
M. Eric Johnson |
1 |
2040 |
|
Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 [1 ed.] |
Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) |
1 |
2041 |
|
Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and ... and Technologies for Security Applications) |
Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) |
|
2042 |
|
This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world’s information |
Andy Greenberg |
|
2043 |
|
Developing a Cybersecurity Immune System for Industry 4.0 |
Sergei Petrenko, |
|
2044 |
|
Data Security and Privacy in Massachusetts [2 ed.] |
Stephen Y. Chow (editor) |
2 |
2045 |
|
The Privacy Handbook: Proven Countermeasures for Combating Threats to Privacy, Security, and Personal Freedom |
Michael E. Chesbro |
|
2046 |
|
Economics of Identity Theft: Avoidance, Causes and Possible Cures [1 ed.] |
L. Jean Camp |
1 |
2047 |
|
Encryption Works : How to Protect Your Privacy in the Age of NSA Surveillance |
Micah Lee |
|
2048 |
|
Take control of your online privacy |
Joe Kissell |
|
2049 |
|
Implementing NAP and NAC security technologies : the complete guide to network access control |
Daniel Hoffman |
|
2050 |
|
Mastering Kali Linux for Advanced Penetration Testing [all] |
Robert W. Beggs |
|
2051 |
|
Official (Isc)2 Guide to the Issmp Cbk |
|
|
2052 |
|
Risk management solutions for Sarbanes-Oxley section 404 IT compliance |
John S Quarterman |
|
2053 |
|
Network Intrusion Detection [3rd ed] |
Stephen Northcutt, Judy Novak |
3 |
2054 |
|
OECD Guidelines for the Security of Information Systems and Networks : Towards a Culture of Security |
OECD |
|
2055 |
|
Nmap Cookbook: The Fat-free Guide to Network Scanning |
Nicholas Marsh |
|
2056 |
|
Web Penetration Testing with Kali Linux |
Joseph Muniz, Aamir Lakhani |
|
2057 |
|
Network Security Bible [1 ed.] |
Eric Cole, Ronald L. Krutz, James Conley |
1 |
2058 |
|
Phishing : cutting the identity theft line |
Rachael Lininger, Russell Dean Vines |
|
2059 |
|
Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility |
Russell Smith |
|
2060 |
|
CEH : official certified ethical hacker review guide |
Kimberly Graves |
|
2061 |
|
Digital Crime and Forensic Science in Cyberspace [illustrated edition] |
et al, Panagiotis Kanellis |
|
2062 |
|
Firewalls For Dummies [2nd ed] |
Brian Komar, Ronald Beekelaar, Joern Wettern |
2 |
2063 |
|
Integrating security and software engineering: advances and future visions [illustrated edition] |
Haralambos Mouratidis, Haralambos Mouratidis, Paolo Giorgini |
|
2064 |
|
PCI DSS : a Pocket Guide |
Alan Calder, Nicki Carter |
|