Number Cover TextBook for Cyber Security Author Edition
0 cover Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts Maurizio Martellini, Andrea Malizia (eds.) 1
1 cover Fundamentals of Network Forensics: A Research Perspective [1 ed.] R.C. Joshi, Emmanuel S. Pilli (auth.) 1
2 cover Fundamentals of network security [1st ed.] John E. Canavan 1
3 cover Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night McHale, David
4 cover Access Control and Security Monitoring of Multimedia Information Processing and Transmission (Computing and Networks) Zhihan Lyu (editor), Jaime Lloret (editor), Houbing Herbert Song (editor)
5 cover Advanced Computer Science Applications. Recent Trends in AI, Machine Learning, and Network Security Karan Singh, Latha Banda, Manisha Manjul
6 cover Advanced Product Management Series: Cybersecurity [1 ed.] Alex Cowan 1
7 cover Advanced Techniques of Artificial Intelligence in IT Security Systems (Studies in Big Data, 146) [1st ed.] Marcin Korytkowski 1
8 cover AI for Peace Branka Panic, Paige Arthur
9 cover Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I [1 ed.] Christina Pöpper, Lejla Batina 1
10 cover Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II [1 ed.] Christina Pöpper, Lejla Batina 1
11 cover Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III [1 ed.] Christina Pöpper, Lejla Batina 1
12 cover Artificial Intelligence for Cyber Defense and Smart Policing S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
13 cover Azure Security [1 ed.] Bojan Magusic 1
14 cover Beyond Digital Distraction: Educating Today's Cyber Student (Digital Education and Learning) [1st ed.] Kurt C. Schuett 1
15 cover Big Data, Emerging Technologies and Intelligence: National Security Disrupted Miah Hammond-Errey
16 cover Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals Ramakrishnan, Ganesh, Haqanee, Mansoor
17 cover Blockchain-Based Data Security in Heterogeneous Communications Networks Dongxiao Liu, Xuemin (Sherman) Shen
18 cover Blockchain-based Internet of Things [1 ed.] Iraq Ahmad Reshi (editor), Sahil Sholla (editor) 1
19 cover Cold War 2.0 : Artificial Intelligence in the New Battle between China, Russia, and America George S. Takach
20 cover Building Cybersecurity Applications with Blockchain and Smart Contracts Nour El Madhoun, Ioanna Dionysiou, Emmanuel Bertin
21 cover CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003) [3 ed.] Mya Heath 3
22 cover CompTIA Security+ Practice Tests: Exam SY0-701 [3 ed.] David Seidl 3
23 cover CompTIA Security+ SY0-701 Certification Guide, Third Edition (for DUC PHAM) [3 ed.] Ian Neil 3
24 cover CompTIA Security+ SY0-701 Practice Tests & PBQs: Exam SY0-701 Nikolaos Gorgotsias
25 cover CompTIA® Security+ SY0-701 Cert Guide (for True Epub) Lewis Heuermann
26 cover Computer networks. Data communications, Internet and security. Ata Elahi, Alex Cushman
27 cover Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings Part 3 Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor)
28 cover Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science) Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor)
29 cover Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science) Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor)
30 cover Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised ... I (Lecture Notes in Computer Science, 14398) Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens-Boulahia (editor), Costas Lambrinoudakis (editor), Joaquin Garcia-Alfaro (editor), Guillermo Navarro-Arribas (editor), Pantaleone Nespoli (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor)
31 cover CC Certified in Cybersecurity Study Guide (Sybex Study Guide) Mike Chapple
32 cover Children, Young People and Online Harms: Conceptualisations, Experiences and Responses Emily Setty (editor), Faith Gordon (editor), Emma Nottingham (editor)
33 cover Security with Intelligent Computing and Big-data Services Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao
34 cover Security with Intelligent Computing and Big-data Services: Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
35 cover Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings Kai-Di Chang, Chi-Yuan Chen (auth.), Ruay-Shiung Chang, Tai-hoon Kim, Sheng-Lung Peng (eds.)
36 cover Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy) [1 ed.] Ari Takanen, Jared DeMott, Charlie Miller 1
37 cover Advanced Certificate in Information Security (ACISE) Part-I IGNOU
38 cover Advanced Certificate in Information Security (ACISE) Part-II IGNOU
39 cover Data Security in Internet of Things Based RFID and WSN Systems Applications Korhan Cengiz, Rohit Sharma, Rajendra Prasad Mahapatra
40 cover Post Graduate Diploma in Information Security (PGDIS) Part 1 IGNOU
41 cover Post Graduate Diploma in Information Security (PGDIS) Part 2 IGNOU
42 cover Post Graduate Diploma in Information Security (PGDIS) Part 3 IGNOU
43 cover Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences: PCCDS 2022 Rajendra Prasad Yadav, Satyasai Jagannath Nanda, Prashant Singh Rana, Meng-Hiot Lim
44 cover Transactions on data hiding and multimedia security VI Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.)
45 cover Cyber Dragon: Inside China's Information Warfare and Cyber Operations Dean Cheng
46 cover Cyber Security: Threats and Responses for Government and Business Caravelli, Jack,Jones, Nigel,Kozup, John C
47 cover Cybercrime: Criminal Threats from Cyberspace Susan W. Brenner
48 cover Digital Influence Warfare in the Age of Social Media James J. F. Forest
49 cover Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers Philip Alexander
50 cover Myths and Realities of Cyber Warfare: Conflict in the Digital Realm Nicholas Michael Sambaluk
51 cover The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals Paul Bocij
52 cover The Technology Trap: Where Human Error and Malevolence Meet Powerful Technologies Lloyd J. Dumas
53 cover The War on Privacy Jacqueline Klosek
54 cover Weaponizing Cyberspace: Inside Russia's Hostile Activities Nicholas Sambaluk
55 cover Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings Rudrapatna K. Shyamasundar,Virendra Singh,Jaideep Vaidya (eds.)
56 cover Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings Sabu M. Thampi,Gregorio Martínez Pérez,Carlos Becker Westphall,Jiankun Hu,Chun I. Fan,Félix Gómez Mármol (eds.)
57 cover Smart Secure Systems – IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings Guru Prasadh Venkataramani,Karthik Sankaranarayanan,Saswati Mukherjee,Kannan Arputharaj,Swamynathan Sankara Narayanan (eds.)
58 cover A Deep Learning based Approach to Proactive and Reactive Enterprise Security Sumit Chakraborty
59 cover Adaptively Secure Broadcast: Threat Analytics & Security Intelligence Sumit Chakraborty
60 cover Advanced Computing and Systems for Security: Volume 1 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.)
61 cover Advanced Computing and Systems for Security: Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.)
62 cover Advanced Informatics for Computing Research: Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
63 cover Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022 Rajkot, India, November 24–26, 2022 Revised Selected Papers, Part I Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
64 cover Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.)
65 cover Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)
66 cover Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 Hiran V. Nath (auth.), David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai (eds.)
67 cover An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection S. V. Raghavan, E. Dawson (auth.), S.V. Raghavan, E Dawson (eds.)
68 cover Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
69 cover Applied Computation and Security Systems: Volume One Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.)
70 cover Applied Computation and Security Systems: Volume Two Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.)
71 cover Bioterrorism : Cryptographic Challenges Sumit Chakraborty
72 cover Bioterrorism, Threat Analytics and Secure Multi-party Computation Sumit Chakraborty
73 cover Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe John, Nirmal
74 cover Combating Cyber Threat P. K. Singh
75 cover Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar
76 cover Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan
77 cover Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan
78 cover Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)
79 cover Computer Networks and Information Technologies: Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, Bangalore, India, March 10-11, 2011. Proceedings Snehlata Mishra, Vandana Neha Tigga, S. N. Singh (auth.), Vinu V Das, Janahanlal Stephen, Yogesh Chaba (eds.)
80 cover Computer Networks and Intelligent Computing: 5th International Conference on Information Processing, ICIP 2011, Bangalore, India, August 5-7, 2011. Proceedings Saritha S., Santhosh Kumar G. (auth.), K. R. Venugopal, L. M. Patnaik (eds.)
81 cover Cryptography and network security 3rd edition Atul Kahate 3
82 cover Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Series on Asian Criminology and Criminal Justice Research) Balsing Rajput
83 cover Cyber Security in India: Education, Research and Training (IITK Directions, 4) Sandeep Kumar Shukla (editor), Manindra Agrawal (editor)
84 cover Cyber Technological Paradigms and Threat Landscape in India Ramnath Reghunadhan
85 cover Cyber Warfare, Security and Space Research: First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers Sandeep Joshi (editor), Amit Kumar Bairwa (editor), Amita Nandal (editor), Milena Radenkovic (editor), Cem Avsar (editor)
86 cover Cyber Warfare: Its Implications on National Security Sanjeev Relia
87 cover Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science, 1436) Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor)
88 cover Distributed Computing and Networking: 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings Sanjit A. Seshia (auth.), Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha (eds.)
89 cover India Today [April 09, 2018] | Your Privacy is Dead ! India Today
90 cover Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings Atul Prakash, Rudrapatna Shyamasundar (eds.)
91 cover Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings Sushil Jajodia, Chandan Mazumdar (eds.)
92 cover Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.)
93 cover Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar
94 cover Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
95 cover Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur
96 cover Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings (Security and Cryptology) Somanath Tripathy (editor), Rudrapatna K. Shyamasundar (editor), Rajiv Ranjan (editor)
97 cover Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings (Lecture Notes in Computer Science) Venkata Ramana Badarla (editor), Surya Nepal (editor), Rudrapatna K. Shyamasundar (editor)
98 cover Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings (Lecture Notes in Computer Science) Vallipuram Muthukkumarasamy (editor), Sithu D. Sudarsan (editor), Rudrapatna K. Shyamasundar (editor)
99 cover Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings Sriram K. Rajamani (auth.), Somesh Jha, Anish Mathuria (eds.)
100 cover Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia (auth.), Sushil Jajodia, Chandan Mazumdar (eds.)
101 cover Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings Christopher Kruegel (auth.), Venkat Venkatakrishnan, Diganta Goswami (eds.)
102 cover Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings Chris Clifton, Balamurugan Anandan (auth.), Aditya Bagchi, Indrakshi Ray (eds.)
103 cover Information theory coding and cryptography Mandal, Surajit, Manna, Nilotpal, Saha, Arjit
104 cover Information Theory Coding And Cryptography Ranjan Bose
105 cover Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part I Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao
106 cover Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part II Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao
107 cover Network security essentials: applications and standards William Stallings
108 cover Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal
109 cover Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas
110 cover Progress in Cryptology – INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings Roger Dingledine (auth.), Daniel J. Bernstein, Sanjit Chatterjee (eds.)
111 cover Progress in Cryptology – INDOCRYPT 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang (auth.), Goutam Paul, Serge Vaudenay (eds.)
112 cover Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings Orr Dunkelman, Somitra Kumar Sanadhya (eds.)
113 cover Progress in Cryptology – INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings Debrup Chakraborty, Tetsu Iwata
114 cover Progress in Cryptology – INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings Feng Hao, Sushmita Ruj, Sourav Sen Gupta
115 cover Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran
116 cover Progress in Cryptology – INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings (Security and Cryptology) Avishek Adhikari (editor), Ralf Küsters (editor), Bart Preneel (editor)
117 cover Progress in Cryptology – INDOCRYPT 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11–14, 2022, Proceedings (Lecture Notes in Computer Science) Takanori Isobe (editor), Santanu Sarkar (editor)
118 cover Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers Rahul Johari, Neelima Gupta, Sandhya Aneja (auth.), Karan Singh, Amit K. Awasthi (eds.)
119 cover Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (auth.), Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (eds.)
120 cover Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko, Lei Shu (eds.)
121 cover Securing India in the Cyber Era Sameer Patil
122 cover Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science) Pantelimon Stănică (editor), Sihem Mesnager (editor), Sumit Kumar Debnath (editor)
123 cover Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki
124 cover Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings Sanjay Burman (auth.), Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (eds.)
125 cover Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.)
126 cover Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero
127 cover Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers ... in Computer and Information Science, 1208) Sabu M. Thampi (editor), Gregorio Martinez Perez (editor), Ryan Ko (editor), Danda B. Rawat (editor)
128 cover Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (Communications in Computer and Information Science) Sabu M. Thampi (editor), Guojun Wang (editor), Danda B. Rawat (editor), Ryan Ko (editor), Chun-I Fan (editor)
129 cover Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
130 cover Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (eds.)
131 cover Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.)
132 cover Security in Computing: 5th Edition Charles P. Pfleeger And Shari Lawrence Pfleeger 5
133 cover Security Intelligence for Broadcast : Threat Analytics Sumit Chakraborty
134 cover Security Intelligence for Broadcast: Algorithmic Complexity Sumit Chakraborty
135 cover Security, Privacy, and Applied Cryptography Engineering. 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings Lejla Batina, Stjepan Picek, Mainack Mondal
136 cover Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings (Security and Cryptology) Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor)
137 cover Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings (Security and Cryptology) Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor)
138 cover Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science) Francesco Regazzoni (editor), Bodhisatwa Mazumdar (editor), Sri Parameswaran (editor)
139 cover Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont (eds.)
140 cover Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth (eds.)
141 cover SIVA: Security Intelligence Verification Algorithm for Location based Services Sumit Chakraborty
142 cover Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I Amos Beimel, Stefan Dziembowski
143 cover Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II Amos Beimel, Stefan Dziembowski
144 cover Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings Tanja Ažderska (auth.), Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (eds.)
145 cover Cyber Laundering: International Policies And Practices Nathalie Rebe
146 cover Regulating Cyber Technologies: Privacy Vs Security Nathalie Rébé
147 cover Innovations in Digital Forensics [Team-IRA] Suryadipta Majumdar (editor), Paria Shirani (editor), Lingyu Wang (editor)
148 cover Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory Selda Calkavur, Alexis Bonnecaze, Romar Dela Cruz, Patrick Sole
149 cover Internet of Everything: Key Technologies, Practical Applications and Security of IoT Hang Song
150 cover Cryptography In The Information Society Ryabko, Boris, Fionov, Andrey,
151 cover Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor)
152 cover Dynamically Enabled Cyber Defense Lin Yang, Quan Yu
153 cover Data Analysis for Network Cyber-Security Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard
154 cover Using Science in Cybersecurity Leigh Metcalf, Jonathan Spring
155 cover Computer Viruses: A High-tech Disease [2nd ed.] Rolf Burger 2
156 cover Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings [1st ed.] Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung 1
157 cover Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings Shlomi Dolev, Sachin Lodha
158 cover The Kish Cypher:The Story of KLJN for Unconditional Security Laszlo B. Kish
159 cover Cyberspace and Instability Robert Chesney (editor), James Shires (editor), Max Smeets (editor)
160 cover The Political Mapping of Cyberspace Jeremy Crampton
161 cover Integer Algorithms in Cryptology and Information Assurance Boris S Verkhovsky
162 cover CyberForensics: Understanding Information Security Investigations Jennifer Bayuk (editor)
163 cover Firewall Design and Analysis (Computer and Network Security) Alex X. Liu
164 cover Mind Games Richard Thieme
165 cover Biometrics: identity verification in a networked world [1st ed.] Samir Nanavati, Michael Thieme, Raj Nanavati 1
166 cover Algorithms, architectures and information systems security Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy
167 cover Security in Iot Social Networks [1° ed.] Fadi Al-turjman (editor), B. D. Deebak (editor) 1
168 cover RIoT Control. Understanding and Managing Risks and the Internet of Things [1 ed.] Tyson Macaulay 1
169 cover Computer and Information Security Handbook [3 ed.] John R. Vacca (Editor) 3
170 cover Malware Diffusion Models for Modern Complex Networks: Theory and Applications Vasileios Karyotis, M.H.R. Khouzani
171 cover Emerging trends in ICT security [1 ed.] Babak Akhgar, Hamid R. Arabnia (editors) 1
172 cover Computer and Information Security Handbook [2 ed.] John R. Vacca (editor) 2
173 cover Handbook on Securing Cyber-Physical Critical Infrastructure Sajal K. Das, Krishna Kant and Nan Zhang (Auth.)
174 cover System Assurance: Beyond Detecting Vulnerabilities [1 ed.] Nikolai Mansourov, Djenana Campara 1
175 cover Computer and information security handbook [1 ed.] John R. Vacca (editor) 1
176 cover Disappearing Cryptography: Information Hiding: Steganography and Watermarking [3 ed.] Peter Wayner 3
177 cover Digital watermarking and steganography [2nd ed] Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker 2
178 cover Network security : know it all James B D Joshi, et al
179 cover Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking) Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi
180 cover Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking) Jan L. Harrington
181 cover Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking) [1 ed.] John Strassner 1
182 cover Digital Watermarking [1st ed.] Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller 1
183 cover Virus: Detection and Elimination [Pap/Dskt ed.] Rune Skardhamar
184 cover Security in Ad-hoc and Sensor Networks (Computer and Network Security) Raheem Beyah, Janise Mcnair, Cherita Corbett
185 cover Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) Jeffrey Pawlick, Quanyan Zhu
186 cover Cyber Security Applications for Industry 4.0 R Sujatha, G Prakash, Noor Zaman Jhanjhi
187 cover AI-Based Metaheuristics for Information Security and Digital Media (Advances in Metaheuristics) [1 ed.] Apoorva S Shastri (editor), Mangal Singh (editor), Anand J. Kulkarni (editor), Patrick Siarry (editor) 1
188 cover Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems) Bishwajeet Pandey, Shabeer Ahmad
189 cover Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia 1
190 cover Cyber Security Threats and Challenges Facing Human Life [1 ed.] Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) 1
191 cover Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) 1
192 cover Introduction to Machine Learning with Applications in Information Security (Chapman & Hall/CRC Machine Learning & Pattern Recognition) [2 ed.] Mark Stamp 2
193 cover Cybersecurity: A Practical Engineering Approach Henrique M. D. Santos
194 cover Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh
195 cover Phishing Detection Using Content-Based Image Classification Shekhar Khandelwal, Rik Das
196 cover Security Analytics: A Data Centric Approach to Information Security [1 ed.] Mehak Khurana, Shilpa Mahajan 1
197 cover CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) Brent Chapman
198 cover Zero Trust Security: An Enterprise Guide Jason Garbis, Jerry W. Chapman
199 cover Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (Chapman & Hall/CRC Internet of Things) [1 ed.] Chinmay Chakraborty (editor), Sree Ranjani Rajendran (editor), Muhammad Habibur Rehman (editor) 1
200 cover Cyberspace, Data Analytics, and Policing [1 ed.] David Skillicorn 1
201 cover Cloud Security: Attacks, Techniques, Tools, and Challenges [1 ed.] Preeti Mishra, Emmanuel S Pilli, R C Joshi 1
202 cover Protecting Your Privacy in a Data-Driven World Claire McKay Bowen
203 cover Internet of Things and Secure Smart Environments: Successes and Pitfalls Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
204 cover Security Risk Models for Cyber Insurance Caroline Baylon, Jose Vila, David Rios Insua
205 cover Artificial intelligence safety and security [First edition.] Yampolskiy, Roman V.
206 cover Emerging security algorithms and techniques [1st ed.] Ahmad, Khaleel, Doja, M. N., Singh, Manu, Udzir, Nur Izura 1
207 cover Security for software engineers Helfrich, James N
208 cover Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) Maymi, Fernando,Chapman, Brent,Parker, Jeff T
209 cover The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart Cities Termanini, Rocky
210 cover Data privacy: principles and practice Nataraj Venkataramanan, Ashwin Shriram
211 cover CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide Fernando Maymi, Brent Chapman
212 cover Introduction to Machine Learning with Applications in Information Security [1 ed.] Mark Stamp 1
213 cover Network performance and security : testing and analyzing using open source and low-cost tools [1 ed.] Chapman, Chris 1
214 cover Managing Trust in Cyberspace Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
215 cover Implementing Cisco IOS network security (IINS): (CCNA Security Exam 640-553) (Authorized self-study guide) Chapman, David W., Whitaker, Andrew, Paquet, Catherine
216 cover Introduction to Network Security [Online-ausg ed.] Jacobson, Douglas
217 cover Building Internet Firewalls: Internet and Web security [2nd ed] Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman 2
218 cover Building Internet Firewalls D. Brent Chapman
219 cover Privacy for Sale: How Big Brother and Others Are Selling Your Private Secrets for Profit [1 ed.] Michael E. Chesbro 1
220 cover Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition [2 ed.] James E Fitzpatrick, Joseph G Morelli 2
221 cover Fighting Terror in Cyberspace Mark Last, Abraham Kandel
222 cover Cyber Infrastructure for the Smart Electric Grid Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser
223 cover Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security [1 ed.] Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot 1
224 cover Security and Privacy Vision in 6G: A Comprehensive Guide [Team-IRA] [1 ed.] Pawani Porambage, Madhusanka Liyanage 1
225 cover Cybersecurity in Intelligent Networking Systems (IEEE Press) [1 ed.] Shengjie Xu, Yi Qian, Rose Qingyang Hu 1
226 cover Deep Learning Approaches for Security Threats in IoT Environments Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash
227 cover Game Theory and Machine Learning for Cyber Security [1 ed.] Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) 1
228 cover Intelligent Security Systems. How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security Leon Reznik
229 cover Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program [1 ed.] John Jackson 1
230 cover The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity Dan Shoemaker, Anne Kohnke, Ken Sigler
231 cover Assured cloud computing [First edition] Campbell, Roy Harold, Kamhoua, Charles A., Kwiat, Kevin A
232 cover DNS security management Michael Dooley: Timothy Rooney
233 cover Artificial Immune System: Applications in Computer Security [1 ed.] Ying Tan 1
234 cover Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures Houmansadr, Amir, Mazurczyk, Wojciech, Szczypiorski, Krzysztof, Wendzel, Steffen, Zander, Sebastian
235 cover Secure Messaging on the Internet Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Avrum Goldberg, Matthew Smith
236 cover Vehicular Ad Hoc Network Security and Privacy [1 ed.] Xiaodong Lin, Rongxing Lu 1
237 cover Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [2nd ed] Jacobs, Stuart 2
238 cover Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [1 ed.] Stuart Jacobs 1
239 cover Network Security: Current Status and Future Directions
240 cover Electronic watermarking the first 50 years Cox Miller
241 cover Practical Cryptography for Internetworks [1 ed.] William Stallings 1
242 cover Information security : an integrated collection of essays [[2. Dr.] ed.] Marshall D. Abrams (editor),Sushil Jajodia (editor), Harold J. Podell (editor) 2
243 cover Stealing the Network: How to Own an Identity Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Timothy Mullen
244 cover Information security management handbook [7, 6 ed.] Richard O'Hanley, James S. Tiller (editor) 6
245 cover Weaponizing Cyberspace Nicholas Michael Sambaluk
246 cover Cyber Warfare Rosenzweig, Paul
247 cover Mobile and Wireless Networks Security Maryline Laurent-Maknavickius, Hakima Chaouchi
248 cover Ethical hacking and countermeasures. Book 4 of 4, Secure network operating systems and infrastructures [2nd edition] EC-Council Press,, International Council of E-Commerce Consultants 2
249 cover Hands-On Ethical Hacking and Network Defense (MindTap Course List) [4 ed.] Rob Wilson 4
250 cover Principles of Information Security [7 ed.] Michael E. Whitman, Herbert J. Mattord 7
251 cover Comptia Security+ Guide to Network Security Fundamentals [7 ed.] Mark Ciampa 7
252 cover Principles of Incident Response & Disaster Recovery (MindTap Course List) [3 ed.] Michael E. Whitman, Herbert J. Mattord 3
253 cover Guide to Firewalls and VPNs [3rd ed.] Michael E. Whitman, Herbert J. Mattord, Andrew Green 3
254 cover Management of Information Security [6 ed.] Michael E. Whitman, Herbert J. Mattord 6
255 cover Principles of Information Security [6 ed.] Whitman, Michael, Mattord, Herbert 6
256 cover Hands-On Ethical Hacking and Network Defense [Third ed.] Michael T. Simpson, Nicholas Antill
257 cover Guide to computer forensics and investigations : processing digital evidence [Fifth edition] Nelson, Bill, Phillips, Amelia, Steuart, Christopher
258 cover Principles of Information Security [5 ed.] Michael E. Whitman, Herbert J. Mattord 5
259 cover Management of Information Security [5 ed.] Michael E. Whitman, Herbert J. Mattord 5
260 cover CompTIA Security+ Guide to Network Security Fundamentals [5th ed.] Mark Ciampa 5
261 cover Guide to Network Defense and Countermeasures [3 ed.] Randy Weaver, Dawn Weaver, Dean Farwood 3
262 cover Hands-On Ethical Hacking and Network Defense [1 ed.] Backman, Kent, Corley, James E., Simpson, Michael T 1
263 cover Management of Information Security [4 ed.] Michael E. Whitman, Herbert J. Mattord 4
264 cover Guide to Network Security [1st ed.] Michael E. Whitman et al. 1
265 cover EIS: Inspection Testing and Commissioning [Applied Mathematics] Malcolm Doughton, John Hooper
266 cover Readings and cases in information security : law and ethics Michael E Whitman, Herbert J Mattord
267 cover Guide to Computer Forensics and Investigations Bill Nelson, Amelia Phillips, Christopher Steuart 3
268 cover CISSP Guide to Security Essentials P. Gregory
269 cover Access controlled: the shaping of power, rights, and rule in cyberspace [1 ed.] Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti 1
270 cover Computer forensics: investigating wireless networks and devices EC-Council Press
271 cover Computer Evidence: Collection And Preservation [2nd Edition] Christopher LT Brown 2
272 cover Security awareness: applying practical security in your world [3. ed] Ciampa, Mark D 3
273 cover Computer Forensics: Investigating Network Intrusions and Cybercrime [1 ed.] EC-Council 1
274 cover Security+ Guide to Network Security Fundamentals Mark D Ciampa 3
275 cover Ethical Hacking and Countermeasures: Threats and Defense Mechanisms [1 ed.] EC-Council 1
276 cover Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems [1 ed.] EC-Council 1
277 cover Secure Network Infrastructures EC-Council 1
278 cover Web 2.0 Security: defending Ajax, Ria, and Soa [1 ed.] Shreeraj (Shreeraj Shah) Shah 1
279 cover A Practical Guide to Managing Information Security (Artech House Technology Management Library) [illustrated edition] Steve Purser
280 cover Access Contested: Security, Identity, and Resistance in Asian Cyberspace Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain
281 cover An Information Security Handbook [1 ed.] John M. D. Hunter BA (Hons), FBCS, CEng (auth.) 1
282 cover Borders in Cyberspace: Information Policy and the Global Information Infrastructure [1 ed.] Brian Kahin, Charles R. Nesson 1
283 cover Computer and intrusion forensics George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rodney McKemmish
284 cover Contemporary Cryptography Rolf Oppliger
285 cover Coordinating the Internet edited by Brian Kahin and James H. Keller.
286 cover Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks Josephine Wolff
287 cover Cybersecurity [1 ed.] Duane C. Wilson 1
288 cover International Relations in the Cyber Age: The Co-Evolution Dilemma Nazli Choucri, David D. Clark
289 cover Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings [v. 22, 1 ed.] Steve Barker (auth.), Vijay Atluri (eds.) 1
290 cover Data Security Breaches and Privacy in Europe [1 ed.] Rebecca Wong (auth.) 1
291 cover EC2ND 2005: Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK [1 ed.] Liwen He, Nikolai Bode (auth.), Andrew Blyth BSc, MSc, PhD (eds.) 1
292 cover EC2ND 2006: Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK [1 ed.] Andrew Blyth BSc, MSc, PhD, Iain Sutherland BSc, MSc, PhD (auth.) 1
293 cover End-to-End Encrypted Messaging Rolf Oppliger
294 cover Governing Global Electronic Networks: International Perspectives on Policy and Power William J. Drake, Ernest J. Wilson III
295 cover Hacker States [First Edition] Follis, Luca, Fish, Adam,, Adam Fish
296 cover High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace Peter Ludlow, Loyd Blankenship
297 cover Implementing the ISO / IEC 27001 ISMS Standard [2 ed.] Edward Humphreys 2
298 cover Information Assurance: Security in the Information Environment [2 ed.] Andrew Blyth BSc, MSc, PhD, Gerald L. Kovacich MA, MSc, D.Crim (auth.) 2
299 cover Introduction to Identity-Based Encryption (Information Security and Privacy Series) [1 ed.] Luther Martin 1
300 cover Lifecycle IoT Security for Engineers Kaustubh Dhondge
301 cover Medical Device Cybersecurity for Engineers and Manufacturers Axel Wirth, Christopher Gates, Jason Smith
302 cover Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) Michael Roytman and Ed Bellis
303 cover Multicast and Group Security (Artech House Computer Security Series) Thomas Hardjono, Lakshminath R. Dondeti,
304 cover Networks and states: the global politics of Internet governance [First MIT Pbk. ed] Mueller, Milton
305 cover New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) Howard Shrobe, David L. Shrier, Alex Pentland
306 cover Outsourcing Information Security C. Warren Axelrod
307 cover Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems [1 ed.] Javier Herranz, Jordi Nin (auth.), Jordi Nin, Javier Herranz (eds.) 1
308 cover Computer Forensics and Privacy Michael A. Caloyannides 2
309 cover Privacy vs. Security [1 ed.] Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan (auth.) 1
310 cover Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues [1 ed.] Sanjib Sinha 1
311 cover Researching Internet Governance: Methods, Frameworks, Futures [1 ed.] Laura DeNardis, Derrick Cogburn, Nanette S. Levinson, Francesca Musiani 1
312 cover Resistance To The Current: The Dialectics Of Hacking [1 ed.] Johan Söderberg, Maxigas 1
313 cover Ruling the root: Internet governance and the taming of cyberspace Mueller, Milton
314 cover Secure Data Networking Michael Purser
315 cover Secure Information Management Using Linguistic Threshold Approach [1 ed.] Marek R. Ogiela, Urszula Ogiela (auth.) 1
316 cover Secure Messaging On The Internet Rolf Oppliger
317 cover Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers [1 ed.] Zhiyun Qian, Z. Morley Mao, Ammar Rayes, David Jaffe (auth.), Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis (eds.) 1
318 cover Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad
319 cover Smart Grid Security [1 ed.] Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou, Dariusz Kloza (auth.) 1
320 cover Social Engineering: How Crowdmasters, Phreaks, Hackers, And Trolls Created A New Form Of Manipulative Communication [1 ed.] Robert W. Gehl, Sean T Lawson 1
321 cover CEHV8 - Module 03 - Labs Scanning Networks.pdf
322 cover CEHv8 Module 03 Scanning Networks.pdf
323 cover SSL and TLS: Theory and Practice (Information Security and Privacy) Rolf Oppliger
324 cover SSL and TLS: Theory and Practice [2 ed.] Rolf Oppliger 2
325 cover Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
326 cover Cisco ASA Firewall Fundamentals, 3rd Edition Harris Andrea
327 cover Fundamentals of Network Security John E. Canavan
328 cover The New Hacker's Dictionary - 3rd Edition [3 ed.] Eric S. Raymond 3
329 cover Co-ordinated Port Scans
330 cover The official PGP user's guide Zimmermann, Philip R.
331 cover Tor Darknet series: Master the Art of Invisibility Lance Henderson
332 cover The secure information society: ethical, legal and political challenges [1 ed.] Chris Bronk (auth.), Jörg Krüger, Bertram Nickolay, Sandro Gaycken (eds.) 1
333 cover The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing Arun Vishwanath
334 cover Critical Infrastructures State of the Art in Research and Application [1 ed.] P. M. Herder, W. A. H. Thissen (auth.), W. A. H. Thissen, P. M. Herder (eds.) 1
335 cover We, the Data : Human Rights in the Digital Age Wendy H. Wong
336 cover Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P Robert W. Gehl
337 cover You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy) Josephine Wolff, Sandra Braman, Paul T. Jaeger
338 cover Your Computer Is on Fire Thomas S. Mullaney, Benjamin Peters, Mar Hicks, Kavita Philip
339 cover CEHV8 - Module 03 - Scanning Networks.pdf
340 cover Ethical Hacking and Countermeasures: Secure Network Infrastructures EC-Council
341 cover Privacy, Regulations, And Cybersecurity: The Essential Business Guide [1st Edition] Chris Moschovitis 1
342 cover Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit Sagar Rahalkar
343 cover Rtfm: Red Team Field Manual Ben Clark
344 cover Scanning Applications 2.0 Next generation scan, attacks and tools
345 cover Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide
346 cover SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Xun Yi
347 cover Secure connected objects Huon, Jean-Paul, Paret, Dominique
348 cover Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition [3 ed.] David R. Miller, Michael Gregg 3
349 cover Security engineering: a guide to building dependable distributed systems Ross J. Anderson 2
350 cover Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges Qing Li, Gregory Clark
351 cover Applied Incident Response [1 ed.] Steve Anson 1
352 cover Beyond cybersecurity: protecting your digital business Kaplan, James M,Bailey, Tucker,O'Halloran, Derek,Marcus, Alan J
353 cover Carry On: Sound Advice from Schneier on Security Schneier, Bruce
354 cover CEH Certified Ethical Hacker Study Guide Graves, Kimberly
355 cover CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions Ric Messier
356 cover CEHv8: Certified Ethical Hacker Version 8 Study Guide Oriyano, Sean-Philip
357 cover Cehv9: Certified Ethical Hacker Version 9 [3rd ed] Oriyano, Sean-Philip 3
358 cover CISSP for Dummies [6th edition] Gregory, Peter H.,Miller, Lawrence C 6
359 cover CISSP official (ISC)² practice tests Chapple, Mike,Seidl, David
360 cover CISSP Official (ISC)2 Practice Tests Mike Chapple, David Seidl 2
361 cover CISSP: Certified Information Systems Security Professional Study Guide [5th ed.] James M. Stewart, Ed Tittel, Mike Chapple 5
362 cover Communications and Information Infrastructure Security John G. Voeller 1
363 cover CompTIA CySA+ Study Guide: Exam CS0-001 Mike Chapple, David Seidl
364 cover CompTIA Security+ Deluxe Study Guide [1st edition] Dulaney, Emmett 1
365 cover CompTIA Security+ Review Guide: Sy0-201 Stewart, James M.
366 cover Computer Fraud Casebook: The Bytes That Bite [1. ed.] Joseph T. Wells (editor) 1
367 cover Computer Security Handbook [1, Sixth edition] Seymour Bosworth, Michel E. Kabay, Eric Whyne 1
368 cover Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk [1. ed.] Andrew Gorecki 1
369 cover Cyber Security Voeller, John G.
370 cover Cyber Security Policy Guidebook Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt
371 cover Cyber smart: five habits to protect your family, money, and identity from cyber criminals McDonough, Bart R
372 cover Cyber-risk informatics: engineering evaluation with data science Sahinoglu, Mehmet
373 cover Cybersecurity and Third-Party Risk: Third Party Threat Hunting Gregory C. Rasner
374 cover Cybersecurity In Humanities And Social Sciences: A Research Methods Approach [1, 1st Edition] Hugo Loiseau, Daniel Ventre, Hartmut Aden 1
375 cover Cybersecurity in Our Digital Lives Mowbray, Thomas J, LeClair, Jane
376 cover Cybersecurity of Industrial Systems Jean-Marie Flaus
377 cover Cybersecurity Program Development for Business: The Essential Planning Guide [1 ed.] Moschovitis, Christos J. P 1
378 cover Data Security For Dummies®, Immuta Special Edition [1 ed.] Steve Kaelble 1
379 cover Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States Matthew Webster
380 cover Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes, Dr. John N. Just
381 cover Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming [1. ed.] Matthew Hickey 1
382 cover Industrial Cyber Security for Dummies. David Meltzer and Jeff Lund
383 cover Information security governance: a practical development and implementation approach Brotby, W. Krag
384 cover Information Security: Principles and Practice Mark Stamp 2
385 cover Access Control Systems: Security, Identity Management and Trust Models [1 ed.] Dr. Messaoud Benantar (auth.) 1
386 cover Network Attacks and Exploitation: A Framework Matthew Monte
387 cover Network Forensics John Wiley and Sons,Messier, Ric
388 cover Next-Generation Firewalls For Dummies [2 ed.] Lawrence Miller 2
389 cover Phishing dark waters the offensive and defensive sides of malicious e-mails Dreeke, Robin,Fincher, Michele,Hadnagy, Christopher
390 cover Privacy Means Profit: Prevent identity theft and secure you and your bottom line [1 ed.] John D. Sileo 1
391 cover Schneier on Security Schneier, Bruce
392 cover Secrets and Lies: Digital Security in a Networked World [15th Anniversary Edition] Schneier, Bruce 15
393 cover Security 2020: reduce security risks this decade Schneier, Bruce, Howard, Doug, Prince, Kevin &, Kevin Prince
394 cover Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack Wallace, Matthew,Ottenheimer, Davi
395 cover Security and privacy in the digital era Volume 1 Guerrier, Claudine
396 cover Security designs for the cloud, IoT, and social networking [First edition] Bhatt, Chintan M., Le, Dac-Nhuong, Madhukar, Mani
397 cover Security Engineering: A Guide to Building Dependable Distributed Systems [3° ed.] Ross Anderson 3
398 cover Security Fundamentals Crystal Panek
399 cover Security Technologies and Social Implications Markarian, Garik,Karlovic, Ruza,Nitsch, Holger,Chandramouli, Krishna,, Ru?a Karlovi?, Holger Nitsch, Krishna Chandramouli
400 cover Security, privacy and digital forensics in the cloud Chen, Lei, Le-Khac, Nhien-An, Takabi, Hassan
401 cover Social Engineering Christopher Hadnagy
402 cover Social Engineering The Science of Human Hacking [2nd Edition] Christopher Hadnagy 2
403 cover Social engineering: the art of human hacking Hadnagy, Christopher, Wilson, Paul
404 cover The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers Simon, William L., Mitnick, Kevin D.
405 cover The death of the internet Markus Jakobsson
406 cover The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity Phil Quade
407 cover The Official (ISC)2 Guide to the SSCP CBK Gordon, Adam,Hernandez, Steven 4
408 cover The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter, Kai Roer
409 cover Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors [1. ed.] Perry Carpenter 1
410 cover Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity [1. ed.] Marcus J. Carey, Jennifer Jin 1
411 cover Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity Leadership [1st Edition] Marcus J. Carey, Jennifer Jin 1
412 cover Tribe Of Hackers: Cybersecurity Advice From The Best Hackers In The World Marcus J. Carey, Jennifer Jin
413 cover Vulnerability management for dummies Qualys
414 cover We Have Root: Even More Advice From Schneier On Security [1st Edition] Bruce Schneier 1
415 cover WHOIS running the Internet : protocol, policy, and privacy [1 ed.] Garth O. Bruen 1
416 cover Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework Bullock, Jessey,Kadijk, Jan
417 cover Advances in Information Security Management & Small Systems Security [1 ed.] Les Labuschagne (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon (eds.) 1
418 cover Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium [1 ed.] Hideki Sakurada, Yasuyuki Tsukada (auth.), Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen (eds.) 1
419 cover Disseminating Security Updates at Internet Scale Jun Li, Peter Reiher, Gerald J. Popek (auth.) 1
420 cover Critical Information Infrastructures: Resilience and Protection [1 ed.] Director Maitland Hyslop (auth.) 1
421 cover Critical Infrastructure Protection [1 ed.] Neil Robinson, Lorenzo Valeri (auth.), Associate Director Eric Goetz, Professor Sujeet Shenoi (eds.) 1
422 cover Critical Infrastructure Protection II [1 ed.] Scott Dynes (auth.), Mauricio Papa, Sujeet Shenoi (eds.) 1
423 cover Cyber Situational Awareness: Issues and Research [1 ed.] Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) 1
424 cover Data and Application Security: Developments and Directions [1 ed.] Gio Wiederhold (auth.), Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari (eds.) 1
425 cover Data Warehousing and Data Mining Techniques for Cyber Security [1 ed.] Anoop Singhal (auth.) 1
426 cover Economics of information security and privacy [1 ed.] Tyler Moore, David Pym, Christos Ioannidis (auth.), Tyler Moore, David Pym, Christos Ioannidis (eds.) 1
427 cover Electronic Healthcare Information Security [1 ed.] Professor Charles A. Shoniregun, Dr. Kudakwashe Dube, Dr. Fredrick Mtenzi (auth.) 1
428 cover Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA [1 ed.] Colin J. Armstrong (auth.), Lynn Futcher, Ronald Dodge (eds.) 1
429 cover Global Initiatives to Secure Cyberspace: An Emerging Landscape [1 ed.] Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) 1
430 cover Hop Integrity in the Internet [1 ed.] Prof. Chin-Tser Huang, Dr. Mohamed G. Gouda (auth.) 1
431 cover Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES) [1 ed.] Charles A. Shoniregun (auth.) 1
432 cover Information Security -the Next Decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95 Jan H. P. Eloff, Sebastiaan H. von Solms (eds.)
433 cover Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China [1 ed.] Kai Rannenberg (auth.), Sihan Qing, Jan H. P. Eloff (eds.) 1
434 cover Information Security Governance [1 ed.] S.H. Solms, Rossouw Solms (auth.) 1
435 cover Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark [1 ed.] A. K. Stanley (auth.), Louise Yngström, Jan Carlsen (eds.) 1
436 cover Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands [1 ed.] Rüdiger Weis (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren (eds.) 1
437 cover Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France Johan Van Niekerk, Rossouw Von Solms (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) 1
438 cover Information Systems Security: Facing the information society of the 21st century Sokratis K. Katsikas, Dimitris Gritzalis (eds.)
439 cover Insider Threats in Cyber Security [1 ed.] Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) 1
440 cover Intelligence and Security Informatics for International Security: Information Sharing and Data Mining [1 ed.] Hsinchun Chen Ph.D. (auth.) 1
441 cover Malware Detection [1 ed.] Brian Witten, Carey Nachenberg (auth.), Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (eds.) 1
442 cover Managing Information Risk and the Economics of Security [1 ed.] M. Eric Johnson (auth.), M. Eric Johnson (eds.) 1
443 cover Network Infrastructure Security [1 ed.] Alan Yeung, Angus Wong (auth.) 1
444 cover Network Intrusion Detection and Prevention: Concepts and Techniques [1 ed.] Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee (auth.) 1
445 cover Network Security [1 ed.] Carlo Blundo, Stelvio Cimato, Barbara Masucci (auth.), Scott C.-H. Huang, David MacCallum, Ding-Zhu Du (eds.) 1
446 cover Network Security Policies and Procedures [1 ed.] Douglas W. Frye (auth.) 1
447 cover Network-Aware Security for Group Communications [1 ed.] Yan Sun, Wade Trappe, K. J. R. Liu (auth.) 1
448 cover Networking Security and Standards [1 ed.] Weidong Kou (auth.) 1
449 cover New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa [1 ed.] John Haggerty, Mark Taylor (auth.), Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms (eds.) 1
450 cover Online Business Security Systems [1 ed.] Godfried B. Williams (auth.) 1
451 cover Open Source Software for Digital Forensics [1 ed.] Stefano Zanero, Ewa Huebner (auth.), Ewa Huebner, Stefano Zanero (eds.) 1
452 cover Practical Internet Security [1 ed.] John R. Vacca (auth.) 1
453 cover Preserving Privacy in Data Outsourcing [1 ed.] Sara Foresti (auth.) 1
454 cover Preserving Privacy in On-Line Analytical Processing (OLAP) [1 ed.] Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (auth.) 1
455 cover Principles of Data Security [1 ed.] Ernst L. Leiss (auth.) 1
456 cover Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy [1 ed.] Karsten Nohl, David Evans (auth.), Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (eds.) 1
457 cover Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain Lawrence H. Cox (auth.), Csilla Farkas, Pierangela Samarati (eds.) 1
458 cover Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK András Belokosztolszki, David Eyers (auth.), Ehud Gudes, Sujeet Shenoi (eds.) 1
459 cover Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden [1 ed.] Inger Anne Tøndel (auth.), Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog (eds.) 1
460 cover Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece [1 ed.] Brian Toone, Michael Gertz, Premkumar Devanbu (auth.), Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas (eds.) 1
461 cover Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France Mohamed Hamdi, Noureddine Boudriga (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) 1
462 cover Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA Dorothy E. Denning (auth.), Cynthia Irvine, Helen Armstrong (eds.) 1
463 cover Security of Data and Transaction Processing [1 ed.] Vijay Atluri, Pierangela Samarati (auth.), Vijay Atluri, Pierangela Samarati (eds.) 1
464 cover Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security [1 ed.] Edna Reid, Dr. Hsinchun Chen (auth.), Dr. Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor (eds.) 1
465 cover Vulnerability Analysis and Defense for the Internet [1 ed.] Abhishek Singh, Baibhav Singh, Hirosh Joseph (auth.), Abhishek Singh, Baibhav Singh, Hirosh Joseph (eds.) 1
466 cover Wireless Network Security [1 ed.] Jonathan Lutz, M. Anwarul Hasan (auth.), Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du (eds.) 1
467 cover The Information Security Dictionary Defining The Terms That Define Security For E-Business, Internet, Information And Wireless Technology Urs E. Gattiker
468 cover Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
469 cover Striking Back: The End of Peace in Cyberspace - And How to Restore It [1 ed.] Lucas Kello 1
470 cover Listening In: Cybersecurity in an Insecure Age Susan Landau
471 cover Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices [1 ed.] William Stallings 1
472 cover Database and Application Security: A Practitioner's Guide [1 ed.] R. Sarma Danturthi 1
473 cover Network Security: PRIVATE Communication in a PUBLIC World, Third Edition Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
474 cover Ransomware and Cyber Extortion: Response and Prevention [1 ed.] Sherri Davidoff, Matt Durrin, Karen Sprenger 1
475 cover Securing 5G and Evolving Architectures [1 ed.] Pramod Nair 1
476 cover Modern Security Operations Center, The [1 ed.] Joseph Muniz 1
477 cover Data Breaches: Crisis and Opportunity [1 ed.] Sherri Davidoff 1
478 cover Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services [1 ed.] Silvano Gai 1
479 cover Computer Security [Art and Science] [2nd ed.] Matthew Bishop 2
480 cover Effective Cybersecurity: A Guide to Using Best Practices and Standards [1 ed.] William Stallings 1
481 cover Cyber Security Engineering A Practical Approach for Systems and Software Assurance Carol Woody, Nancy R. Mead
482 cover Extrusion detection: security monitoring for internal intrusions Bejtlich, Richard
483 cover Troubleshooting Linux Firewalls Michael Shinn, Scott Shinn
484 cover The Executive Guide to Information Security: Threats, Challenges, and Solutions [1 ed.] Mark Egan, Tim Mather 1
485 cover Firewalls and Internet Security: Repelling the Wily Hacker [2 ed.] William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin 2
486 cover Managing information security risks: the OCTAVE approach Christopher Alberts, Audrey Dorofee
487 cover Inside Internet Security: What Hackers Don't Want You To Know [1 ed.] Jeff Crume 1
488 cover Linux Firewalls: Enhancing Security with nftables and Beyond [4th ed.] Steve Suehring 4
489 cover SSL and TLS: Designing and Building Secure Systems Eric Rescorla
490 cover Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn Step by Step How to Professionally Code and Protect Your Data. This Book Includes: Python, Java, C ++ and Cybersecurity Grid, Alan
491 cover Cyber Minds Shira Rubinoff
492 cover CompTIA CySA+ Practice Exams Dion, Jason
493 cover Next Generation Red Teaming Henry Dalziel
494 cover Build Your Own Cybersecurity Testing Lab Ric Messier
495 cover Agile Application Security Laura Bell
496 cover Developing Cybersecurity Programs and Policies, Third Edition (Christopher Mandelaris' Library) Omar Santos 3
497 cover Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative
498 cover Computer Networking First-Step: An introductory guide to understanding wireless and cloud technology, basic communications services and network security for beginners Laurence, Norman
499 cover Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and Cody, Isaac D
500 cover Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to Hack Websites, Smartphones, Wireless Networks) + Linux Basic for Hackers (Command line and all the essentials) + Hacking with Kali Linux Julian James McKinnon
501 cover Penetration Testing For Dummies Robert Shimonski
502 cover The Pocket Guide to Cyber Security James H &amp, Usha D
503 cover HAZ CLIC AQUÍ PARA MATARLOS A TODOS Bruce Schneier
504 cover Basic Security Testing with Kali Linux Dieterle, Daniel
505 cover CEH - Ethical Hacking and Countermeasures v11 (CEH11) EC-Council
506 cover CEH v11 - Appendix A F3thinker !
507 cover CEH v11 - Appendix B F3thinker !
508 cover CEH v11 - Module 1 F3thinker !
509 cover CEH v11 - Module 10 F3thinker !
510 cover CEH v11 - Module 11 F3thinker !
511 cover CEH v11 - Module 12 F3thinker !
512 cover CEH v11 - Module 13 F3thinker !
513 cover CEH v11 - Module 14 F3thinker !
514 cover CEH v11 - Module 15 F3thinker !
515 cover CEH v11 - Module 16 F3thinker !
516 cover CEH v11 - Module 17 F3thinker !
517 cover CEH v11 - Module 18 F3thinker !
518 cover CEH v11 - Module 19 F3thinker !
519 cover CEH v11 - Module 2 F3thinker !
520 cover CEH v11 - Module 20 F3thinker !
521 cover CEH v11 - Module 3 F3thinker !
522 cover CEH v11 - Module 4 F3thinker !
523 cover CEH v11 - Module 5 F3thinker !
524 cover CEH v11 - Module 6 F3thinker !
525 cover CEH v11 - Module 7 F3thinker !
526 cover CEH v11 - Module 8 F3thinker !
527 cover CEH v11 - Module 9 F3thinker !
528 cover CND - Exam 312-38 - Module 0 F3thinker !
529 cover CND - Exam 312-38 - Module 1 F3thinker !
530 cover CND - Exam 312-38 - Module 10 F3thinker !
531 cover CND - Exam 312-38 - Module 11 F3thinker !
532 cover CND - Exam 312-38 - Module 12 F3thinker !
533 cover CND - Exam 312-38 - Module 13 F3thinker !
534 cover CND - Exam 312-38 - Module 14 F3thinker !
535 cover CND - Exam 312-38 - Module 2 F3thinker !
536 cover CND - Exam 312-38 - Module 3 F3thinker !
537 cover CND - Exam 312-38 - Module 4 F3thinker !
538 cover CND - Exam 312-38 - Module 5 F3thinker !
539 cover CND - Exam 312-38 - Module 6 F3thinker !
540 cover CND - Exam 312-38 - Module 7 F3thinker !
541 cover CND - Exam 312-38 - Module 8 F3thinker !
542 cover CND - Exam 312-38 - Module 9 F3thinker !
543 cover Cybersecurity Blue Team Toolkit Nadean H. Tanner
544 cover Ghost in the Wires Kevin Mitnick
545 cover How to Hack a Hacker Sherwood, AJ
546 cover Incident Response & Computer Forensics Prosise, Chris., Mandia, Kevin.
547 cover Kali Linux CTF Blueprints Buchanan, Cam
548 cover Kali Linux: Assuring Security by Penetration Testing Lee Allen,Tedi Heriyanto,Shakeel Ali
549 cover Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware K A, Monnappa
550 cover Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides Cameron H. Malin, Eoghan Casey, James M. Aquilina
551 cover Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides Casey, Eoghan,Malin, Cameron H.,Aquilina, James M.
552 cover Mastering Kali Linux for Advanced Penetration Testing Beggs, Robert
553 cover Mastering Kali Linux Wireless Pentesting
554 cover Penetration Testing with Kali Linux 1 1 F3thinker !
555 cover Social Engineer Sutherland, Ian
556 cover The Network Bateman, E. G.
557 cover Untangle Network Security El-Bawab, Abd El-Monem A.
558 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance Chuvakin, Anton &amp, Williams, Branden R.
559 cover Bots: How to Detect and Prevent Them Dalziel, Max &amp, Bradley, Jaron
560 cover Turning BYOD Risk Into Mobile Security Strength Dalziel, Max &amp, Bradley, Jaron
561 cover Cyber Policy in China Greg Austin
562 cover Information Governance and Security Iannarelli, John G., OShaughnessy, Michael
563 cover Inside Anonymous Olson, Parmy
564 cover Core Software Security: Security at the Source James Ransome &amp, Anmol Misra
565 cover Multi-dimensional summarization in cyber-physical society Gregory S. Makowski 1
566 cover PCI Compliance. Implementing Effective PCI Data Security Standards Tony Bradley, James D. Burton, Jr., Anton Chuvakin, Dr., Anatoly Elberg, Brian Freedman, David King, Scott Paladino and Paul Shcooping (Eds.)
567 cover Guide to Computer Network Security Kizza, Joseph Migga
568 cover Seven Deadliest Microsoft Attacks Kraus, Rob &amp, Barber, Brian &amp, Borkin, Mike &amp, Alpern, Naomi
569 cover IoT Security Liyanage, Madhusanka, Braeken, An, Kumar, Pardeep
570 cover Python Passive Network Mapping Hosmer, Chet
571 cover The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Michael Hale Ligh &amp, Andrew Case &amp, Jamie Levy &amp, Aaron Walters
572 cover Wi Fi Security Miller, Stewart
573 cover Violent Python: a cookbook for hackers, forensic analysts, penetration testers, and security engineers O &, #39,Connor, TJ
574 cover What Is Computer Science?: An Information Security Perspective Page, Daniel &amp, Smart, Nigel
575 cover Cyber Adversary Characterization: Auditing the Hacker Mind Parker, Tom &amp, Sachs, Marcus &amp, Shaw, Eric &amp, Stroz, Ed
576 cover Safety of Computer Control Systems 1992 (Safecomp ' 92). Computer Systems in Safety-Critical Applications [1st ed.] H.H. Frey 1
577 cover Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals [1 ed.] Randy Harrison 1
578 cover Security Careers. Skills, Compensation, and Career Paths Stephen W. Walker and James E. Foushée (Auth.)
579 cover Mobile Data Loss: Threats and Countermeasures Raggo, Michael T.
580 cover Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Shavers, Brett
581 cover Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Shipley, Todd &amp, Bowker, Art &amp, Selby, Nick
582 cover Cisco Software-Defined Access Srilatha Vemula, Jason Gooley, Roddie Hasan
583 cover La cryptologie au coeur du numérique Stern, Jacques
584 cover Security Risk Management: Building an Information Security Risk Management Program From the Ground Up Wheeler, Evan
585 cover Integrated Security Technologies and Solutions - Volume I 1 1 Aaron Woland, Vivek Santuka, Mason Harris, Jamie Sanbower
586 cover GRC 300 SAP ACCESS CONTROL IMPLEMENTATION AND CONFIGURATION SAP TRAINING
587 cover Modern Cryptography.
588 cover IT-Sicherheitsmanagement - Das umfassende Praxis-Handbuch für IT-Security und technischen Datenschutz nach ISO 27001 Thomas W. Harich
589 cover Guide to Computer Network Security, Fourth Edition Joseph Migga Kizza 4
590 cover SASE For Dummies®, Versa Networks Special Edition 1 Kumar Mehta &amp, Apurva Mehta
591 cover Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial Intelligence Callaway, Jason
592 cover COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing Mach, Dylan
593 cover Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro HOFFMAN, HUGO &amp, HOFFMAN, HUGO
594 cover Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking With Kali Linux Kou, Jim
595 cover A Machine-Learning Approach to Phishing Detection and Defense Akanbi, O.A., Amiri, Iraj Sadegh, Fazeldehkordi, E.
596 cover Ciberseguridad para la i-generación: Usos y riesgos de las redes sociales y sus aplicaciones Giant, Nikki
597 cover Educar niños y adolescentes en la era digital: El reto de la educación en el siglo XXI Rodríguez, Nora
598 cover Cybersecurity Readiness Chatterjee, Dave
599 cover Ciberleviatán Lassalle, José María
600 cover Identity 5 Mar-Gerrison, Heather
601 cover Penetration Testing mit mimikatz Brabetz, Sebastian
602 cover Internet, Hackers y Software Libre Varios
603 cover Breaking into Information Security Josh More &amp, Anthony J. Stieber &amp, Chris Liu
604 cover Hacking: How to Make Your Own Keylogger in C++ Programming Language Norman, Alan T.
605 cover HACKING GMAIL: How to Hack Gmail HAT, BLACK
606 cover Black Hat Go Dan Kottmann &amp, Chris Patten &amp, Tom Steele
607 cover Black Ice Valmore James &amp, John Gallagher
608 cover Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow Karnel, Erickson
609 cover Cryptography & Network Security : Express Learning ITL Education Solutions Limited
610 cover Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying Henderson, Lance
611 cover Digitale Diktatur · Totalüberwachung Cyberkrieg Datenmissbrauch Aust, Stefan
612 cover Spurlos & Verschlüsselt! · Von sicherer Kommunikation und anonymem Surfen Gillen, Tobias
613 cover Transforming Information Security: Optimizing Five Concurrent Data Trends to Reduce Resource Drain Moriarty, Kathleen M.
614 cover Das Phantom im Netz: Die Autobiographie des meistgesuchten Hackers der Welt Mitnick, Kevin &amp, Simon, William M.
615 cover World Wide War: Angriff aus dem Internet Clarke, Richard A. &amp, Knake, Robert A.
616 cover The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack Levi West
617 cover Hacking: Fundamentals for Absolute Beginners Bell, Alexander
618 cover Infinity Ethical Hacking: Learn basic to advance hacks Sapp, Arthur S
619 cover The Hacker Playbook: Practical Guide To Penetration Testing Kim, Peter
620 cover Applied network security monitoring collection, detection, and analysis Bianco, David J.,Sanders, Chris,Smith, Jason
621 cover Android Forensics: Investigation, Analysis and Mobile Security for Google Android Andrew Hoog
622 cover Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework [1 ed.] Abraham, Ajin, Dalziel, Henry 1
623 cover Automating open source intelligence : algorithms for OSINT [1 ed.] Layton, Robert, Watters, Paul A 1
624 cover Becoming a global chief security executive officer : a how to guide for next generation security leaders [1 ed.] Cloutier, Roland 1
625 cover Building a corporate culture of security : strategies for strengthening organizational resiliency [1 ed.] Sullivant, John 1
626 cover Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency Sullivant, John
627 cover Breakdowns in Computer Security. Commentary and Analysis Michael E Rentell and Peter M Jenner (Auth.)
628 cover Building an information security awareness program: defending against social engineering and technical threats Gardner, Bill G.,Thomas, Valerie
629 cover Building an information security awareness program : defending against social engineering hacks [1 ed.] Bill Gardner 1
630 cover Cloud storage security : a practical guide [1 ed.] Wheeler, Aaron, Winburn, Michael 1
631 cover Cloud storage security a practical guide [Online-Ausg ed.] Wheeler, Aaron,Winburn, Michael
632 cover CISSP Study Guide [2nd ed] Feldman, Joshua, Misenar, Seth, Conrad, Eric,Seth Misenar,Joshua Feldman,Kevin Riggins 2
633 cover Computer Fraud & Security Journel
634 cover Computer Security in Financial Organisations J. Essinger (Auth.)
635 cover Computer Security David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick and Robert L. Ashenhurst (Auth.)
636 cover Computer Security [2nd ed.] John M. Carroll (Auth.) 2
637 cover Computers, Business, and Security. The New Role for Security James A Schweitzer (Auth.)
638 cover Cybersecurity and Applied Mathematics Casey, William,Metcalf, Leigh,William Casey
639 cover Cyber Security Awareness for CEOs and Management [1 ed.] Dalziel, Henry, Willson, David 1
640 cover Data Breach Preparation and Response Fowler, Kevvie
641 cover Data Protection and Security for Personal Computers. A Manager's Guide to Improving the Confidentiality, Availability and Integrity of Data on Personal Computers and Local Area Networks R. Schifreen (Auth.)
642 cover Data breach preparation and response - breaches are certain, impact is not Fowler, Kevvie (partner And National Cyber Response Leader
643 cover Data hiding fundamentals and applications : content security in digital media Husrev T Sencar, Ramkumar Mahalingam., Ali N Akansu
644 cover Cyber Security Awareness for Corporate Directors and Board Members Willson, David, Dalziel, Henry
645 cover Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols Hosmer, Chet,Raggo, Michael T.,McGrew, Wesley
646 cover Detecting and Combating Malicious Email [1 ed.] Julie JCH Ryan, Cade Kamachi 1
647 cover Digital forensics : threatscape and best practices [1 ed.] Sammons, John 1
648 cover Digital Forensics with Open Source Tools Altheide, Cory,Carvey, Harlan A.,Davidson, Ray
649 cover Digital Identity Management [1 ed.] Maryline Laurent, Samia Bouzefrane 1
650 cover Digital.Investigation.February
651 cover Dissecting the hack : the v3rb0ten network [1 ed.] Baskin, Brian, Martin, Brian, Sims, Kristin, Street, Jayson E 1
652 cover Firewalls: jumpstart for network and systems administrators John R Vacca, Scott Ellis
653 cover Eleventh Hour CISSP Study Guide [2 ed.] Conrad, Eric,Misenar, Seth,Feldman, Joshua,Riggins, Kevin 2
654 cover Eleventh Hour CISSP [3rd edition] Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman 3
655 cover Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Sudhanshu Chauhan, Nutan Kumar Panda
656 cover Handbook of Social Media Use Online Relationships, Security, Privacy, and Society Volume 2 John McAlaney,
657 cover How to Cheat at Configuring Open Source Security Tools [1 ed.] Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson 1
658 cover How to Cheat at Configuring Open Source Security Tools Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
659 cover Implementing digital forensic readiness: from reactive to proactive process Ivtchenko, Dmitri,Sachowski, Jason
660 cover Implementing database security and auditing : a guide for DBAs, information security administrators and auditors Ron Ben-Natan
661 cover Insider threat: prevention, detection, mitigration, and deterrence Turner, James,Gelles, Michael G
662 cover Information security science: measuring the vulnerability to data compromises Young, Carl S
663 cover Information Security. Playbook [1 ed.] Greg Kane and Lorna Koppel (Eds.) 1
664 cover Infosec Management Fundamentals [1 ed.] Dalziel, Henry 1
665 cover Information Security [First Edition] Marvin Zelkowitz
666 cover Introduction to cyber-warfare: a multidisciplinary approach [1 ed.] Paulo Shakarian, Jana Shakarian, Andrew Ruef 1
667 cover Introduction to US Cybersecurity Careers Dalziel, Max
668 cover Job reconnaissance: using hacking skills to win the job hunt game [1 ed.] Josh More 1
669 cover Elsevier's Dictionary of Information Security [Mul ed.] G. Manoilov, B. Radichkova
670 cover How to defeat advanced malware new tools for protection and forensics Crosby, Simon,Dalziel, Henry
671 cover Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis Baird, John,Shavers, Brett
672 cover Low Tech Hacking: Street Smarts for Security Professionals Gudaitis, Terry,Jabbusch, Jennifer,Lowther, Sean,Rogers, Russ,Wiles, Jack
673 cover Lossless Information Hiding in Images [1 ed.] Zhe-Ming Lu, Shi-Ze Guo 1
674 cover Managing online risk : apps, mobile, and social media security [1 ed.] Deborah Gonzalez 1
675 cover America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare Joel Brenner
676 cover Mobile Malware Attacks and Defense Ken Dunham
677 cover Network and System Security [2nd ed] Vacca, John R 2
678 cover No Tech Hacking Long, Johnny, Mitnick, Kevin D.
679 cover Ninja Hacking Unconventional Penetration Testing Tactics and Techniques Thomas Wilhelm, Jason Andress, Bryan (con) Garner
680 cover PCI Compliance [3rd edition] Chuvakin, Anton,Williams, Branden 3
681 cover PCI DSS 3.1. The Standard That Killed SSL [1 ed.] Williams, Branden R 1
682 cover Penetration tester's open source toolkit Faircloth, Jeremy 3
683 cover PCI Compliance [4th edition] Williams, Branden R.,Chuvakin, Anton.,Anton A. Chuvakin,Derek Milroy 4
684 cover Penetration Tester's Open Source Toolkit [4th edition] Faircloth, Jeremy,Rogers, T. Michael 4
685 cover Physical Security for IT Michael Erbschloe
686 cover Physical Security Guidelines. Template [1 ed.] Bob Hayes (Eds.) 1
687 cover Practical anonymity: hiding in plain sight online [1 ed.] Peter Loshin 1
688 cover Practical anonymity hiding in plain sight online Loshin, Peter
689 cover Preparing for Next Generation Security Leader Opportunities. Proven Practices Bob Hayes (Auth.)
690 cover Professional Penetration Testing. Creating and Operating a Formal Hacking Lab Thomas Wilhelm
691 cover Professional penetration testing: creating and learning in a hacking lab [2 ed.] Thomas Wilhelm 2
692 cover Protecting Information on Local Area Networks James A Schweitzer (Auth.)
693 cover Professional Penetration Testing [1st edition] Wilhelm, Thomas 1
694 cover Securing the Cloud: Cloud Computer Security Techniques and Tactics [1st ed.] Graham Speake, Patrick Foxhoven 1
695 cover Securing the cloud : cloud computer security techniques and tactics J R Winkler
696 cover Securing Social Media in the Enterprise [1 ed.] Dalziel, Henry 1
697 cover Security operations center guidebook - a practical guide for a successful s Mccoy, Scott (cpp Cissp Asis International (isc)2)
698 cover Security Leader Insights for Information Protection. Lessons and Strategies from Leading Security Professionals [1 ed.] Bob Fahy 1
699 cover Security controls evaluation, testing, and assessment handbook Johnson, Leighton
700 cover Securing SQL Server [3rd edition] Cherry, Denny 3
701 cover Security Leadership of the Future. Article Collection [1 ed.] Bob Hayes (Eds.) 1
702 cover Securing the Smart Grid: Next Generation Power Grid Security Tony Flick, Justin Morehouse
703 cover Seven Deadliest USB Attacks
704 cover Seven Deadliest Wireless Technologies Attacks Brad Haines (Auth.)
705 cover Seven deadliest social networks attacks Perez, Richard,Timm, Carl
706 cover Simple steps to data encryption: a practical guide to secure computing Loshin, Peter
707 cover Smart Grid Security. Innovative Solutions for a Modernized Grid [1 ed.] Florian Skopik, Paul Dr. Smith 1
708 cover Smart Cities Cybersecurity and Privacy Danda B. Rawat (editor), Kayhan Zrar Ghafoor (editor)
709 cover Smart Security : Proven Practices Quilter, J. David
710 cover Smart Security: Practices That Increase Business Profits. Proven Practices J. David Quilter (Auth.)
711 cover Social engineering penetration testing executing social engineering pen tests, assessments and defense Ackroyd, Richard,Mason, Andrew,Watson, Gavin
712 cover SQL injection attacks and defense Description based on print version record Clarke, Justin
713 cover The Basics of Information Security [2nd edition] Andress, Jason 2
714 cover The basics of hacking and penetration testing: ethical hacking and penetration testing made easy [2nd Edition] Engebretson, Patrick,David Kennedy 2
715 cover The basics of hacking and penetration testing: ethical hacking and penetration testing made easy Broad, James, Engebretson, Patrick Henry
716 cover The Basics of Information Security. Understanding the Fundamentals of Infosec in Theory and Practice [2 ed.] Jason Andress (Auth.) 2
717 cover Trojans, Worms, And Spyware A Computer Security Professional's Guide To Malicious Code
718 cover Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments Diane Barrett, Greg Kipper
719 cover Voice over Internet Protocol (VoIP) Security PhD, CISM, CISSP, James F. Ransome, PhD, CISM, John Rittinghouse
720 cover Wireless reconnaissance in penetration testing [recurso electrónico] Hamerstone, Alex,Neely, Matthew,Sanyk, Chris
721 cover Wireless reconnaissance in penetration testing [1 ed.] Neely, Matthew, Sanyk, Chris, Hamerstone, Alex 1
722 cover The History of Information Security: A Comprehensive Handbook Karl Maria Michael de Leeuw, Jan Bergstra
723 cover The Manager's Handbook for Business Security [2 ed.] George Campbell (Eds.) 2
724 cover Theoretical and Experimental Methods for Defending Against DDOS Attacks [1 ed.] Amiri, Iraj Sadegh, Soltanian, Mohammad Reza Khalifeh 1
725 cover Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals Paul Mungo
726 cover Prying Eyes : Protect Your Privacy From People Who Sell to You, Snoop on You, or Steal From You Eric Gertler
727 cover The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats Clarke, Richard Alan,Knake, Robert K
728 cover Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility Andrew Jones, Craig Valli
729 cover Cyber-Attacks and the Exploitable Imperfections of International Law [1 ed.] Yaroslav Radziwill 1
730 cover Cybersecurity (Computer Science Fundamentals) Edet, Theophilus
731 cover Cyber Attacks: Protecting National Infrastructure [1 ed.] Edward Amoroso 1
732 cover From Lambda calculus to cybersecurity through program analysis
733 cover Hacker: Hack The System: The "Ethical" Python Hacking Guide [4 ed.] Takehiro Kanegi, Alice Schwartz 4
734 cover Information Assurance: Managing Organizational IT Security Risks [1st ed.] Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security Manager European Command (EUCOM) 1
735 cover Information Governance and Security: Protecting and Managing Your Company's Proprietary Information John G. Iannarelli, Michael O'Shaughnessy
736 cover Managing Online Risk Apps, Mobile, and Social Media Security Deborah Gonzalez
737 cover Networked Control Systems: Cloud Control and Secure Control Magdi S. Mahmoud, Yuanqing Xia
738 cover Risk management for computer security : Protecting your network and information assets Andy Jones, Debi Ashenden
739 cover The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program [2 ed.] Gerald L. Kovacich CFE CPP CISSP 2
740 cover Seven Deadliest Web Application Attacks Shema, Mike
741 cover Hackers. au cœur de la résistance numérique Guiton Amaelle
742 cover The darkening web: the war for cyberspace Klimburg, Alexander
743 cover The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats [Original retail ed.] Richard A. Clarke, Robert K. Knake
744 cover The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War Geoff White
745 cover The Trust Manifesto: What you Need to do to Create a Better Internet Damian Bradfield
746 cover Cyber Arms; Security in Cyberspace Martellini, Stanislav Abaimov, Maurizio
747 cover Cyber Wars Charles Arthur
748 cover Hackear al hacker Roger A. Grimes
749 cover Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
750 cover Linux Firewalls Michael Rash
751 cover Next Level Cybersecurity: Detect the Signals, Stop the Hack Huda, Sai
752 cover Next Level Cybersecurity: Detect the Signals, Stop the Hack Sai Huda
753 cover Tout ce qu'il faut savoir pour protéger votre vie privée sur Internet David, Daniel-Jean
754 cover Gray Hat Hacking: The Ethical Hacker's Handbook [2nd edition] Safari, an O'Reilly Media Company., Eagle, Chris, Harper, Allen, Harris, Shon, Ness, Jonathan 2
755 cover AI Assurance: Towards Trustworthy, Explainable, Safe, and Ethical AI Feras A. Batarseh, Laura Freeman
756 cover Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) [1 ed.] Andrew A. Bochman, Sarah Freeman 1
757 cover Network Security with OpenSSL: Cryptography for Secure Communications John Viega, Matt Messier, Pravir Chandra
758 cover Practical Unix & Internet Security, 3rd Edition [3 ed.] Simson Garfinkel, Gene Spafford, Alan Schwartz 3
759 cover Managing Security with Snort & IDS Tools Gerg, Christopher,Cox, Kerry J
760 cover Network Security Tools [1 ed.] Nitesh Dhanjani, Justin Clarke 1
761 cover Internet Forensics R Jones
762 cover Network Security Assessment: Know Your Network Chris McNab
763 cover Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks [1 ed.] Chris Fry, Martin Nystrom 1
764 cover Snort Cookbook Biles, Simon,Orebaugh, Angela,Babbin, Jacob
765 cover Network Security Hacks [Second Edition] Andrew Lockhart
766 cover 97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts [1 ed.] Christina Morillo 1
767 cover Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware [1 ed.] Cassie Crossley 1
768 cover Policy as Code: Improving Cloud Native Security [1 ed.] Jimmy Ray 1
769 cover Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security [1 ed.] Russ Miles, Stephen Giguere, Taylor Smith 1
770 cover Cloud Native Security Cookbook: Recipes for a Secure Cloud [1 ed.] Josh Armitage 1
771 cover Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications Brendan Creane
772 cover Defensive Security Handbook: Best Practices for Securing Infrastructure [2 ed.] Amanda Berlin, Lee Brotherston, William Reyor III 2
773 cover Adversary Emulation with MITRE ATT&CK: Bridging the Gap between the Red and Blue Teams Drinor Selmanaj
774 cover Intelligence-Driven Incident Response: Outwitting the Adversary [2 ed.] Rebekah Brown, Scott Roberts 2
775 cover Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking [2 ed.] Ric Messier 2
776 cover Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust [1 ed.] Ev Kontsevoy, Sakshyam Shah, Peter Conrad 1
777 cover Web Application Security: Exploitation and Countermeasures for Modern Web Applications [2 ed.] Andrew Hoffman 2
778 cover Building a Cyber Risk Management Program: Evolving Security for the Digital Age [1 ed.] Brian Allen, Brandon Bapst, Terry Allan Hicks 1
779 cover Network Security Through Data Analysis: Building Situational Awareness [1 ed.] Michael Collins 1
780 cover JUNOS Security [1 ed.] Rob Cameron, Brad Woodberg, Timothy Eberhard, Patricio Giecco, James Quinn 1
781 cover Junos Security: A Practical Guide to Junos Enterprise Services Gateways, Software, and Certification Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn
782 cover Network Security Assessment: Know Your Network [3 ed.] Chris McNab 3
783 cover Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems [Paperback ed.] Josiah Dykstra
784 cover Intelligence-Driven Incident Response: Outwitting the Adversary [1 ed.] Scott J. Roberts, Rebekah Brown 1
785 cover In Search of Certainty: The Science of Our Information Infrastructure [2 ed.] Mark Burgess 1
786 cover Defensive Security Handbook: Best Practices for Securing Infrastructure [1 ed.] Lee Brotherston, Amanda Berlin 1
787 cover Network Security Through Data Analysis: From Data to Action [2 ed.] Michael Collins 2
788 cover Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line [Original retail ed.] Paul Troncone, Carl Albing
789 cover Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan [1 ed.] Jeff Bollinger, Brandon Enright, Matthew Valites 1
790 cover The Cybersecurity Manager's Guide: The Art of Building Your Security Program [1 ed.] Todd Barnum 1
791 cover Zero Trust Networks [2 ed.] Razi Rais, Christina Morillo, Evan Gilman, Doug Barth 2
792 cover Cyber Sovereignty: The Future of Governance in Cyberspace [1 ed.] Lucie Kadlecová 1
793 cover Protecting Networks with SATAN [1st English ed.] Martin Freiss 1
794 cover Practical Unix and Internet Security, 2nd Edition [Second Edition] Simson Garfinkel, Gene Spafford PH.D.
795 cover Sicherheit im Internet 3. Auflage - O'Reilly Basics [3 ed.] Krzysztof Janowicz 3
796 cover Hacking Exposed 7, 7th Edition [7th edition] Safari, an O'Reilly Media Company., Kurtz, George, McClure, Stuart, Scambray, Joel 7
797 cover Kenne deinen Feind. Fortgeschrittene Sicherheitstechniken Anton Chuvakin
798 cover Computer Security Fundamentals, 4th Edition [1st edition] Safari, an O'Reilly Media Company., Easttom, Chuck 1
799 cover The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [2nd edition] Safari, an O'Reilly Media Company., Engebretson, Patrick 2
800 cover Network Security Hacks [1st ed.] Andrew Lockhart 1
801 cover Network Security Assessment [1st ed.] Chris McNab 1
802 cover Network Security Assessment (2007)(2nd)(en)(478s) [2 ed.] Chris McNab 2
803 cover Network security assessment [2nd ed] Chris McNab 2
804 cover Inside cyber warfare: mapping the cyber underworld Carr, Jeffrey
805 cover CompTIA PenTest+ Cert Guide, First Edition [1st edition] Safari, an O'Reilly Media Company., Santos, Omar, Taylor, Ron 1
806 cover Defensive Security Handbook, 2nd Edition Lee Brotherston, Amanda Berlin
807 cover Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) [3 ed.] Kim Crawley 3
808 cover Building a Cyber Risk Management Program Brian Allen
809 cover The Developer's Playbook for Large Language Model Security Steve Wilson
810 cover Ransomware and Data Extortion Ryan Golden, Anthony M. Freed
811 cover Intelligence-Driven Incident Response, 2nd Edition (5th Early Release) [2 ed.] Rebekah Brown and Scott J. Roberts 2
812 cover Software Supply Chain Security (First Early Release) [1 ed.] Cassie Crossley 1
813 cover Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (2nd Early Release) Kim Crawley
814 cover Ransomware and Data Extortion (for True Epub) Ryan Golden, Anthony M. Freed
815 cover Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition [3 ed.] Jeffrey Caruso 3
816 cover Managing the Insider Threat: No Dark Corners [1st edition] Safari, an O'Reilly Media Company., Catrantzos, Nick 1
817 cover Network Security Assessment: Know Your Network [3rd ed.] Chris McNab 3
818 cover Identity and data security for web development: best practices [First edition] LeBlanc, Jonathan,Messerschmidt, Tim
819 cover Network Security Tools Clarke, Justin,Dhanjani, Nitesh
820 cover Sharing big data safely managing data security [First edition (Online-Ausg.)] Dunning, Ted,Friedman, B. Ellen
821 cover Practical Cloud Security, 2nd Edition (Third Early Release) [2 ed.] Chris Dotson 2
822 cover Ransomware. Defending Against Digital Extortion Allan Liska, Timothy Gallo
823 cover Tyrants on Twitter: Protecting Democracies from Information Warfare David L. Sloss
824 cover Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition [2nd edition] O'Reilly for Higher Education (Firm), Bryce, Chapin, Miller, Preston 2
825 cover Cybercrime: Wie Sie Gefahren im Internet erkennen und sich schützen Jürgen Schuh
826 cover Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA [1 ed.] Denise Nicholson (eds.) 1
827 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition [5th edition.] Matt Walker, Safari, an O'Reilly Media Company. 5
828 cover Is Someone Watching You Online NOW?: Online Surveillance Ng, Freeman
829 cover Blocking Spam & Spyware For Dummies [1 ed.] Peter H. Gregory, Mike Simon 1
830 cover Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings [1st ed.] Simon N. Foley 1
831 cover Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers [1 ed.] Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgerald (eds.) 1
832 cover Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World [2 ed.] Simon Chesterman 2
833 cover Configuring Check Point NGX VPN-1 Firewall-1 [1 ed.] Robert Stephens, Barry Stiefel, Stephen Watkins, Simon Desmeules, Eli Faskha 1
834 cover Digital Forensic Investigation of Internet of Things (IoT) Devices [1st ed.] Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson 1
835 cover Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level [1 ed.] Robert M. Clark, Simon Hakim (eds.) 1
836 cover Hacking Hacking Practical Guide for Beginners (Hacking With Python) Jeff Simon
837 cover El arte de la intrusión: cómo ser un hacker o evitarlos Kevin D Mitnick, William L Simon
838 cover Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach [1st ed.] Simon Parkinson, Andrew Crampton, Richard Hill 1
839 cover L’art de la supercherie Kevin Mitnick, William L. Simon
840 cover Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers [1 ed.] Simon Meurer, Roland Wismüller (auth.), Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian (eds.) 1
841 cover Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation David Routin, Simon Thoores, Samuel Rossier
842 cover The art of deception: controlling the human element of security [1 ed.] Kevin D. Mitnick, William L. Simon, Steve Wozniak 1
843 cover The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers Kevin D Mitnick, William L Simon
844 cover The Art of Deception: Controlling the Human Element of Security Kevin D. Mitnick, William L. Simon, Steve Wozniak
845 cover The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers [1 ed.] Kevin D. Mitnick, William L. Simon 1
846 cover Becoming an Ethical Hacker Gary Rivlin
847 cover Application Security Program Handbook Derek Fisher,
848 cover Cybersecurity in Finance: Getting the Policy Mix Right Sylvain Bouyon, Simon Krause
849 cover Techo-Security in an Age of Globalization: Perspectives From the Pacific Rim Denis Fred Simon
850 cover The Art of Deception: Controlling the Human Element of Security Kevin David Mitnick &, William L. Simon
851 cover The NSA Hack and its Implications Simon Luria
852 cover Net Neutrality: Towards a Co-regulatory Solution Christopher T. Marsden
853 cover Security in Cyberspace: Targeting Nations, Infrastructures, Individuals Giampiero Giacomello (editor)
854 cover Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future Aaron Mauro
855 cover The Hidden Potential of DNS in Security Joshua M. Kuo, Ross Gibson
856 cover Cyber Operations Building, Defending, and Attacking Modern Computer Networks [2nd edition] O'Leary, Mike 2
857 cover Professional Red Teaming: Conducting Successful Cybersecurity Engagements Oakley, Jacob G
858 cover Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program [2 ed.] Ryan Leirvik 2
859 cover DNS Security for Dummies [Infoblox special edition] Joshua M. Kuo, Robert Nagy, Cricket Liu
860 cover Personal Cybersecurity. How to avoid and recover from Cybercrime Marvin Waschke
861 cover Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence Kevin Cardwell
862 cover Managing Risk and Information Security: Protect to Enable [2 ed.] Malcolm W. Harkins (auth.) 2
863 cover Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies [3 ed.] Carey Parker 3
864 cover Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide Luis Ayala (auth.)
865 cover Cyber Operations: Building, Defending, and Attacking Modern Computer Networks [1 ed.] Mike O'Leary 1
866 cover The New School of Information Security [1 ed.] Adam Shostack, Andrew Stewart 1
867 cover Managing Risk and Information Security: Protect to Enable Malcolm Harkins
868 cover Security and Privacy for Modern Networks : Strategies and Insights for Safeguarding Digital Infrastructures Seshagirirao Lekkala, Priyanka Gurijala
869 cover Beginning Ethical Hacking with Python Sinha, Sanjib
870 cover Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed Yuri Diogenes
871 cover Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment [1st ed.] Dan Blum 1
872 cover Practical Information Security Management A Complete Guide to Planning and Implementation Tony Campbell
873 cover Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats [1 ed.] Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 1
874 cover Cybersecurity for Space: Protecting the Final Frontier [1st ed.] Jacob G. Oakley 1
875 cover Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents [Paperback ed.] Eric C. Thompson
876 cover How to Catch a Phish: A Practical Guide to Detecting Phishing Emails [1 ed.] Nicholas Oles 1
877 cover Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines Abhishek Chopra, Mukund Chaudhary
878 cover The Manager’s Guide to Web Application Security:: A Concise Guide to the Weaker Side of the Web [1 ed.] Ron Lepofsky (auth.) 1
879 cover Linux Firewalls mit iptables & Co. Ralf Spenneberg
880 cover Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources [1 ed.] Morey J. Haber, Brian Chappell, Christopher Hills 1
881 cover Honeypots for Windows [1 ed.] Roger A. Grimes (auth.) 1
882 cover The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team Jacob G. Oakley, Michael Butler
883 cover Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls Jason Edwards
884 cover The InfoSec Handbook: An Introduction to Information Security [1st ed.] Umesha Nayak, Umesh Rao 1
885 cover Protective Security: Creating Military-Grade Defenses For Your Digital Business [1st Edition] James Seaman 1
886 cover The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things [1 ed.] Aditya Gupta 1
887 cover Managing risk and information security [2nd edition] Malcolm W. Harkins 2
888 cover Advanced Persistent Training : Take Your Security Awareness Program to the Next Level [1 ed.] Jordan Schroeder (auth.) 1
889 cover Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies [5 ed.] Carey Parker 5
890 cover Handbuch IT-Sicherheit : Strategien, Grundlagen und Projekte Walter Gora
891 cover Android Apps Security Sheran Gunasekera
892 cover Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server [1 ed.] Robert La Lau 1
893 cover Penetration Testing Basics: a Quick-Start Guide to Breaking into Systems Messier, Ric
894 cover Cube Farm [1 ed.] Bill Blunden (auth.) 1
895 cover iOS Penetration Testing A Definitive Guide to iOS Security Kunal Relan
896 cover Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Chet Hosmer
897 cover Abenteuer Kryptologie : Methoden, Risiken und Nutzen der Datenverschlüsselung [3., überarb. Aufl] Reinhard Wobst 3
898 cover Cybersecurity Essentials: Practical Tools for Today's Digital Defenders Kodi A. Cochran
899 cover Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations [1 ed.] Morey J. Haber,Brad Hibbert (auth.) 1
900 cover Cryptography and Data Security Dorothy Elizabeth Robling Denning
901 cover Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security [2nd ed.] Marshall Copeland, Matthew Jacobs 2
902 cover Pci Dss: An Integrated Data Security Standard Guide [1 ed.] Jim Seaman 1
903 cover Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [2 ed.] Tyler Wall, Jarrett Rodrick 2
904 cover Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed Systems) [3 ed.] Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner 3
905 cover The No-Nonsense Guide for CISOs and Security Managers Aaron Roberts
906 cover Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program [1 ed.] Ryan Leirvik 1
907 cover Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers [1st ed.] Sreejith Keeriyattil 1
908 cover Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions [1st ed.] Paul Rohmeyer, Jennifer L. Bayuk 1
909 cover Digital Archaeology: The Art and Science of Digital Forensics [1 ed.] Michael W. Graves 1
910 cover Enterprise Cybersecurity Study Guide [1st ed.] Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 1
911 cover 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy [1 ed.] Daniel G. Bachrach, Eric J. Rzeszut (auth.) 1
912 cover Privacy in the Age of Innovation: AI Solutions for Information Security Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala
913 cover Enterprise Cyber Risk Management as a Value Creator : Leverage Cybersecurity for Competitive Advantage Bob Chaput
914 cover Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment [1st ed.] Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler 1
915 cover Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu
916 cover Cybersecurity Lexicon [1 ed.] Luis Ayala (auth.) 1
917 cover Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks [1 ed.] Gunikhan Sonowal 1
918 cover PCI DSS: An Integrated Data Security Standard Guide Jim Seaman
919 cover Identity Attack Vectors: Strategically Designing And Implementing Identity Security [2 ed.] Morey J. Haber, Darran Rolls 2
920 cover Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records [1 ed.] Bernard Peter Robichau 1
921 cover 70 Tips and Tricks for Mastering the CISSP Exam [1st ed.] R. Sarma Danturthi 1
922 cover Cybersecurity for Space: A Guide to Foundations and Challenges [2 ed.] Jacob G. Oakley 2
923 cover Securing PHP Apps [1 ed.] Ben Edmunds (auth.) 1
924 cover Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information [1 ed.] Eric C. Thompson (auth.) 1
925 cover Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing [1 ed.] Ahmed Sheikh 1
926 cover Snowflake Security: Securing Your Snowflake Data Cloud [1 ed.] Ben Herzberg, Yoav Cohen 1
927 cover Linux® firewalls: enhancing security with nftables and beyond [4th edition] Addison-Wesley.,Suehring, Steve 4
928 cover Theoretical Cybersecurity: Principles and Advanced Concepts Jacob G. Oakley, Michael Butler, Matthew Puckett, J. Louis Sewell, Wayne York
929 cover Lesson-Based Review of Ethical Hacking and Penetration Testing Ahmed Sheikh
930 cover Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention [1 ed.] Luis Ayala (auth.) 1
931 cover Certified Ethical Hacker (CEH) Foundation Guide [1 ed.] Sagar Ajay Rahalkar (auth.) 1
932 cover Big Breaches: Cybersecurity Lessons for Everyone Neil Daswani, Moudy Elbayadi
933 cover Discovering Cybersecurity: A Technical Introduction For The Absolute Beginner [1 ed.] Seth James Nielson 1
934 cover Privileged Attack Vectors: Building Effective Cyber-defense Strategies to Protect Organizations [2 ed.] Morey J. Haber 2
935 cover The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke
936 cover NTP Security: A Quick-Start Guide [1 ed.] Allan Liska (auth.) 1
937 cover Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center [1 ed.] Marshall Copeland (auth.) 1
938 cover Algebra for Secure and Reliable Communication Modeling Mustapha Lahyane, Edgar Martinez-moro
939 cover The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War [1 ed.] Steve Grobman, Allison Cerra (auth.) 1
940 cover Pirates de l’informatique : enquête sur les hackers français Blanchard, Philippe
941 cover Firewall Policies And VPN Configurations [1 ed.] Laura E. Hunter 1
942 cover Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations [1 ed.] Iwan Hoogendoorn 1
943 cover The Myths of Security: What the Computer Security Industry Doesn't Want You to Know John Viega
944 cover Android Apps Security: Mitigate Hacking Attacks and Security Breaches [2nd ed.] Sheran Gunasekera 2
945 cover Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners [1 ed.] Alexander J. Roxon 1
946 cover Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [1 ed.] Tyler Wall, Jarrett Rodrick 1
947 cover A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities [1st ed.] Sagar Rahalkar 1
948 cover Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services Puthiyavan Udayakumar
949 cover Mastering Cybersecurity: Strategies, Technologies, and Best Practices [1 ed.] Jason Edwards 1
950 cover Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway [1 ed.] Greg Holden (auth.) 1
951 cover Firewalls Don’t Stop Dragons: A Step-by-Step Guide To Computer Security And Privacy For Non-Techies [4th Edition] Carey Parker 4
952 cover Ransomware Revealed: A Beginner’s Guide To Protecting And Recovering From Ransomware Attacks Nihad A. Hassan
953 cover System Administration Ethics: Ten Commandments For Security And Compliance In A Modern Cyber World Igor Ljubuncic, Tom Litterer
954 cover The Passion of Bradley Manning: The Story of the Suspect Behind the Largest Security Breach in U.S. History Chase Madar
955 cover Full Stack Python Security: Cryptography, TLS, and attack resistance Dennis Byrne
956 cover CCNA cyber ops SECOPS #210-255 official cert guide Santos, Omar,Joseph Muniz,Stefano De Crescenzo
957 cover Network defense and countermeasures principles and practices [2nd ed] Easttom, Chuck 2
958 cover Linux Essentials for Cybersecurity (for True EPUB) William “Bo” Rothwell, Denise Kinsey
959 cover Democracy in danger. How hackers and activists exposed fatal flaws in the election system Jake Braun
960 cover Self-Sovereign Identity: Decentralized digital identity and verifiable credentials [1 ed.] Alex Preukschat, Drummond Reed 1
961 cover Cybersecurity Career Guide Alyssa Miller
962 cover Hacked: The Inside Story Of America's Struggle To Secure Cyberspace [1 ed.] Charlie Mitchell 1
963 cover The Unhackable Internet Thomas P. Vartanian,
964 cover CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam - The How To Pass on Your First Try Certification Study Guide William Manning
965 cover Facing Cyber Threats Head on: Protecting Yourself and Your Business Brian Minick
966 cover Personal Firewalls for Administrators and Remote Users [1st ed.] Lisa Yeo 1
967 cover Securing Devops: Safe Services in the Cloud [1 ed.] Julien Vehent 1
968 cover CCIE Security Exam Certification Guide Henry Benjamin
969 cover Building Secure and Reliable Network Applications [1st ed.] Kenneth P Birman 1
970 cover CCNA Cyber Ops SECFND 210-250 official cert guide De Crescenzo, Stefano,Muniz, Joseph,Santos, Omar
971 cover Secure By Design Daniel Deogun, Dan Bergh Johnsson, Daniel Sawano
972 cover CCNA Security Portable Command Guide Bob Vachon
973 cover Constructing cybersecurity: Power, expertise and the internet security industry (Manchester University Press) Andrew Whiting
974 cover The Art of Network Penetration Testing: Taking over any company in the world Royce Davis
975 cover Information Security Management [2 ed.] Michael Workman 2
976 cover Cryptography In The Database: The Last Line Of Defense Kevin Kenan
977 cover Managing Information Risks: Threats, Vulnerabilities, and Responses Saffady, William
978 cover Cybersecurity and Information Security Analysts: A Practical Career Guide Kezia Endsley
979 cover 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them [2nd Edition] Weisman, Steve 2
980 cover CISSP Cert Guide [3rd ed.] ROBIN ABERNATHY, TROY McMILLAN 3
981 cover Governing Cyberspace: Behavior, Power, and Diplomacy Dennis Broeders (editor), Bibi van den Berg (editor)
982 cover Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family Theresa M. Payton, Ted Claypoole
983 cover Cybersecurity And Human Rights In The Age Of Cyberveillance [1 ed.] Joanna Kulesza, Roy Balleste 1
984 cover Making Sense of Cybersecurity Thomas Kranz
985 cover Protecting Student Data Privacy: Classroom Fundamentals Linnette Attai
986 cover Exploring Careers in Cybersecurity and Digital Forensics Lucy K. Tsado, Robert Osgood
987 cover Hack by Dmitry Samarov [1ST ed.] Dmitry Samarov 1
988 cover Data Privacy: A runbook for engineers NISHANT BHAJARIA
989 cover The Art of Network Penetration Testing: How to take over any company in the world [1 ed.] Royce Davis 1
990 cover End-To-End Network Security: Defense-In-Depth Santos, Omar
991 cover API Security in Action [1 ed.] Neil Madden 1
992 cover Information security: principles and practices [2nd edition] Breithaupt, Jim,Merkow, Mark S 2
993 cover Application Security Program Handbook: A guide for software engineers and team leaders Derek Fisher
994 cover Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System Jake Braun
995 cover Cyber insecurity: navigating the perils of the next information age Harrison, Richard M.,Herr, Trey
996 cover Pearson Education: Certified Ethical Hacker (CEH) Version 10 (Certification Guide) [3 ed.] Pearson Education, Omar Santos, Michael Gregg 3
997 cover Casting Light On The Dark Web: A Guide For Safe Exploration Matthew Beckstrom, Brady Lund
998 cover Microsoft Azure Security Center Yuri Diogenes, Tom Shinder
999 cover Privacy in the age of big data: recognizing threats, defending your rights, and protecting your family [1st paperback ed] Claypoole, Theodore,Payton, Theresa M 1
1000 cover Computer Security: Principles and Practice [Fourth Global edition] Stallings, William, Brown, Lawrie
1001 cover Cisco ASA All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition) Jazib Frahim, Omar Santos, Andrew Ossipov
1002 cover The Black Box Society: The Secret Algorithms That Control Money and Information Frank Pasquale
1003 cover The Hacker And The State: Cyber Attacks And The New Normal Of Geopolitics [1st Edition] Ben Buchanan 1
1004 cover The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
1005 cover A Leader’s Guide to Cybersecurity: Why Boards Need to Lead–and How to Do It Thomas J. Parenty, Jack J. Domet
1006 cover TECHNOLOGY AS SECURITY Declan McCullagh
1007 cover Cybersecurity: The Insights You Need from Harvard Business Review Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg, Roman V. Yampolskiy
1008 cover The U.S. Cybersecurity and Intelligence Analysis Challenges John Michael Weaver
1009 cover Digitalisation and Human Security: A Multi-Disciplinary Approach to Cybersecurity in the European High North [1st ed.] Mirva Salminen, Gerald Zojer, Kamrul Hossain 1
1010 cover Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices Joseph MacMillan
1011 cover Digital Platform Regulation: Global Perspectives on Internet Governance (Palgrave Global Media Policy and Business) Terry Flew (editor), Fiona R. Martin (editor)
1012 cover Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative Perspectives Gertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo
1013 cover Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry: A Comparative Study within the G-20 Felix I. Lessambo
1014 cover The Turn to Infrastructure in Internet Governance Francesca Musiani, Derrick L. Cogburn, Laura DeNardis, Nanette S. Levinson (eds.)
1015 cover A Closer Look at Cybersecurity and Cryptanalysis C. Rupa (editor), Sirajuddin (editor)
1016 cover Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism Michael Miller
1017 cover Cyberwarfare: Threats to Critical Infrastructure Kristan Stoddart
1018 cover Cyber Attack Margaret J. Goldstein,Martin Gitlin
1019 cover Computer Security Within Organizations Adrian R. Warman (auth.)
1020 cover Living With Hacktivism: From Conflict to Symbiosis [1 ed.] Vasileios Karagiannopoulos (auth.) 1
1021 cover Countering Cyber Threats to Financial Institutions: A Private and Public Partnership Approach to Critical Infrastructure Protection [1st ed.] Pierre-Luc Pomerleau, David L. Lowery 1
1022 cover Human Privacy In Virtual And Physical Worlds: Multidisciplinary Perspectives [1 ed.] Mary C. Lacity, Lynda Coon 1
1023 cover Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance: Analyzing IANA Transition [1st ed.] Nicola Palladino, Mauro Santaniello 1
1024 cover Cybercrime in the Pandemic Digital Age and Beyond (Palgrave Studies in Cybercrime and Cybersecurity) Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), Laurie Yiu-Chung Lau (editor)
1025 cover Cyber war versus cyber realities : cyber conflict in the international system [1 ed.] Maness, Ryan C., Valeriano, Brandon 1
1026 cover China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
1027 cover Binary bullets : the ethics of cyberwarfare [1 ed.] Allhoff, Fritz, Henschke, Adam, Strawser, Bradley Jay 1
1028 cover The cybersecurity dilemma : hacking, trust, and fear between nations [1 ed.] Buchanan, Ben 1
1029 cover Bulk Collection: Systematic Government Access To Private-Sector Data Fred H. Cate, James X. Dempsey
1030 cover Inside the Enemy's Computer: Identifying Cyber Attackers [1 ed.] Clement Guitton 1
1031 cover Cyberwar. How Russian hackers and trolls helped elect a president - what we don’t, can’t, and do know. Jamieson, Kathleen Hall
1032 cover Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove, Woodrow Hartzog
1033 cover Internet governance: infrastructure and institutions Lee A. Bygrave, Jon Bing (editors)
1034 cover Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity Gregory J. Falco, Eric Rosenbach
1035 cover Escalation Dynamics in Cyberspace Erica D. Lonergan,Shawn W. Lonergan,
1036 cover Escalation Dynamics in Cyberspace Erica D. Lonergan, Shawn W. Lonergan
1037 cover Semi-State Actors in Cybersecurity Florian J. Egloff
1038 cover Data Sovereignty: From the Digital Silk Road to the Return of the State Anupam Chander (editor), Haochen Sun (editor)
1039 cover Cyber Persistence Theory: Redefining National Security in Cyberspace Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett
1040 cover Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power Charles D. Freilich, Matthew S. Cohen, Gabi Siboni
1041 cover The Oxford Handbook of Cyber Security Paul Cornish (ed.)
1042 cover Negotiating Internet Governance Roxana Radu
1043 cover Cyber War Will Not Take Place Thomas Rid
1044 cover Lessons From The Identity Trail: Anonymity, Privacy And Identity In A Networked Society [1st Edition] Ian Kerr, Carole Lucock, Valerie Steeves 1
1045 cover Cybersecurity and Cyberwar: What Everyone Needs to Know® [1 ed.] P.W. Singer, Allan Friedman 1
1046 cover Cybersecurity and cyberwar : what everyone needs to know Singer, Peter Warren, Friedman, Allan
1047 cover Cyber-attacks: Effects on UK Companies anon.
1048 cover Access Control and Identity Management (Information Systems Security & Assurance) [3 ed.] Mike Chapple 3
1049 cover Advanced persistent threat : understanding the danger and how to protect your organization [1 ed.] Cole, Eric 1
1050 cover Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies [1st Edition] Ira Winkler and Araceli Treu Gomes (Auth.) 1
1051 cover Advanced Persistent Threat
1052 cover Aggressive Network Self-defense [1 ed.] Neil R. Wyler, Bruce Potter, Chris Hurley 1
1053 cover Aggressive Network Self-Defense [1st ed.] Chris Hurley 1
1054 cover Android Forensics: Investigation, Analysis and Mobile Security for Google Android Hoog, Andrew
1055 cover Android Forensics: Investigation, Analysis and Mobile Security for Google Android [1 ed.] Andrew Hoog 1
1056 cover Antivirus Engines : From Methods to Innovations, Design, and Applications Paul A. Gagniuc
1057 cover Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure [1 ed.] Eric D. Knapp, Raj Samani 1
1058 cover Applied Network Security Monitoring: Collection, Detection, and Analysis [1 ed.] Chris Sanders, Jason Smith 1
1059 cover Applied network security monitoring : collection, detection, and analysis Chris Sanders, Jason Smith
1060 cover AVIEN Malware Defense Guide for the Enterprise David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja
1061 cover Audio Content Security. Attack Analysis on Audio Watermarking [1 ed.] Sogand Ghorbani, Iraj Sadegh Amiri 1
1062 cover Black Hat Physical Device Security: Exploiting Hardware and Software [1 ed.] Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services 1
1063 cover Botnets- The Killer Web App
1064 cover Botnets: The Killer Web App Craig Schiller, Jim Binkley, Gadi Evron, Carsten Willems, Tony Bradley, David Harley, Michael Cross
1065 cover Buffer Overflow Attacks: Detect, Exploit, Prevent James C. Foster &, Vitaly Osipov &, Nish Bhalla,Deckard, Jason
1066 cover Building a Practical Information Security Program [1 ed.] Jason Andress, Mark Leary 1
1067 cover Building an Intelligence-Led Security Program [1 ed.] Allan Liska 1
1068 cover Buffer Overflow Attacks: Detect, Exploit, Prevent James C. Foster
1069 cover Building a Practical Information Security Program Jason Andress, Mark Leary
1070 cover Check Point Next Generation Security Administration [1 ed.] Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon 1
1071 cover Check Point NGX R65 Security Administration Ralph Bonnell
1072 cover Check Point™ Next Generation with Application Intelligence Security [1st ed.] Chris Tobkin, Daniel Kligerman 1
1073 cover Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting [1 ed.] Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon 1
1074 cover Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting
1075 cover Check Point NG/AI: Next Generation with Application Intelligence Security Administration [1st ed.] Chris Tobkin, Daniel Kligerman 1
1076 cover CheckPoint NG Security Administration [2 ed.] Dan Kaminsky 2
1077 cover Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity [1st ed.] Dale Liu 1
1078 cover CISSP Study Guide [1 ed.] Eric Conrad, Seth Misenar, Joshua Feldman 1
1079 cover Cisco Security Professional's Guide to Secure Intrusion Detection Systems Baumrucker C.T., Burton J.D., Dentler S.
1080 cover Cisco Security Professionals Guide To Secure Intrusion Detection Systems Ebook [1 ed.] Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky 1
1081 cover CISSP® Study Guide [4 ed.] Eric Conrad, Seth Misenar, Joshua Feldman 4
1082 cover Cisco PIX Firewall Einrichtung und Betrieb einer sicheren Firewall
1083 cover Cisco security specialist's guide to PIX Firewall [1 ed.] Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver 1
1084 cover CISSP Study Guide [3rd edition] Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman 3
1085 cover Client-Side Attacks and Defense [1 ed.] Oriyano Sean-Philip, Robert Shimonski 1
1086 cover Client-side Attacks and Defense Oriyano, Sean-Philip,Shimonski, Robert
1087 cover Cisco PIX Firewalls: configure / manage / troubleshoot [2 ed.] Charles Riley (Editor) 2
1088 cover CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E [3 ed.] Ido Dubrawsky, Jeremy Faircloth 3
1089 cover Configuring Juniper Networks NetScreen & SSG Firewalls Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin
1090 cover Configuring SonicWALL firewalls Chris Lathem, Daniel H Bendell, Benjamin W Fortenberry, Kevin Lynn, Joshua Reed
1091 cover Configuring ISA Server 2000 Building Firewalls for Windows 2000 [1 ed.] Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal 1
1092 cover Configuring Net: Screen Firewalls [1 ed.] Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell and Kenneth Tam (Auth.) 1
1093 cover Configuring Sonicwall Firewalls [2 ed.] Charles Riley (Editor) 2
1094 cover Configuring Check Point NGX VPN-1/FireWall-1 [2 ed.] Charles Riley (Editor) 2
1095 cover Configuring NetScreen Firewalls [1 ed.] Rob Cameron 1
1096 cover Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation Ted G. Lewis
1097 cover Cross Site Scripting Attacks [2nd ed.] Jay Beale 2
1098 cover Cyber adversary characterization : auditing the hacker mind Tom Parker, et al
1099 cover Cyber Security and IT Infrastructure Protection John R. Vacca
1100 cover Cyber Security and IT Infrastructure Protection [1 ed.] John R. Vacca 1
1101 cover Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners [2 ed.] Jason Andress and Steve Winterfeld (Auth.) 2
1102 cover Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners [1 ed.] Jason Andress, Steve Winterfeld 1
1103 cover Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard [1 ed.] Brett Shavers 1
1104 cover Cyberwarfare: Information Operations in a Connected World [2 ed.] Mike Chapple, David Seidl 2
1105 cover Cya Securing Exchange Server 2003 & Outlook Web Access
1106 cover CYA Securing IIS 6.0. Cover Your A** by Getting It Right the First Time Chun Hai (Bernard) Cheah, Ken Schaefer and Chris Peiris (Auth.)
1107 cover CYA: Securing Exchange Server 2003 & Outlook Web Access [1st ed.] Henrik Walther, Patrick Santry 1
1108 cover Cyberspaces and Global Affairs Perry, Jake, Costigan, Sean S, Professor
1109 cover Cyber Security Awareness for Accountants and CPAs [1 ed.] David Willson, Henry Dalziel 1
1110 cover Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives [1st ed.] Ted Fair, Michael Nordfelt, Sandra Ring 1
1111 cover Cyber Security Awareness for Lawyers [1 ed.] David Willson, Henry Dalziel 1
1112 cover Cybersecurity and Applied Mathematics [1 ed.] Leigh Metcalf, William Casey 1
1113 cover Detecting and Combating Malicious Email Cade Kamachi, Julie JCH Ryan
1114 cover Dictionary of Information Security Robert Slade
1115 cover Digital Forensics, Investigation, and Response [4 ed.] Chuck Easttom 4
1116 cover Digital Forensics Processing and Procedures [1 ed.] 1
1117 cover Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data [1 ed.] Terrence V. Lillard 1
1118 cover Dissecting the Hack: The F0rb1dd3n Network, Revised Edition [Revised] Jayson E Street, Kent Nabors, Dustin L. Fritz
1119 cover Dissecting the hack the V3rb0ten network [Online-Ausg ed.] Baskin, Brian,Martin, Brian,Sims, Kristin,Street, Jayson E
1120 cover DNS Security. Defending the Domain Name System [1 ed.] Allan Liska, Geoffrey Stowe 1
1121 cover Dr Tom Shinder's ISA Server and Beyond : Real World Security Solutions for Microsoft Enterprise Networks Syngress
1122 cover Dr. Tom Shinder's ISA Server 2006 Migration Guide Thomas W Shinder, Debra Littlejohn Shinder, Adrian F. Dimcev, James Eaton-Lee, Jason Jones, Steve Moffat
1123 cover Dr. Tom Shinder's ISA Server and Beyond. Real World Security Solutions for Microsoft Enterprise Networks M.D. Thomas W. Shinder, Debra Littlejohn Shinder and Martin Grasdal (Auth.)
1124 cover Elementary Information Security [2 ed.] Richard E. Smith 2
1125 cover Elementary Information Security [3 ed.] Richard E. Smith 3
1126 cover Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures [1 ed.] Brian Contos, Dave Kleiman 1
1127 cover E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets Michael R. Overly
1128 cover Essential Skills for Hackers [1 ed.] Kevin Cardwell, Henry Dalziel 1
1129 cover Ethical Hacking: Techniques, Tools, and Countermeasures [4 ed.] Michael G. Solomon, Sean-Philip Oriyano 4
1130 cover Ethereal Packet Sniffing [1 ed.] Syngress 1
1131 cover Executing Windows Command Line Investigations. While Ensuring Evidentiary Integrity [1 ed.] Chet Hosmer, Joshua Bartolomie, Rosanne Pelli 1
1132 cover Firewall policies and VPN configurations Anne Henmi, Mark Lucas, Abhishek Singh, Chris Cantrell
1133 cover FISMA Certification & Accreditation Handbook [1 ed.] Laura P. Taylor, L. Taylor 1
1134 cover FISMA Compliance Handbook: Second Edition [1 ed.] Laura P. Taylor 1
1135 cover FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security Stephen D. Gantz and Daniel R. Philpott (Eds.)
1136 cover FISMA certification & accreditation handbook Laura Taylor, Matthew Shepherd
1137 cover FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security [1 ed.] Stephen D. Gantz, Daniel R. Philpott 1
1138 cover Fundamentals of information systems security [3 ed.] Kim, David, Solomon, Michael G 3
1139 cover GFI Network Security and PCI Compliance Power Tools [1st ed.] Brien Posey 1
1140 cover Google Hacking for Penetration Testers [3 ed.] Johnny Long, Bill Gardner, Justin Brown 3
1141 cover Google hacking for penetration testers. / Volume 2 Long, Johnny
1142 cover Hack Proofing Sun Solaris 8 [1 ed.] Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress 1
1143 cover Hack Proofing Windows 2000 Server Syngress, Syngress Publishing, Ryan Russell
1144 cover HACK PROOFING XML [1 ed.] Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis, Jr. Franklin 1
1145 cover Hack Proofing Your E-commerce Site [1 ed.] Ryan Russell 1
1146 cover Hack Proofing Your Identity [1 ed.] Teri Bidwell 1
1147 cover Hack proofing your network David R Mirza Ahmad, Ryan Russell, et al
1148 cover Hack Proofing Your Network: Internet Tradecraft [1 ed.] Ryan Russell 1
1149 cover Hack proofing your wireless network Christian Barnes, Neal O'Farrell, et al
1150 cover Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network Michael Gregg
1151 cover Hacking Web Apps: Detecting and Preventing Web Application Security Problems [1 ed.] Mike Shema 1
1152 cover Hackproofing Your Wireless Network [1 ed.] Syngress, Eric Ouellet, Neal O'Farrell 1
1153 cover Hacking a Terror Network: The Silent Threat of Covert Channels [1 ed.] Ryan Russell 1
1154 cover Hack Proofing Your Network [1 ed.] Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress 1
1155 cover Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems [1 ed.] Edward Griffor 1
1156 cover HCISPP Study Guide [1 ed.] Timothy Virtue, Justin Rainey 1
1157 cover Hiding behind the keyboard : uncovering covert communication methods with forensic analysis [1 ed.] Bair, John, Shavers, Brett 1
1158 cover Host and Network Security for Microsoft, UNIX, and Oracle Chris Adams
1159 cover How to Cheat at Managing Information Security Mark Osborne
1160 cover How to cheat at securing your network Ido Dubrawsky
1161 cover How to Define and Build an Effective Cyber Threat Intelligence Capability [1 ed.] Henry Dalziel, Eric Olson, James Carnall 1
1162 cover i: Phone and i: OS Forensics. Investigation, Analysis and Mobile Security for Apple i: Phone, i: Pad and i: OS Devices [1 ed.] Andrew Hoog And Katie Strzempka (Auth.) 1
1163 cover Implementing digital forensic readiness : from reactive to proactive process [1 ed.] Ivtchenko, Dmitri, Sachowski, Jason 1
1164 cover Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems Eric Knapp
1165 cover Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [1 ed.] Eric D. Knapp 1
1166 cover Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [2 ed.] Eric D. Knapp, Joel Thomas Langill 2
1167 cover Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data [1 ed.] Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin 1
1168 cover Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Mark Talabis, Jason Martin
1169 cover Information Security Principles and Practice Mark Stamp
1170 cover InfoSec Career Hacking Sell Your Skillz, Not Your Soul Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley
1171 cover InfoSec Career Hacking [1 ed.] Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley, James C. Foster, Christopher W. Klaus 1
1172 cover InfoSecurity 2008 Threat Analysis [1 ed.] Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg 1
1173 cover Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders Susan E. McGregor
1174 cover Information Security Illuminated [1 ed.] Michael G. Solomon, Mike Chapple 1
1175 cover Insider Threat. Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole and Sandra Ring (Auth.)
1176 cover Internet and Web Application Security [3 ed.] Mike Harwood, Ron Price 3
1177 cover Introduction to Information Security. A Strategic-Based Approach [1 ed.] Timothy Shimeall and Jonathan Spring (Auth.) 1
1178 cover Intrusion Prevention and Active Response [1 ed.] Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin 1
1179 cover Intrusion Prevention and Active Response. Deploying Network and Host IPS Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard and Jake Babbin (Eds.)
1180 cover iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices [1 ed.] Andrew Hoog, Katie Strzempka 1
1181 cover JavaScript for hackers: Learn to think like a hacker Gareth Heyes
1182 cover Legal and Privacy Issues in Information Security Grama, Joanna Lyn,
1183 cover Legal and Privacy Issues in Information Security [3 ed.] Joanna Lyn Grama 3
1184 cover Legal Issues in Information Security, 2nd Edition [2 ed.] Joanna Lyn Grama 2
1185 cover Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems [1 ed.] Cameron H. Malin, Eoghan Casey BS MA, James M. Aquilina 1
1186 cover Managing Cisco Network Security [2 ed.] 2
1187 cover Managing Information Security [2 ed.] John R. Vacca (editor) 2
1188 cover Managing Risk in Information Systems, 3rd Edition [3 ed.] Darril Gibson, Andy Igonor 3
1189 cover Managing Cisco Network Security [1 ed.] Florent Parent, Oliver Steudler 1
1190 cover Managing Information Security [1 ed.] John R. Vacca 1
1191 cover Managing Cisco Network Security Building Rock-Solid Networks
1192 cover MCSE (Exam 70-298) Study Guide. Designing security for a Windows Server 2003 network: Exam 70-298 Elias N. Khnaser, Susan Snedaker, Chris Peiris, Rob Amini and Laura E. Hunter (Eds.)
1193 cover MCSE Designing Security for a Windows Server 2003 Network [1st ed.] Elias Khasner, Laura E. Hunter 1
1194 cover MCSE Implementing and Administering Security in a Windows 2000 Network Study Guide [1 ed.] Will Schmied, Thomas W. Shinder 1
1195 cover Mission Critical Internet Security [1 ed.] Bradley Dunsmore 1
1196 cover Mobile Security and Privacy. Advances, Challenges and Future Research Directions [1 ed.] Man Ho Au, Raymond Choo 1
1197 cover Mobile Data Loss: Threats and Countermeasures [1 ed.] Michael T. Raggo 1
1198 cover Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series) [1 ed.] Neil Archibald, Gilbert Ramirez, Noam Rathaus 1
1199 cover Network performance and security: testing and analyzing using open source and low-cost tools Chapman, Chris
1200 cover Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance) [1 ed.] J. Stewart 1
1201 cover Nessus Network Auditing [1 ed.] Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson 1
1202 cover Nessus Network Auditing [2 ed.] Russ Rogers 2
1203 cover Netcat Power Tools [1 ed.] Jan Kanclirz, Brian Baskin, Thomas Wilhelm 1
1204 cover Netcat Power Tools Jan Kanclirz, Brian Baskin, Thomas Wilhelm
1205 cover Network and System Security John R. Vacca
1206 cover Network Security Assessment: From Vulnerability to Patch [1 ed.] Steve Manzuik, Andre Gold, Chris Gatford 1
1207 cover Network and System Security [2nd Edition] John R. Vacca 2
1208 cover Network Intrusion Analysis
1209 cover Network Security, Firewalls, and VPNs, 3rd Edition J. Michael Stewart, Denise Kinsey
1210 cover Network security firewalls and VPNs [2nd ed.] Stewart, James Michael 2
1211 cover Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques Thomas Wilhelm, Jason Andress
1212 cover No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick
1213 cover Nokia Firewall, VPN, and IPSO Configuration Guide Andrew Hay, Keli Hay, Peter Giannoulis
1214 cover Nmap in the Enterprise: Ваше руководство к сети Сканирование Angela Orebaugh, Becky Pinkard
1215 cover Nmap in the Enterprise: Your Guide to Network Scanning Angela Orebaugh, Becky Pinkard
1216 cover Nokia network security : solutions handbook Doug Maxwell, Cherie Amon
1217 cover Nokia Network Security Solutions Handbook [1 ed.] Syngress, Doug Maxwell 1
1218 cover OSSEC Host-Based Intrusion Detection Guide Andrew Hay, Daniel Cid, Rory Bray
1219 cover PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance [4 ed.] Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY 4
1220 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [3° ed.] Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY. 3
1221 cover PCI Compliance Bradley T. (ed.)
1222 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [2 ed.] Anton Chuvakin, Branden R. Williams 2
1223 cover Perfect Password: Selection, Protection, Authentication Mark Burnett
1224 cover Perfect Password: Selection, Protection, Authentication [1 ed.] Mark Burnett, Dave Kleiman 1
1225 cover Perfect Passwords. Selection, Protection, Authentication Mark Burnett and Dave Kleiman (Auth.)
1226 cover Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft [1 ed.] Markus Jakobsson, Steven Myers 1
1227 cover Phishing Exposed Lance James, (Auth.)
1228 cover Physical and logical security convergence: powered by enterprise security management [1 ed.] Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole 1
1229 cover Power and security in the information age: investigating the role of the state in cyberspace [1 ed.] Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) 1
1230 cover Practical Deployment of Cisco Identity Services Engine [1 ed.] Andy Richter, Jeremy Wood 1
1231 cover Protecting Patient Information. A Decision-Maker's Guide to Risk, Prevention, and Damage Control [1 ed.] Paul Cerrato 1
1232 cover Publishing IT Security Project Management Handbook
1233 cover Research Methods for Cyber Security [1st Edition] Thomas Edgar and David Manz (Auth.) 1
1234 cover Rogue Code: A Jeff Aiken Novel Mark Russinovich
1235 cover HACKING: Become The Ultimate Hacker - Computer Virus, Cracking, Malware, IT Security Joseph Connor
1236 cover Hacking: Hacking for Beginners - Computer Virus, Cracking, Malware, IT Security - 2nd Edition (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security) Connor, Joseph
1237 cover The little black book of computer viruses Volume 1 Mark A. Ludwig
1238 cover Scene of the Cybercrime: Computer Forensics Handbook Debra Littlejohn Shinder, Ed Tittel (editor)
1239 cover Scene of the CyberCrime - Computer Forensics Handbook
1240 cover Scene of the Cybercrime, Second Edition [2 ed.] Debra Littlejohn Shinder, Michael Cross 2
1241 cover Scene of the Cybercrime: Computer Forensics Handbook [1 ed.] Debra Littlejohn Shinder, Ed Tittel 1
1242 cover Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century Christopher Burgess, Richard Power
1243 cover Securing the Smart Grid: Next Generation Power Grid Security Tony Flick, Justin Morehouse
1244 cover Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT Eric Seagren
1245 cover Securing SQL Server, Third Edition: Protecting Your Database from Attackers [3 ed.] Denny Cherry 3
1246 cover Securing SQL Server: Protecting Your Database from Attackers [2 ed.] Denny Cherry 2
1247 cover Securing the Internet of Things [1st Edition] Shancang Li and Li Da Xu (Auth.) 1
1248 cover Securing VoIP: Keeping Your VoIP Network Safe [1 ed.] Regis J. Jr (Bud) Bates 1
1249 cover Securing Windows Server 2008: Prevent Attacks from Outside Aaron Tiensivu
1250 cover Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Aaron Tiensivu
1251 cover Security Assessment: Case Studies for Implementing the NSA IAM [2 ed.] Sean Thurston 2
1252 cover Security Assessment [1st ed.] Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra 1
1253 cover Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Derrick Rountree
1254 cover Security sage's guide to hardening the network infrastructure Steven Andrés, et al
1255 cover Security+ study guide Michael Cross, Norris L Jr Johnson, Tony Piltzecker, Robert J Shimonski, Debra Littlejohn Shinder
1256 cover Security+ Study Guide and DVD Training System [1 ed.] Norris L. Johnson, Michael Cross, Tony Piltzecker, Robert J. Shimonski, Debra Littlejohn Shinder 1
1257 cover Security+ Study Guide and DVD Training System [1 ed.] Norris L. Johnson, Michael Cross, Tony Piltzecker 1
1258 cover Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks) Dan York
1259 cover Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks) Stacy Prowell, Rob Kraus, Mike Borkin
1260 cover Seven Deadliest USB Attacks Brian Anderson, Barbara Anderson
1261 cover Seven Deadliest Wireless Technologies Attacks Haines, Brad
1262 cover Simple Steps to Data Encryption: A Practical Guide to Secure Computing Pete Loshin
1263 cover Smart Technologies And The End(s) Of Law: Novel Entanglements Of Law And Technology [1st Edition] Mireille Hildebrandt 1
1264 cover Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense [1 ed.] Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.) 1
1265 cover Snort 2.0 Intrusion Detection [1 ed.] Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth 1
1266 cover Snort 2.1 Intrusion Detection, Second Edition [1 ed.] Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin 1
1267 cover Snort 2.1 Intrusion Detection [1 ed.] Johnny Long, Ed Skoudis, Alrik van Eijkelenborg 1
1268 cover Smart Technologies and the End(s) of Law: Novel Entanglements of Law and Technology Mireille Hildebrandt
1269 cover Snort IDS and IPS Toolkit Brian Caswell, Jay Beale, Andrew Baker
1270 cover Sniffer Pro Network Optimization and Troubleshooting Handbook [1 ed.] Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko 1
1271 cover Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle [1 ed.] Erik Pace Birkholz, Stuart McClure 1
1272 cover SQL Injection Attacks and Defense [2 ed.] Justin Clarke 2
1273 cover SSCP Systems Security Certified Practitioner Study Guide Syngress
1274 cover SSCP Study Guide [1 ed.] Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth 1
1275 cover SSCP Systems Security Certified Practitioner Study Guide and DVD Training System [1 ed.] Syngress 1
1276 cover SSCP : study guide and & DVD training system Josh Jacobs
1277 cover SQL injection attacks and defense [2nd ed.] Clarke, Justin 2
1278 cover SQL Injection Attacks and Defense [2nd Edition] Justin Clarke, Kevvie Fowler, Erlend Oftedal, Rodrigo Marcos Alvarez 2
1279 cover Stealing the Network: How to Own a Continent [1st ed.] FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale 1
1280 cover Stealing the Network: How to Own a Shadow. The Chase for Knuth Johnny Long, Timothy (Thor) Mullen and Ryan Russell (Auth.)
1281 cover State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law Eliza Watt
1282 cover Stealing The Network How To Own A Continent
1283 cover Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD [1 ed.] Johnny Long, Ryan Russell, Timothy Mullen 1
1284 cover Syngress force emerging threat analysis : from mischief to malicious David Maynor, et al
1285 cover Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious Michael Gregg, Brian Baskin
1286 cover System Forensics, Investigation, and Response [3rd ed.] Chuck Easttom 3
1287 cover Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware [1 ed.] Aditya Sood and Richard Enbody (Auth.) 1
1288 cover Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook [Pap/DVD ed.] Jack Wiles
1289 cover Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators Wiles J., Long J., Rogers R.
1290 cover Techno Security's Guide to Securing SCADA. A Comprehensive Handbook On Protecting The Critical Infrastructure Jack Wiles (Auth.)
1291 cover Techno Securitys Guide to Managing Risks for IT Managers, Auditors and Investigators Jack Wiles, Johnny Long, Russ Rogers, Ron Green
1292 cover Terrorism in cyberspace : the next generation Weimann, Gabriel
1293 cover The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online [1 ed.] Denny Cherry 1
1294 cover The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice [1 ed.] Jason Andress 1
1295 cover The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [1 ed.] Patrick Engebretson 1
1296 cover The Best Damn Firewall Book Period [1 ed.] Syngress Media Inc 1
1297 cover The Best Damn Firewall Book Period [2 ed.] Thomas W Shinder 2
1298 cover The Complete Guide to Internet Security [1st ed.] Mark S. Merkow Jim Breithaupt 1
1299 cover The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age [1st ed.] Mark S. Merkow CCP, James Breithaupt 1
1300 cover The History of Information Security: A Comprehensive Handbook [1 ed.] Karl M. M. de Leeuw, Jan Bergstra, Karl Maria Michael de Leeuw 1
1301 cover The international handbook of computer security Jae K. Shim
1302 cover Trojan Horse: A Jeff Aiken Novel Mark Russinovich, Kevin Mitnick
1303 cover War: Driving and Wireless Penetration Testing [1 ed.] Chris Hurley, Russ Rogers, Frank Thornton, Daniel Connelly and Brian Baker (Auth.) 1
1304 cover CISSP Practice Exams [3e edition] Harris, Shon 3
1305 cover Advanced malware analysis [1 ed.] Elisan, Christopher C 1
1306 cover CompTIA security+ (exam SY0-401) [4th ed] Dunkerley, Dawn, Meyers, Mike, Samuelle, T. J 4
1307 cover Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments [1 ed.] Ric Messier 1
1308 cover CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) [5th ed.] Wm. Arthur Conklin, Gregory White 5
1309 cover CompTIA Security+ All-in-One Exam Guide [2 ed.] Gregory White, Wm. Arthur Conklin, Dwayne Williams, Roger Davis, Chuck Cothren 2
1310 cover CompTIA Security+ (Exam SY0-501) [5 ed.] Dawn Dunkerley 5
1311 cover Hacking Exposed Linux, 3rd Edition [3 ed.] ISECOM 3
1312 cover Anti-Hacker Tool Kit [2 ed.] Mike Shema, Bradley C. Johnson 2
1313 cover Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Bodungen, Clint E.,Hilt, Stephen,Shbeeb, Aaron,Singer, Bryan L.,Wilhoit, Kyle
1314 cover CompTIA security+ all-in-one exam guide, (Exam SY0-501) [Fifth edition] Conklin, W. Arthur,White, Greg,Williams, Dwayne,Cothren, Chuck,Davis, Roger L
1315 cover Network Security: A Beginner’s Guide [2 ed.] Maiwald, Eric 2
1316 cover Anti-Hacker Tool Kit [Fourth edition /] Shema, Mike
1317 cover Network security: the complete reference Bragg, Roberta,Strassberg, Keith,Rhodes-Ousley, Mark
1318 cover Securing the Clicks Network Security in the Age of Social Media Gary Bahadur, Jason Inasi, Alex de Carvalho
1319 cover Network Security: A Beginners Guide Eric Maiwald
1320 cover Anti-Spam Tool Kit [1 ed.] Paul Wolfe, Charlie Scott, Mike Erwin 1
1321 cover CompTIA Security+ Certification Practice Exams (Exam SY0-501) [3 ed.] Daniel Lachance, Glen E. Clarke 3
1322 cover CompTIA Security+ Certification Bundle (Exam SY0-601) Glen E. Clarke
1323 cover Gray Hat Hacking: The Ethical Hacker’s Handbook [4 ed.] Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims 4
1324 cover The Law and Economics of Cybersecurity Mark F. Grady, Francesco Parisi
1325 cover Data Analytics for Cybersecurity Vandana P. Janeja
1326 cover Wireless Internet Security: Architecture and Protocols [1 ed.] James Kempf 1
1327 cover The Net And The Nation State: Multidisciplinary Perspectives On Internet Governance [1 ed.] Uta Kohl 1
1328 cover Privacy And Power: A Transatlantic Dialogue In The Shadow Of The NSA-Affair [1 ed.] Russell A. Miller 1
1329 cover Cyber Security And The Politics Of Time [1st Edition] Tim Stevens 1
1330 cover Cyber Mercenaries: The State, Hackers, and Power Tim Maurer
1331 cover Cyber Peace: Charting A Path Toward A Sustainable, Stable, And Secure Cyberspace [1 ed.] Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen 1
1332 cover Governing New Frontiers In The Information Age: Toward Cyber Peace [1st Edition] Scott J. Shackelford 1
1333 cover Network Security: A Decision and Game-Theoretic Approach [1 ed.] Tansu Alpcan, Tamer Baar 1
1334 cover Information Theoretic Security and Privacy of Information Systems [1 ed.] Rafael F. Schaefer, Holger Boche, Ashish Khisti, H. Vincent Poor 1
1335 cover Hacking exposed, network security secrets and solutions [Notations ed.] Joel Scambray
1336 cover Wireless security Merritt Maxim, David Pollino
1337 cover Wi-Fi security Miller, Stewart S
1338 cover IT Auditing Using Controls to Protect Information Assets, 2nd Edition [2 ed.] Chris Davis, Mike Schiller, Kevin Wheeler 2
1339 cover IT Auditing: Using Controls to Protect Information Assets [1 ed.] Chris Davis, Mike Schiller, Kevin Wheeler 1
1340 cover Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) Jonathan S. Weissman
1341 cover IT Auditing Using Controls to Protect Information Assets [3rd ed.] Mike Kegerreis,Mike Schiller,Chris Davis 3
1342 cover Hacking Exposed: Mobile Security Secrets & Solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray
1343 cover Certification and Security in Health-Related Web Applications: Concepts and Solutions Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
1344 cover Medical Device Cybersecurity for Engineers and Manufacturers [2 ed.] Axel Wirth 2
1345 cover Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT) Sunil Gupta, Hitesh Kumar Sharma, Monit Kapoor
1346 cover Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States [1 ed.] Matthew Webster 1
1347 cover Cybersecurity for Connected Medical Devices [1 ed.] Arnab Ray 1
1348 cover Future Trends in Biomedical and Health Informatics and Cybersecurity in Medical Devices: Proceedings of the International Conference on Biomedical and Health Informatics, ICBHI 2019, 17-20 April 2019, Taipei, Taiwan [1st ed. 2020] Kang-Ping Lin, Ratko Magjarevic, Paulo de Carvalho 1
1349 cover How HIPAA Can Crush Your Medical Practice: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It Craig a Petronella
1350 cover Health Data in the Information Age : Use, Disclosure, and Privacy [1 ed.] Institute of Medicine, Committee on Regional Health Data Networks, Kathleen N. Lohr, Molla S. Donaldson 1
1351 cover Biometrics: Theory, Applications, and Issues : Theory, Applications, and Issues [1 ed.] Ellen R. Nichols 1
1352 cover Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security John Medicine
1353 cover Decrypting the Encryption Debate: A Framework for Decision Makers [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Law Enforcement and Intelligence Access to Plaintext Information 1
1354 cover Recoverability As a First-Class Security Objective: Proceedings of a Workshop [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Frances Johnson 1
1355 cover Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Peter J. Weinberger, Baruch Fischhoff, Lynette I. Millett 1
1356 cover Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop [1 ed.] and Medicine Engineering National Academies of Sciences, Forum on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Johnson 1
1357 cover Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Planning Committee for a Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext, Jon Eisenberg, Emily Grumbling, Anne Johnson 1
1358 cover Hacking AI: Big and Complete Guide to Hacking, Security, AI and Big Data. Hans Weber
1359 cover AI in Cybersecurity [1 ed.] Leslie F. Sikos (editor) 1
1360 cover Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies [1 ed.] Alessandro Parisi 1
1361 cover AI in Cybersecurity Leslie F. Sikos (Editor)
1362 cover Confluence of AI, Machine, and Deep Learning in Cyber Forensics Sanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (editor)
1363 cover Cyber defense mechanisms security, privacy, and challenges Kumar, Gautam(Editor),Saini, Dinesh Kumar(Editor),Cuong, Nguyen Ha Huy(Editor)
1364 cover AI-Enabled Threat Detection and Security Analysis for Industrial IoT Hadis Karimipour, Farnaz Derakhshan
1365 cover Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications) Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Nishan Chelvachandran (editor), Jaime Ibarra (editor)
1366 cover Policing In The Era Of AI And Smart Societies [1st Edition] Hamid Jahankhani, Babak Akhgar, Peter Cochrane, Mohammad Dastbaz 1
1367 cover Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making Hamid Jahankhani, Liam M. O’Dell, Gordon Bowen, Daniel Hagan, Arshad Jamal
1368 cover AI in the Age of Cyber-Disorder. Actors, Trends, and Prospects Fabio Rugge
1369 cover The NICE Cyber Security Framework: Cyber Security Management Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh
1370 cover The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms Raj Badhwar
1371 cover Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Parisi, Alessandro
1372 cover Practical AI for Cybersecurity [1 ed.] Ravi Das 1
1373 cover Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications [1 ed.] Gautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor) 1
1374 cover Secure and Smart Internet of Things (IoT) Using Blockchain and AI Ahmed Banafa
1375 cover Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) [1 ed.] Gautam Kumar (editor), Dinesh Kumar Saini (editor), Nguyen Ha Huy Cuong (editor) 1
1376 cover Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence, 1030) Nadia Nedjah (editor), Ahmed A. Abd El-Latif (editor), Brij B. Gupta (editor), Luiza M. Mourelle (editor)
1377 cover Practical AI for Cybersecurity Ravi Das
1378 cover Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21 Yassine Maleh, Mamoun Alazab, Noreddine Gherabi, Lo’ai Tawalbeh, Ahmed A. Abd El-Latif
1379 cover AI, Machine Learning and Deep Learning: A Security Perspective Fei Hu, Xiali Hei
1380 cover Advanced Computer Science Applications: Recent Trends in AI, Machine Learning, and Network Security [1 ed.] Karan Singh (editor), Latha Banda (editor), Manisha Manjul (editor) 1
1381 cover Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers Chunhua Su, Kouichi Sakurai
1382 cover Explainable AI for Cybersecurity [1st ed. 2023] Zhixin Pan, Prabhat Mishra 1
1383 cover Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022 Matsue, Japan, August 10–12, 2022 Revised Selected Papers Chunhua Su, Kouichi Sakurai
1384 cover Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things) Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor)
1385 cover Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat
1386 cover 10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques Rajvardhan Oak
1387 cover Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing) [1 ed.] Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor) 1
1388 cover Privacy in the Age of Innovation : AI Solutions for Information Security Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala
1389 cover Privacy in the Age of Innovation: AI Solutions for Information Security [1 ed.] Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala 1
1390 cover Emerging Role of AI Based Expert Systems in Cyber Defense and Security Kirti Raj Bhatele, Astitwa Bhargava, Anand Jha
1391 cover Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu
1392 cover Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) [1 ed.] Ravindra Das 1
1393 cover Adversarial AI Attacks, Mitigations, and Defense Strategies [1 ed.] John Sotiropoulos 1
1394 cover Combating Cyberattacks Targeting the AI Ecosystem Aditya K. Sood
1395 cover Next-Generation Cybersecurity: AI, ML, and Blockchain (Blockchain Technologies) [2024 ed.] Keshav Kaushik (editor), Ishu Sharma (editor) 2024
1396 cover AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability [2024 ed.] Iqbal H. Sarker 2024
1397 cover ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills [1 ed.] Clint Bodungen 1
1398 cover ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills Clint Bodungen
1399 cover AI Embedded Assurance for Cyber Systems Cliff Wang, S. S. Iyengar, Kun Sun
1400 cover Adaptive Anomalies: AI in Intrusion Detection Systems amie Flux
1401 cover Mastering AI, Machine Learning and Cyber Security Rahul Vadisetty
1402 cover Supply Chain Software Security: AI, IoT, and Application Security Aamiruddin Syed
1403 cover Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions [1 ed.] Ahmed A. Abd El-Latif (editor), Lo'ai Tawalbeh (editor), Manoranjan Mohanty (editor), Brij B. Gupta (editor), Konstantinos E. Psannis (editor) 1
1404 cover Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions [1 ed.] Pethuru Raj (editor), B. Sundaravadivazhagan (editor), V. Kavitha (editor) 1
1405 cover Generative AI, Cybersecurity, and Ethics Mohammad Rubyet Islam
1406 cover AI and Emerging Technologies; Automated Decision-Making, Digital Forensics, and Ethical Considerations Purvi Pokhariyal, Archana Patel, Shubham Pandey
1407 cover Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 Hamid Jahankhani
1408 cover AI-Driven: Social Media Analytics and Cybersecurity Wael M. S. Yafooz, Yousef Al-Gumaei (Eds.)
1409 cover Inside Cyber : How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security Chuck Brooks
1410 cover Safeguarding the Future: Security and Privacy by Design for AI, Metaverse, Blockchain, and Beyond [1 ed.] Alan Tang 1
1411 cover Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos
1412 cover Hacking und Cyber Security mit KI: Prompt Engineering, Phishing, Pentesting, IT security uvm. mithilfe von ChatGPT Inkl. vielen Challenges Florian Dalwigk
1413 cover Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) Padmavathi Ganapathi (editor), D. Shanmugapriya (editor)
1414 cover Deep Learning Applications for Cyber Security [1st ed. 2019] Mamoun Alazab, MingJian Tang 1
1415 cover Machine Learning for Cybersecurity: Innovative Deep Learning Solutions Marwan Omar
1416 cover Hacking Artificial Intelligence: A Leader's Guide from Deepfakes to Breaking Deep Learning [1 ed.] Davey Gibian 1
1417 cover Malware Analysis Using Artificial Intelligence and Deep Learning Mark Stamp, Mamoun Alazab, Andrii Shalaginov
1418 cover Deep Learning Techniques for IoT Security and Privacy (Studies in Computational Intelligence, 997) [1st ed. 2022] Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Weiping Ding 1
1419 cover Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks) Kwangjo Kim, Harry Chandra Tanuwidjaja
1420 cover Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (SpringerBriefs in Computer Science) Marwan Omar
1421 cover Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript J. D. Glaser
1422 cover Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) Stanislav Abaimov, Maurizio Martellini
1423 cover Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem Soma Halder, Sinan Ozdemir
1424 cover Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python Chiheb Chebbi
1425 cover Data Mining and Machine Learning in Cybersecurity Sumeet Dua, Xian Du
1426 cover Data Mining and Machine Learning in Cybersecurity [1 ed.] Sumeet Dua, Xian Du 1
1427 cover Machine Learning and Cryptographic Solutions for Data Protection and Network Security J Anitha Ruth, Vijayalakshmi G V Mahesh, P Visalakshi
1428 cover Hands-on Machine Learning for Cyber Security Soma Halder
1429 cover Machine learning et security: protecting systems with data and algorithms Chio, Clarence,Freeman, David
1430 cover Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings [1 ed.] Shlomi Dolev, Sachin Lodha (eds.) 1
1431 cover Social Network Forensics, Cyber Security, and Machine Learning [1st ed.] P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat 1
1432 cover Machine Learning for Cybersecurity Cookbook Emmanuel Tsukerman
1433 cover Machine learning for computer and cyber security: principles, algorithms, and practices Gupta, Brij, Sheng, Quan Z
1434 cover Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings [1st ed. 2019] Xiaofeng Chen, Xinyi Huang, Jun Zhang 1
1435 cover Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python [1 ed.] Emmanuel Tsukerman 1
1436 cover Introduction to Machine Learning with Applications in Information Security Mark Stamp
1437 cover Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals Zach Codings
1438 cover Cyber Security Cryptography and Machine Learning [1st ed.] Itai Dinur, Shlomi Dolev, Sachin Lodha 1
1439 cover Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I [1st ed.] Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang 1
1440 cover Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings [1st ed.] Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss 1
1441 cover Cyber Security Meets Machine Learning Xiaofeng Chen, Willy Susilo, Elisa Bertino
1442 cover Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III [1st ed.] Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang 1
1443 cover Machine Learning Approaches in Cyber Security Analytics [1 ed.] Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel 1
1444 cover Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II [1st ed.] Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang 1
1445 cover Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann
1446 cover Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) 1
1447 cover Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings (Communications in Computer and Information Science) Gang Wang (editor), Arridhana Ciptadi (editor), Ali Ahmadzadeh (editor)
1448 cover Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) [1st ed. 2022] Stanislav Abaimov, Maurizio Martellini 1
1449 cover Machine Learning for Cyber Security Preeti Malik, Lata Nautiyal, Mangey Ram
1450 cover Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301) [1st ed. 2022] Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor) 1
1451 cover Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks) Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
1452 cover Introduction to Machine Learning with Applications in Information Security [2 ed.] Mark Stamp 2
1453 cover Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part I Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1454 cover Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them Ram Shankar, Siva Kumar, Hyrum Anderson
1455 cover Machine Learning, Image Processing, Network Security and Data Sciences. 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings [Part II] Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni
1456 cover Machine Learning Techniques for Cybersecurity Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub
1457 cover Machine Learning for Cyber Security Preeti Malik (editor), Lata Nautiyal (editor), Mangey Ram (editor)
1458 cover Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings Shlomi Dolev, Jonathan Katz, Amnon Meisels
1459 cover Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on MIND 2021 Rajesh Doriya, Badal Soni, Anupam Shukla, Xiao-Zhi Gao
1460 cover Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part I Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1461 cover Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1462 cover Machine Learning under Malware Attack Raphael Labaca-Castro
1463 cover Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part III] Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1464 cover Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part II] Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1465 cover Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings, Part II Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni
1466 cover Not with a Bug, But with a Sticker : Attacks on Machine Learning Systems and What To Do About Them Ram Shankar Siva Kumar, Hyrum Anderson
1467 cover 10 Machine Learning Blueprints You Should Know for Cybersecurity [1 ed.] Rajvardhan Oak 1
1468 cover Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, Proceedings, Part II Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni
1469 cover Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, ... in Computer and Information Science) Nilay Khare (editor), Deepak Singh Tomar (editor), Mitul Kumar Ahirwal (editor), Vijay Bhaskar Semwal (editor), Vaibhav Soni (editor)
1470 cover Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems) Bimal Kumar Roy (editor), Atul Chaturvedi (editor), Boaz Tsaban (editor), Sartaj Ul Hasan (editor)
1471 cover Autorschaftserkennung und Verstellungsstrategien: Textanalysen und -vergleiche im Spektrum forensischer Linguistik, Informationssicherheit und Machine-Learning Steffen Hessler
1472 cover Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security Arun Kumar Rana, Rashmi Gupta, Sharad Sharma, Ahmed A. Elngar, Sachin Dhawan
1473 cover Intelligent Systems Modeling and Simulation III: Artificial Intelligent, Machine Learning, Intelligent Functions and Cyber Security Samsul Ariffin, Abdul Karim
1474 cover Python Web Penetration Testing Cookbook Buchanan C., Ip T., Mabbitt A. et al.
1475 cover Python Penetration Testing Essentials Mohit Raj.
1476 cover Gray Hat Python - Python Programming for Hackers and Reverse Engineers
1477 cover Python Ethical Hacking from Scratch Fahad Ali Sarwar
1478 cover Cyber Security: Python for Penetration Testing Travis Czech
1479 cover Ethical Hacking with Python - Build your own Hacking Scripts and Tools with Python from Scratch Abdeladim Fadheli
1480 cover Python for Cybersecurity Howard E. Poston lll
1481 cover Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker Attacks Alan Grid
1482 cover The secret of bug hunting. Bug bounty automation with python Syed Abuthahir
1483 cover Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python [1 ed.] Bastian Ballmann (auth.) 1
1484 cover Understanding Network Hacks: Attack and Defense with Python [1 ed.] Bastian Ballmann (auth.) 1
1485 cover Understanding Network Hacks Attack and Defense with Python [Softcover reprint of the original 1st ed. 2015] Bastian Ballmann 1
1486 cover Hacking: Hacking With Python - The Complete Beginner's Course to Learn Ethical Hacking With Python in 7 Clear-Cut Lessons - Including Dozens of Practical Examples & Exercises (Hacking Series Book 1) Alphy Books, Hacking
1487 cover Effective Python Penetration Testing Rejah Rehim
1488 cover Beginning Ethical Hacking with Python [1 ed.] Sanjib Sinha (auth.) 1
1489 cover Python and Hacking Made Simple: Full Beginners Bundle To Master Python & Hacking Project Syntax
1490 cover Python Digital Forensics Cookbook Preston Miller, Chapin Bryce
1491 cover Python Penetration Testing Cookbook: Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation [1st edition] Rehim, Rejah 1
1492 cover Hacking with Python: Beginner's Guide to Ethical Hacking, Basic Security, Penetration Testing, and Python Hacking Lane, Evan
1493 cover Python Penetration Testing Essentials: Techniques for ethical hacking with Python [2nd Edition] Raj, Mohit 2
1494 cover Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python Hussam Khrais
1495 cover Python for Offensive PenTest: A Complete Practical Guide to Ethical Hacking and Penetration Testing Using Python Hussam Khrais
1496 cover Hands-On Penetration Testing with Python Enhance your ethical hacking skills to build automated and intelligent systems Furqan Khan
1497 cover Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems Khan, Furqan
1498 cover Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition [2 ed.] Preston Miller, Chapin Bryce 2
1499 cover Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition. Code Preston Miller, Chapin Bryce
1500 cover Python for Beginners : An Essential Guide to Easy Learning with Basic Exercises : Python programming Crash Course for Data Analysis and for Beginner Hackers Walsh, Conley
1501 cover COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing Mach, Dylan
1502 cover COMPUTER PROGRAMMING 4 Books In 1: Data Science, Hacking with Kali Linux, Computer Networking for Beginners, Python Programming Jason Callaway
1503 cover COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing Dylan Mach
1504 cover Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 [2. Aufl.] Bastian Ballmann 2
1505 cover LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERS DARWIN, TYE
1506 cover Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 Bastian Ballmann
1507 cover Understanding Network Hacks: Attack and Defense with Python 3 [2 ed.] Bastian Ballmann 2
1508 cover Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity Grid, Alan
1509 cover Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware Fahad Ali Sarwar
1510 cover Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition [2 ed.] Bastian Ballmann 2
1511 cover Understanding Network Hacks: Attack and Defense with Python 3 [2nd ed. 2021] Bastian Ballmann 2
1512 cover Python for Cybersecurity: Using Python for Cyber Offense and Defense Howard E Poston
1513 cover Python for Cybersecurity: Using Python for Cyber Offense and Defense [1 ed.] Howard E. Poston 1
1514 cover Python for Cybersecurity: Using Python for Cyber Offense and Defense Howard E. Poston III
1515 cover Black Hat Python, 2nd Edition Justin Seitz, Tim Arnold
1516 cover Python for OSINT. 21 day course for beginners [First ed.] cyb_detective
1517 cover Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python Tony Snake
1518 cover Top 10 Hacking Scripts in Python, C#, and ASP.NET: 2 Books in 1 Devwebtuts Publishing
1519 cover Mastering Computer Programming: A Comprehensive Guide to Python, C, C++, C#, HTML Coding, and Ethical Hacking Kameron Hussain, Frahaan Hussain
1520 cover Learn Penetration Testing with Python 3.x : An ethical hacker’s blueprint for offensive security [2 ed.] Yehia Elghaly 2
1521 cover Ethical Hacking with Python: Developing Cybersecurity Tools Nate Phoetean
1522 cover Python For Cybersecurity : Securing Systems And Networks With Python Programming Jackson, Marley
1523 cover Python Programming For Cybersecurity With PyShark And Cryptography: A Hands-On Beginner's Guide To Leveraging PyShark for Network Traffic Analysis and Cryptography for Secure Communication Caldwell, Alex
1524 cover Master Python Cybersecurity 2024 Rodrigues, Diego
1525 cover Java 2 network security Marco Pistoia, International Business Machines Corporation., et al
1526 cover Java 2 Network Security [2nd ed.] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani 2
1527 cover Cryptography for Internet and database applications: developing secret and public key techniques with Java [1st ed.] Nick Galbreath 1
1528 cover The Decision to Attack: Military and Intelligence Cyber Decision-Making Brantly Aaron Franklin, Keller William.
1529 cover The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You Matherly John.
1530 cover Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense Jean Nestor M. Dahj
1531 cover Cyber Security Intelligence and Analytics Zheng Xu
1532 cover Romanian Intelligence Service - OSINT Handbook
1533 cover Intelligence-Driven Incident Response: Outwitting the Adversary Brown, Roberts
1534 cover Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks Aditya K. Sood PhD
1535 cover Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT [1 ed.] Rajdeep Chowdhury 1
1536 cover Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Vinny Troia
1537 cover Dark Web and Deep Web Intelligence Schuster Louis
1538 cover Check Point Advanced Technical Reference Guide NG with Application Intelligence
1539 cover Intelligent Multimedia Data Hiding: New Directions [1 ed.] Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain, Wai-Chi Fang 1
1540 cover Intelligence and Security Informatics: Techniques and Applications [1 ed.] Bhavani Thuraisingham (auth.), Hsinchun Chen, Christopher C. Yang (eds.) 1
1541 cover Intelligence and Security Informatics: IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Lecture Notes in Computer Science, 5075) Christopher C. Yang (editor), Hsinchun Chen (editor), Michael Chau (editor), Kuiyu Chang (editor), Sheau-Dong Lang (editor), Patrick Chen (editor), Raymond Hsieh (editor), Daniel Zeng (editor), Fei-Yue Wang (editor), Kathleen M. Carley (editor), Wenji Mao (editor), Justin Zhan (editor)
1542 cover Safeguards in a world of ambient intelligence [1. softcover print ed.] Wright, David,Vildjiounaite, Elena,Gutwirth, Serge,Punie, Yves,Friedewald, Michael 1
1543 cover Internet searches for vetting, investigations, and open-source intelligence [1 ed.] Edward J. Appel 1
1544 cover Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System [1 ed.] Álvaro Herrero, Emilio Corchado (auth.) 1
1545 cover Chaos-Based Cryptography: Theory,Algorithms and Applications [1 ed.] Dimitar Solev, Predrag Janjic, Ljupco Kocarev (auth.), Ljupco Kocarev, Shiguo Lian (eds.) 1
1546 cover Enabling Open Source Intelligence (OSINT) in Private Social Networks [12347] Benjamin Robert Holland 12347
1547 cover Verification of security intelligence for a resilient SCADA system Sumit Chakraborty
1548 cover Risk Assessment and Management in the Networked Economy [1 ed.] Omar K. Hussain, Tharam S. Dillon, Farookh K. Hussain, Elizabeth J. Chang (auth.) 1
1549 cover Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings [1 ed.] Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang (eds.) 1
1550 cover Open Source Intelligence in a Networked World Anthony Olcott
1551 cover Intelligent Methods for Cyber Warfare [1 ed.] Ronald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.) 1
1552 cover Cybercrime, Digital Forensics and Jurisdiction [1 ed.] Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.) 1
1553 cover Advanced Research in Data Privacy [1 ed.] Guillermo Navarro-Arribas, Vicenç Torra (eds.) 1
1554 cover (OSINT) Open Source Intelligence Glossary: Guide to keywords, phrases for improved Internet research results Nicholas Crowder
1555 cover The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You Matherly, John
1556 cover Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges Qing Li, Gregory Clark
1557 cover The Tao of Open Source Intelligence IT Governance Publishing
1558 cover Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks Claude Fachkha
1559 cover Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 [1 ed.] Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) 1
1560 cover Hacking : The Ultimate Hacking for Beginners : How to Hack : Hacking Intelligence : Certified Hacking Book kevin smith
1561 cover (OSINT) Open Source Intelligence Glossary Volume I: Guide to Keywords, Phrases for Improved Internet Research Results [1] Nicholas Crowder 1
1562 cover Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach [1 ed.] Roman Gumzej (auth.) 1
1563 cover The Tao of Open Source Intelligence [1 ed.] Stewart K. Bertram 1
1564 cover Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [5 ed.] Michael Bazzell 5
1565 cover Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level [1 ed.] Florian Skopik 1
1566 cover Introduction to Artificial Intelligence for Security Professionals [1 ed.] The Cylance Data Science Team 1
1567 cover Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings [1 ed.] G. Alan Wang, Michael Chau, Hsinchun Chen (eds.) 1
1568 cover Darkweb cyber threat intelligence mining Robertson, John
1569 cover Information Fusion for Cyber-Security Analytics Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George
1570 cover Intelligence-driven incident response outwitting the adversary [First edition] Brown, Rebekah,Roberts, Scott J
1571 cover Intelligence-driven incident response: outwitting the adversary [First edition] Roberts, Scott J,Brown, Rebekah,Maxwell, Kyle R
1572 cover Cyber Security for Cyber Physical Systems [1 ed.] Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) 1
1573 cover Information Fusion for Cyber-Security Analytics [1st edition] Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George 1
1574 cover Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level [1 ed.] Florian Skopik 1
1575 cover International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence [1 ed.] Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) 1
1576 cover Artificial Intelligence Tools for Cyber Attribution Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
1577 cover Artificial Intelligence Tools for Cyber Attribution [1 ed.] Eric Nunes,Paulo Shakarian,Gerardo I. Simari,Andrew Ruef (auth.) 1
1578 cover Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela
1579 cover Cyber Threat Intelligence [1st ed.] Ali Dehghantanha, Mauro Conti, Tooska Dargahi 1
1580 cover Digital Defence: Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics Kumar, Ahlad, Kumar Chaudhary, Naveen, Shastri, Apoorva S., Singh, Mangal, Kulkarni, Dr Anand J.
1581 cover Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (River Publishers Series in Digital Security and Forensics) [1 ed.] Akansha Singh (editor), Krishna Kant Singh (editor) 1
1582 cover The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity. M. A. Jabbar, Sanju Tiwari, Subhendu Kumar Pani, Stephen Huang
1583 cover Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117) Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor)
1584 cover Open Source Intelligence (OSINT) — A Practical Introduction: A Field Manual Varin Khera, Anand R. Prasad, Suksit Kwanoran
1585 cover Advanced OSINT Strategies: Online Investigations and Intelligence Gathering Rob Botwright
1586 cover Mathematics of Computer Science, Cybersecurity and Artificial Intelligence Cheikh Thiecoumba Gueye, Papa Ngom, Idy Diop (Eds.)
1587 cover Network Security Empowered by Artificial Intelligence Yingying Chen, Jie Wu, Paul Yu, Xiaogang Wang
1588 cover Advanced Techniques of Artificial Intelligence in IT Security Systems (Studies in Big Data, 146) [1st ed. 2024] Marcin Korytkowski 1
1589 cover Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications) [2024 ed.] Hamid Jahankhani (editor), Gordon Bowen (editor), Mhd Saeed Sharif (editor), Osama Hussien (editor) 2024
1590 cover Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107) [2024 ed.] Yingying Chen (editor), Jie Wu (editor), Paul Yu (editor), Xiaogang Wang (editor) 2024
1591 cover Artificial Intelligence for Cyber-Physical Systems Hardening Issa Traore, Isaac Woungang, Sherif Saad
1592 cover Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection [1 ed.] Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) 1
1593 cover Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons Erendor, Mehmet Emin
1594 cover Computational Intelligence Applications in Cyber Security [1 ed.] Suhel Ahmad Khan (editor), Mohammad Faisal (editor), Nawaf Alharbe (editor), Rajeev Kumar (editor), Raees Ahmad Khan (editor) 1
1595 cover Deep Dive : Exploring the Real‐world Value of Open Source Intelligence Rae Baker
1596 cover The Art of Cyber Defense: From Risk Assessment to Threat Intelligence [1 ed.] Youssef Baddi (editor), Mohammed Amin Almaiah (editor), Omar Almomani (editor), Yassine Maleh (editor) 1
1597 cover Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics [1 ed.] Adam Tilmar Jakobsen 1
1598 cover Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities Sharma, Smita, Thirumalaisamy, Manikandan, Balusamy, Balamurugan, Chilamkurti, Naveen
1599 cover Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman
1600 cover Artificial Intelligence and Cyber Security in Industry 4.0 Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi
1601 cover Artificial Intelligence and Cybersecurity. Theory and Applications Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
1602 cover Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications Ouaissa, Mariya, Ouaissa, Mariyam, Boulouard, Zakaria, Kumar, Abhishek
1603 cover Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security, 101) [1st ed. 2023] Reza Montasari 1
1604 cover The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense Donnie W. Wendt
1605 cover The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics Izzat Alsmadi
1606 cover The OSINT Codebook: Cracking Open Source Intelligence Strategies Alexandre DeGarmo
1607 cover Deep Dive: Exploring the Real-world Value of Open Source Intelligence [1 ed.] Rae L. Baker 1
1608 cover Kids Cybersecurity Using Computational Intelligence Techniques Wael Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara
1609 cover Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang
1610 cover Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2 Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang
1611 cover Computational Intelligence for Cybersecurity Management and Applications [1 ed.] Yassine Maleh (editor), Mamoun Alazab (editor), Soufyane Mounir (editor) 1
1612 cover Intelligence-Driven Incident Response [2 ed.] Rebekah Brown and Scott J. Roberts 2
1613 cover The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [2 ed.] Izzat Alsmadi 2
1614 cover Cyber Threat Intelligence Martin Lee
1615 cover International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th ... (Lecture Notes in Networks and Systems, 748) Pablo García Bringas (editor), Hilde Pérez García (editor), Francisco Javier Martínez de Pisón (editor), Francisco Martínez Álvarez (editor), Alicia Troncoso Lora (editor), Álvaro Herrero (editor), José Luis Calvo Rolle (editor), Héctor Quintián (editor), Emilio Corchado (editor)
1616 cover Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
1617 cover Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman
1618 cover Cyber Threat Intelligence [1 ed.] Martin Lee 1
1619 cover Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks [2 ed.] Aditya K. Sood PhD 2
1620 cover Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks, 2nd Edition [2 ed.] Aditya K. Sood 2
1621 cover Dancho Danchev's Cyber Intelligence Cybercrime Research Memoir Second Edition [2 ed.] Dancho Danchev 2
1622 cover The OSINT Codebook : Cracking Open Source Intelligence Strategies Alexandre DeGarmo
1623 cover Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications Ahmed A. Abd El-Latif, Mohammed Adel Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk
1624 cover Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
1625 cover Artificial Intelligence and Blockchain in Digital Forensics (River Publishers Series in Digital Security and Forensics) [1 ed.] P. Karthikeyan (editor), Hari Mohan Pande (editor), Velliangiri Sarveshwaran (editor) 1
1626 cover Open Source Intelligence 101 : From Novice to Expert Lyam Arnaud
1627 cover Artificial Intelligence for Intrusion Detection Systems Mayank Swarnkar, Shyam Singh Rajput
1628 cover Advancing Computational Intelligence Techniques for Security Systems Design Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan
1629 cover Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) [1st ed. 2022] Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) 1
1630 cover Visual Threat Intelligence: An Illustrated Guide For Threat Researchers Thomas Roccia
1631 cover The OSINT Codebook: Cracking Open Source Intelligence Strategies [1 ed.] Alexandre DeGarmo 1
1632 cover Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [9 ed.] Michael Bazzell 9
1633 cover Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) [1 ed.] Ishaani Priyadarshini (editor), Rohit Sharma (editor) 1
1634 cover Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit, Joseph Opacki
1635 cover Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies, 109) [1st ed. 2022] Sanjay Misra (editor), Chamundeswari Arumugam (editor) 1
1636 cover Finding Beacons in the Dark [1 ed.] BlackBerry Research and Intelligence Team 1
1637 cover Cybersecurity for Artificial Intelligence Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo, Fabio Di Troia
1638 cover Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007) Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor)
1639 cover Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices Dr. Erdal Ozkaya
1640 cover Big Data Analytics and Computational Intelligence for Cybersecurity Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar
1641 cover Mastering Cyber Intelligence Jean Nestor M. Dahj,
1642 cover Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT Rajdeep Chowdhury, S. K. Niranjan
1643 cover Artificial Intelligence and Cybersecurity: Theory and Applications Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
1644 cover The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program [4 ed.] CyberEdge Group, LLC 4
1645 cover Methods, Implementation, and Application of Cyber Security Intelligence and Analytics Jena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar
1646 cover Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)
1647 cover Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631) Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor)
1648 cover Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123) Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor)
1649 cover Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies) Sanjay Misra (editor), Chamundeswari Arumugam (editor)
1650 cover Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity (The Human Element in Smart and Intelligent Systems) [1 ed.] Abbas Moallem (editor) 1
1651 cover Artificial Intelligence and Blockchain for Future Cybersecurity Applications (Studies in Big Data, 90) [1st ed. 2021] Yassine Maleh (editor), Youssef Baddi (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor) 1
1652 cover Artificial Intelligence for Cybersecurity (Advances in Information Security, 54) [1st ed. 2022] Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) 1
1653 cover Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools [1 ed.] Valentina Palacín 1
1654 cover Machine Intelligence and Big Data Analytics for Cybersecurity Applications Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi
1655 cover Practical Threat Intelligence and Data-Driven Threat Hunting Valentina Palacin
1656 cover Offensive Intelligence: 300 Techniques, Tools and Tips to Know Everything [2 ed.] Philippe Dylewski 2
1657 cover Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [8, 8 ed.] Michael Bazzell 8
1658 cover Artificial Intelligence and Blockchain for Future Cybersecurity Applications [1 ed.] Yassine Maleh, Youssef Baddi, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani 1
1659 cover Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop
1660 cover Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler Ravi Devarasetty
1661 cover Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence, 978) Madhusudan Singh
1662 cover Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) [1st ed. 2022] Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop 1
1663 cover Offensive Intelligence: 300 techniques, tools and tips to know everything about everyone, in companies and elsewhere Philippe Dylewski
1664 cover Cyber Security Intelligence and Analytics [1st ed.] Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh 1
1665 cover Cyber Intelligence: Actors, Policies, Practices Constance S. Uthoff
1666 cover Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147) [1 ed.] Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) 1
1667 cover Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction (SpringerBriefs in Computer Science) Hamidreza Alvari, Elham Shaabani, Paulo Shakarian
1668 cover Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities [1st ed. 2021] Sanjay Misra (editor), Amit Kumar Tyagi (editor) 1
1669 cover Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities [1 ed.] Sanjay Misra (editor), Amit Kumar Tyagi (editor) 1
1670 cover Cyber Security, Artificial Intelligence, Data Protection & the Law Robert Walters, Marko Novak
1671 cover Artificial Intelligence, Cybersecurity and Cyber Defence Daniel Ventre
1672 cover 2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) ... and Communications Technologies, 81) Jemal Abawajy (editor), Zheng Xu (editor), Mohammed Atiquzzaman (editor), Xiaolu Zhang (editor)
1673 cover Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques [1 ed.] Vinny Troia 1
1674 cover Artificial Intelligence, Cybersecurity and Cyber Defence Book Daniel Ventre
1675 cover Open Source Intelligence and Cyber Crime: Social Media Analytics [1st ed.] Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn 1
1676 cover Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II [1st ed.] Xingming Sun, Jinwei Wang, Elisa Bertino 1
1677 cover Combating Security Challenges in the Age of Big Data: Powered by State-of-the-Art Artificial Intelligence Techniques [1st ed.] Zubair Md. Fadlullah, Al-Sakib Khan Pathan 1
1678 cover Data Science In Cybersecurity And Cyberthreat Intelligence [1st Edition] Leslie F. Sikos, Kim-Kwang Raymond Choo 1
1679 cover Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I [1st ed.] Xingming Sun, Jinwei Wang, Elisa Bertino 1
1680 cover Artificial Intelligence, Cybersecurity and Cyber Defence [1 ed.] Daniel Ventre 1
1681 cover Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [1st ed.] Xingming Sun, Zhaoqing Pan, Elisa Bertino 1
1682 cover Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part II [1st ed. 2019] Huansheng Ning 1
1683 cover Artificial Intelligence and Global Security: Future Trends, Threats and Considerations Yvonne R. Masakowski
1684 cover The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research Open Source Researchers
1685 cover Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146) Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)
1686 cover Artificial Intelligence and Security Challenges in Emerging Networks (Advances in Computational Intelligence and Robotics) [1 ed.] Ryma Abassi (editor) 1
1687 cover Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources US Department of Justice
1688 cover Cyber-Enabled Intelligence [1 ed.] Huansheng Ning (Editor), Liming Chen (Editor), Ata Ullah (Editor), Xiong Luo (Editor) 1
1689 cover Artificial Intelligence, Cybersecurity and Cyber Defence [2] Daniel Ventre 2
1690 cover The Threat Intelligence Handbook [2 ed.] Christopher Ahlberg 2
1691 cover The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [1st ed.] Izzat Alsmadi 1
1692 cover Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147) Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)
1693 cover The Threat Intelligence Handbook [ebook ed.] Chris Pace (ed.)
1694 cover Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202 Richard Medlin, Nitin Sharma, Justin Casey
1695 cover The decision to attack: military and intelligence cyber decision-making [Paperback edition] Brantly, Aaron Franklin
1696 cover Practical cyber intelligence how action-based intelligence can be an effective response to incidents Wilson Bautista Jr
1697 cover International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and Intelligence [1st ed.] Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman 1
1698 cover Open Source (OSINT) Intelligence Gathering and Analysis - SANS SEC487 Micah Hoffman
1699 cover Big Data Security Shibakali Gupta (editor), Indradip Banerjee (editor), Siddhartha Bhattacharyya (editor)
1700 cover Practical cyber intelligence how action-based intelligence can be an effective response to incidents Wilson Bautista Jr
1701 cover Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents [Paperback ed.] Wilson Bautista
1702 cover Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks) [1st ed. 2018] Darren Quick, Kim-Kwang Raymond Choo 1
1703 cover Open Source Intelligence Techniques: Resources For Searching And Analyzing Online Information 6th Edition [6 ed.] Michael Bazzell 6
1704 cover Cyber terrorism: a guide for facility managers [1 ed.] Gustin, Joseph F 1
1705 cover Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) [1 ed.] Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko 1
1706 cover Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004 [1 ed.] Andrzej Białas (auth.), Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko (eds.) 1
1707 cover Mathematics in cyber research Paul L. Goethals (editor), Natalie Michele Scala (editor), Daniel T. Bennett (editor)
1708 cover A Multidisciplinary Introduction to Information Security Mjolsnes, Stig F.
1709 cover A Multidisciplinary Introduction to Information Security Stig F. Mjolsnes
1710 cover Modern Cryptography Applied Mathematics for Encryption and Information Security William Easttom
1711 cover Modern Cryptograph.y Applied Mathematics for Encryption and Information Security [2 ed.] Chuck Easttom 2
1712 cover Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology [1 ed.] Nicholas J. Daras, Themistocles M. Rassias (eds.) 1
1713 cover Mathematics in Cyber Research Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett
1714 cover Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology [1st ed.] Nicholas J. Daras, Themistocles M. Rassias (eds.) 1
1715 cover A Human Readable Guide to Cyber Security Christian, Dane
1716 cover Analyzing Human Behavior In Cyberspace Zheng Yan
1717 cover Advances in Human Factors in Cybersecurity [1st ed.] Tareq Z. Ahram, Denise Nicholson 1
1718 cover Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA [1st ed.] Isabella Corradini, Enrico Nardelli, Tareq Ahram 1
1719 cover Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA [1st ed.] Tareq Ahram, Waldemar Karwowski 1
1720 cover Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17–21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA Denise Nicholson (editor)
1721 cover Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (Lecture Notes in Networks and Systems) [1st ed. 2021] Matteo Zallio (editor), Carlos Raymundo Ibañez (editor), Jesus Hechavarria Hernandez (editor) 1
1722 cover A Human Readable Guide to Cyber Security Dane Christian
1723 cover Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Derrick Rountree
1724 cover Wireshark & Ethereal Network Protocol Analyzer Toolkit Angela Orebaugh, Gilbert Ramirez, Jay Beale, Joshua Wright
1725 cover X-Ways Forensics Practitioner's Guide [1 ed.] Brett Shavers, Eric Zimmerman 1
1726 cover Zen and the Art of Information Security [1 ed.] Ira Winkler 1
1727 cover Zero Day Mark Russinovich
1728 cover Zero Day Exploit: Countdown to Darkness [First Edition] Rob Shein, David Litchfield, Marcus Sachs
1729 cover Zero To Mastery In Information Security And Cyber Laws: No.1 Book To Become Zero To Hero In Information Security And Cyber Laws, This Amazing Book Covers ... Edition (Zero To Mastery Computer Series) Rajiv Jain, Vei Publishing
1730 cover Zero To Mastery In Network Security- No.1 Network Security Book To Become Zero To Hero In Network Security, This Amazing Network Security Book Covers A-Z ... Edition (Zero To Mastery Computer Series) Rajiv Jain, Vei Publishing, Ayaz Uddin (editor)
1731 cover Zero-Day Exploit Rob Shein, David Litchfield, Marcus Sachs
1732 cover The Cybersecurity Body of Knowledge-The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity [1 ed.] Daniel Shoemaker (Author), Anne Kohnke (Author), Ken Sigler (Author) 1
1733 cover Wireless security Maxim M, Pollino D.
1734 cover Distributed Denial of Service Attacks-Real-world Detection and Mitigation [1 ed.] İlker Özçelik (Author), Richard Brooks (Author) 1
1735 cover Network security: a beginner's guide [Third edition] Maiwald, Eric
1736 cover Hacking Exposed Mobile Security Secrets & Solutions Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse
1737 cover Ccsp Certified Cloud Security Professional All-In-One Exam Guide [ebook ed.] Daniel Carter
1738 cover CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition [4 ed.] Daniel Lachance, Glen E. Clarke 4
1739 cover Cryptography & Network Security (McGraw-Hill Forouzan Networking) [1 ed.] Behrouz Forouzan 1
1740 cover Network Security Portable Reference [1 ed.] Michael Horton 1
1741 cover Network Security Illustrated [1 ed.] Jason Albanese, Wes Sonnenreich 1
1742 cover Hacking Exposed Mobile: Security Secrets & Solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price
1743 cover Cryptography and network security Atul Kahate
1744 cover Network Security Illustrated
1745 cover Cryptography And Network Security [2 ed.] Atul Kahate 2
1746 cover CompTIA Security+ Certification Study Guide (Exam SY0-601) Glen E. Clarke
1747 cover Cipm Certified Information Privacy Manager All-In-One Exam Guide Peter H. Gregory
1748 cover Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions Rich Cannings, Himanshu Dwivedi, Zane Lackey
1749 cover Comptia Security+ Certification Study Guide, Third Edition (Exam Sy0-501) [Third edition] Clarke, Glen E
1750 cover CIPM Certified Information Privacy Manager All-in-One Exam Guide [1 ed.] Peter Gregory 1
1751 cover Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions David Endler, Mark Collier
1752 cover Special OPS: Host and Network Security for Microsoft, Unix and Oracle [1st ed.] Joel Scambray, Stuart McClure 1
1753 cover CCSP Certified Cloud Security Professional. Exam Guide [3 ed.] 3
1754 cover Cryptography InfoSec Pro Guide [1 ed.] Sean-Philip Oriyano 1
1755 cover Network Security A Beginner’s Guide, Third Edition [3 ed.] Eric Maiwald 3
1756 cover Principles of Computer Security CompTIA Security+ and Beyond Lab Manual [2. Auflage.] Vincent J. Nestler, Gregory B. White, W. Arthur Conklin 2
1757 cover Firewalls complete. Marcus Goncalves
1758 cover Network security Eric Maiwald
1759 cover Principles of Computer Security - CompTIA Security+ and Beyond, 2nd Edition [2 ed.] Dr. Wm. Arthur Conklin, Dr. Gregory White, Dwayne Williams, Roger L. Davis, Chuck Cothren 2
1760 cover Botnets: The Killer Web Applications [3 ed.] David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi 3
1761 cover Cryptography InfoSec Pro Guide Sean-Philip Oriyano
1762 cover CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI) [1 ed.] Robert Larson 1
1763 cover Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Tyler Wrightson
1764 cover Hacking Exposed Web Applications [3rd edition] Liu, Vincent,Scambray, Joel,Sima, Caleb 3
1765 cover Hacking Exposed Wireless, 2nd Edition: Wireless Security Secrets and Solutions Johnny Cache, Joshua Wright, Vincent Liu
1766 cover CEH Certified Ethical Hacker All-in-One Exam Guide [1 ed.] Matt Walker 1
1767 cover CEH Certified Ethical Hacker all-in-one exam guide [2nd edition] Horton, Bradley B.,Walker, Matthew 2
1768 cover Ceh Certified Ethical Hacker All-In-One Exam Guide [Fourth edition] Walker, Matthew
1769 cover CEH Certified Ethical Hacker All-in-One Exam Guide [3rd edition] Walker, Matthew 3
1770 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition [5 ed.] Matt Walker 5
1771 cover Gray Hat Hacking - The Ethical Hacker's Handbook [2 ed.] Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness 2
1772 cover All in One CISSP Exam Guide [9 ed.] Fernando Maymí, Shon Harris 9
1773 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition [4 ed.] Walker, Matt 4
1774 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Premium Third Edition with Online Practice Labs (Allinone Exam Guides) [Hardcover ed.] Matt Walker
1775 cover Gray hat hacking : the ethical hacker’s handbook [4 ed.] Daniel Regalado et al. 4
1776 cover Hacking Exposed, 6th Edition: Network Security Secrets and Solutions Stuart McClure, Joel Scambray, George Kurtz
1777 cover Hacking Exposed. Linux [3 ed.] ISECOM 3
1778 cover CEH Certified Ethical Hacker Bundle Walker, Matt
1779 cover CEH Certified Ethical Hacker Exam Guide [3rd ed.] Matt Walker 3
1780 cover CEH Certified Ethical Hacker Bundle [5 ed.] Matt Walker 5
1781 cover Hacking exposed: bnetwork security secrets and solutions [2nd ed] Kurtz, George, McClure, Stuart, Scambray, Joel 2
1782 cover CEH Certified Ethical Hacker Practice Exams [3 ed.] Matt Walker 3
1783 cover Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition [3 ed.] Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams 3
1784 cover CEH Certified Ethical Hacker Practice Exams [1 ed.] Matt Walker 1
1785 cover Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions [First (1st) ed.] Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt 1
1786 cover Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims
1787 cover CEH Certified Ethical Hacker Practice Exams [5 ed.] Matt Walker 5
1788 cover Gray Hat Hacking The Ethical Hacker’s Handbook [5th ed.] coll. 5
1789 cover CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) Walker, Matt
1790 cover Gray Hat Hacking the Ethical Hacker’s Handbook coll.
1791 cover Computer Forensics InfoSec Pro Guide [1 ed.] David Cowen 1
1792 cover SSCP systems security certified practitioner: all-in-one exam guide [2nd edition] Gibson, Darril 2
1793 cover CEH Certified Ethical Hacker Practice Exams, Second Edition (All-in-One) Matt Walker
1794 cover CEH Certified Ethical Hacker Practice Exams, Fourth Edition [4 ed.] Matt Walker 4
1795 cover Hacking Exposed: Network Security Secrets & Solutions [3 ed.] Jean Letessier, Johann Rafelski 3
1796 cover Hacking Exposed: Network Security Secrets & Solutions [3rd ed.] Stuart McClure, Joel Scambray, George Kurtz 3
1797 cover Modern Cryptography: Applied Mathematics for Encryption and Information Security [1st ed.] Chuck Easttom 1
1798 cover Modern cryptography : applied mathematics for encryption and information security Easttom, Chuck
1799 cover CEH, Certified Ethical Hacker bundle [Third edition] Walker, Matthew
1800 cover CSSLP Certification All-in-One Exam Guide Arthur Conklin
1801 cover Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook [2 ed.] Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness 2
1802 cover Reverse Deception: Organized Cyber Threat Counter-Exploitation [1 ed.] Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones 1
1803 cover CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide [3 ed.] Wm. Arthur Conklin, Daniel Shoemaker 3
1804 cover Gray Hat Hacking: The Ethical Hacker's Handbook Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams
1805 cover CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Bobby E. Rogers
1806 cover CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002) [2 ed.] SPARKS 2
1807 cover Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-501) [Fifth edition] Dunkerley, Dawn
1808 cover Comptia Cysa+ Cybersecurity Analyst Certification Practice Exams (Exam Cs0-001) Rogers, Bobby E
1809 cover Hacking Exposed™ Web applications [1 ed.] Joel Scambray, Mike Shema 1
1810 cover Introduction to Cryptography and Network Security Behrouz A. Forouzan
1811 cover Certified Ethical Hacker Exam Guide [2 ed.] Matt Walker 2
1812 cover Reverse Deception: Organized Cyber Threat Counter-Exploitation [1st edition] Bodmer, Sean,Carpenter, Gregory,Jones, Jade,Kilger, Max 1
1813 cover Gray Hat Hacking: The Ethical Hacker's Handbook [6 ed.] Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost 6
1814 cover Information security: the complete reference [2 ed.] Mark Rhodes-Ousley 2
1815 cover Information Security The Complete Reference [2nd edition] Rhodes-Ousley, Mark 2
1816 cover Gray Hat Hacking: The Ethical Hacker's Handbook [1 ed.] Shon Harris 1
1817 cover Gray Hat Hacking: The Ethical Hacker's Handbook 2nd Edition [2 ed.] Shon Harris 2
1818 cover Gray Hat Hacking: The Ethical Hacker's Handbook Sixth Edition [6 ed.] Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost 6
1819 cover Hardening Network Infrastructure: Bulletproof Your Systems Before You Are Hacked! [1 ed.] Wes Noonan 1
1820 cover Seguridad informática para empresas y particulares Gonzalo Alvarez Marañón, Pedro Pablo Pérez Garía, Pedro Bustamante
1821 cover HackNotes(tm) Network Security Portable Reference [1 ed.] Michael Horton, Clinton Mugge 1
1822 cover Intrusion Detection and Prevention [1 ed.] Carl Endorf, Gene Schultz, Jim Mellander 1
1823 cover Gray Hat Hacking: The Ethical Hacker’s Handbook [2 ed.] Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness 2
1824 cover Extreme Exploits: Advanced Defenses Against Hardcore Hacks Victor Oppleman, Oliver Friedrichs, Brett Watson
1825 cover Gray Hat Hacking: The Ethical Hacker’s Handbook [6 ed.] Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost 6
1826 cover Hacker's Challenge 3 [3rd ed] Bradley, Tony,Dwivedi, Himanshu,Pennington, Bill,Pollino, David 3
1827 cover CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition [2 ed.] Peter Gregory 2
1828 cover Cism Certified Information Security Manager Practice Exams, Second Edition Peter H. Gregory
1829 cover CISM Certified Information Security Manager. Exam Guide [2 ed.] Peter H. Gregory 2
1830 cover Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios [Edition Unstated] Mike Schiffman
1831 cover CISSP All in One Exam Guide [4 ed.] 4
1832 cover Hacker's challenge: test your incident response skills using 20 scenarios Schiffman, Mike
1833 cover 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them [1 ed.] Michael Howard, David LeBlanc, John Viega 1
1834 cover Hacker’s challenge: test your incident response skills using 20 scenarios [First edition.] Mike Schiffman
1835 cover Incident Response & Computer Forensics [3 edition] Jason Luttgens, Matthew Pepe, Kevin Mandia 3
1836 cover CISSP All in one Exam Guide [8 ed.] Shon Harris, Fernando Maymí 8
1837 cover GCIH GIAC Certified Incident Handler All-in-One Exam Guide [1 ed.] Nick Mitropoulos 1
1838 cover Casp+ Comptia Advanced Security Practitioner Certification All-in-one Exam Guide, Exam Cas-003 Lane, Nicholas, Conklin, Arthur, White, Gregory B., Williams, Dwayne
1839 cover Incident Response and Computer Forensics [2 ed.] Chris Prosise, Kevin Mandia, Matt Pepe 2
1840 cover The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration [1st ed.] Guy Hart-Davis 1
1841 cover CISSP All-in-One Exam Guide [7th edition] Harris, Shon,Maymi, Fernando 7
1842 cover CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide Brooks, Charles L
1843 cover Security Sage's Guide to Hardening the Network Infrastructure [4 ed.] Stuart McClure 4
1844 cover CISSP All-in-One Exam Guide [Eighth edition] Maymi, Fernando,Harris, Shon
1845 cover Hacking Exposed [5 ed.] Stuart McClure, Joel Scambray, George Kurtz 5
1846 cover Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition [Paperback ed.] Lee Reiber
1847 cover Hacking Exposed - Linux: Linux Security Secrets
1848 cover CISSP All-in-One Exam Guide, [9 ed.] Fernando Maymi, Shon Harris 9
1849 cover Hacking Exposed [2nd ed] Cowen, David,Davis, Chris,Philipp, Aaron 2
1850 cover CISSP All-in-One Exam Guide, Fifth Edition [5 ed.] Shon Harris 5
1851 cover People-centric security : transforming your enterprise security culture [1 ed.] Hayden, Lance 1
1852 cover Hacking exposed 6 : network security secrets & solutions Stuart McClure, Joel Scambray, George Kurtz
1853 cover Hacking exposed 6: network security secrets & solutions [10th anniversary ed] McClure, Stuart,Scambray, Joel,Kurtz, George 10
1854 cover CC Certified in Cybersecurity All-in-One Exam Guide [1 ed.] Jordan Genung, Steven Bennett 1
1855 cover CISSP Certification All-in-One Exam Guide [4 ed.] Shon Harris 4
1856 cover Mobile application security Himanshu Dwivedi, Chris Clark, David V Thiel
1857 cover CompTIA PenTest+ Certification All-in-One Exam Guide [2 ed.] Heather Linn, Raymond Nutting 2
1858 cover Hacking Exposed 7. Network Security Secrets and Solutions [7th Edition] Stuart McClure and Joel Scambray 7
1859 cover CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-002) Heather Linn
1860 cover CompTIA PenTest+ certification all-in-one exam guide (exam PT0-001) Nutting, Raymond
1861 cover Hacking Exposed 7: Network Security Secrets & Solutions [7 ed.] Stuart McClure, Joel Scambray, George Kurtz 7
1862 cover Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002) Heather Linn, Raymond Nutting
1863 cover CompTIA PenTest+ certification practice exams (exam PT0-001) Ammerman, Jonathan
1864 cover Hacking exposed Cisco networks: Cisco security secrets & solutions Vladimirov, Andrew A
1865 cover CISSP Passport Bobby E. Rogers
1866 cover Hacking exposed computer forensics : secrets & solutions [2nd ed] Aaron Philipp, David Cowen, Chris Davis, CISSP 2
1867 cover CISSP Practice Exams [5 ed.] Shon Harris, Jonathan Ham 5
1868 cover CCISO Certified Chief Information Security Officer All-in-One Exam Guide Steve Bennett, Jordan Genung
1869 cover Mike Meyers CompTIA Security+ Certification Passport (Exam SY0-601) Dawn Dunkerley
1870 cover Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity Leeza Garber, Scott Olson
1871 cover Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems [1 ed.] G. B. Baecher 1
1872 cover Cognitive hack : the new battleground in cybersecurity... the human mind [1 ed.] Bone, James 1
1873 cover Cyber Deception: Techniques, Strategies, and Human Aspects Tiffany Bao, Milind Tambe, Cliff Wang
1874 cover Cyber Security Social Engineering - Hacking Human Firewalls Nishad, Bharat Bhuval
1875 cover Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications [1st ed.] Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger 1
1876 cover Cognitive Hack. The New Battleground in Cybersecurity ... the Human Mind James Bone
1877 cover Cyber Deception: Techniques, Strategies, and Human Aspects Tiffany Bao, MilindTambe, Cliff Wang
1878 cover Die Kunst des Human Hacking: Social Engineering in der Praxis Christopher Hadnagy
1879 cover Cyber justice : human rights and good governance for the internet Mihr, Anja
1880 cover Cybersecurity Systems for Human Cognition Augmentation [1 ed.] Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.) 1
1881 cover Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factor [2 ed.] Andreas Von Grebmer 2
1882 cover From Encryption to Quantum Computing: The Governance of Information Security and Human Rights Ot van Daalen
1883 cover Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings [1st ed.] Nathan Clarke, Steven Furnell 1
1884 cover Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, ... and Communication Technology, 613) [1st ed. 2021] Steven Furnell (editor), Nathan Clarke (editor) 1
1885 cover Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings Tryfonas, Theo
1886 cover Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings [1 ed.] Theo Tryfonas, Ioannis Askoxylakis (eds.) 1
1887 cover Hacking the human: social engineering techniques and security countermeasures Ian Mann
1888 cover Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, ... and Communication Technology, 613) Steven Furnell (editor), Nathan Clarke (editor)
1889 cover Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, ... and Communication Technology, 658) Nathan Clarke (editor), Steven Furnell (editor)
1890 cover Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings [1 ed.] Theo Tryfonas (eds.) 1
1891 cover Human Aspects of Information Security, Privacy, and Trust: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings [1 ed.] Sourav Bhuyan, Joel S. Greenstein, Kevin A. Juang (auth.), Louis Marinos, Ioannis Askoxylakis (eds.) 1
1892 cover Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings [1 ed.] Theo Tryfonas, Ioannis Askoxylakis (eds.) 1
1893 cover Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022 Mytilene, Lesbos, Greece, July 6–8, 2022 Proceedings Nathan Clarke, Steven Furnell
1894 cover Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings ... and Communication Technology, 674) [1st ed. 2023] Steven Furnell (editor), Nathan Clarke (editor) 1
1895 cover Human Hacking Christopher Hadnagy
1896 cover Human Dimensions of Cybersecurity [1 ed.] Terry Bossomaier, Steven D'Alessandro, Roger Bradbury 1
1897 cover Human Dimensions of Cybersecurity Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
1898 cover Human Factors Analysis of 23 Cyberattacks Moallem, Abbas
1899 cover Human Hacked: My Life and Lessons as the World’s First Augmented Ethical Hacker [1 ed.] Len Noe 1
1900 cover Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security) B. Ganor, K. Von Knop, C. Duarte
1901 cover Human-Centered Security Heidi Trost
1902 cover Humans and Cyber Security: How Organisations Can Enhance Resilience Through Human Factors Widdowson, Amanda
1903 cover Human-computer interaction and cybersecurity handbook Moallem, Abbas
1904 cover Internet Freedom Software and Illicit Activity : Supporting Human Rights Without Enabling Criminals [1 ed.] Sasha Romanosky, Martin C. Libicki, Zev Winkelman, Olesya Tkacheva 1
1905 cover Invisible Threats: Financial and Information Technology Crimes and National Security, Volume 10 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science) U. Gori, I. Paparela
1906 cover Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert Ozkaya, Erdal
1907 cover Learn Social Engineering Learn the art of human hacking with an internationally renowned expert Erdal Ozkaya
1908 cover Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for Peace and Security Series - E: Human and Societal Dynamics U. Gori
1909 cover Managing the Human Factor in Information Security: How to win over staff and influence business managers [1 ed.] David Lacey 1
1910 cover Psybersecurity Human Factors of Cyber Defence Oliver Guidetti, Mohiuddin Ahmed, Craig Speelman
1911 cover Research agenda. The human factor in cybercrime and cybersecurity. Eric Rutger Leukfeldt
1912 cover Resistance, liberation technology and human rights in the digital age [1 ed.] Giovanni Ziccardi (auth.) 1
1913 cover Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility Emily B. Laidlaw
1914 cover Social engineering: the art of human hacking Christopher Hadnagy
1915 cover Security The Human Factor Paul Kearney
1916 cover Social Engineering: The Art of Human Hacking Christopher Hadnagy,Paul Wilson
1917 cover Social Engineering: The Art of Human Hacking [1 ed.] Christopher Hadnagy 1
1918 cover Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception [1 ed.] Vince Reynolds 1
1919 cover Social Engineering: The Art of Human Hacking Hadnagy, Christopher(Foreword),Wilson, Paul(Foreword)
1920 cover Social Engineering: The Science of Human Hacking Hadnagy, Christopher
1921 cover Social Engineering : The Science of Human Hacking Christopher Hadnagy
1922 cover Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception Vince Reynolds
1923 cover Social Engineering: The Science of Human Hacking [2 ed.] Christopher Hadnagy 2
1924 cover Social Engineering: The Science of Human Hacking [2 edition] Christopher Hadnagy 2
1925 cover Stopping Human Hacks Ira Winkler, Tracy Celaya
1926 cover Techniques and applications for advanced information privacy and security: emerging organizational, ethical, and human issues Hamid R. Nemati, Hamid R. Nemati
1927 cover Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy) [1 ed.] Hamid R. Nemati 1
1928 cover Surveillance Law, Data Retention and Human Rights: A Risk to Democracy Matthew White
1929 cover The Android Malware Handbook: Detection and Analysis by Human and Machine Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, Yanhai Xiong
1930 cover The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity Cesar Bravo, Desilda Toska
1931 cover The art of deception: controlling the human element of security Simon, William L.,Mitnick, Kevin D
1932 cover The Human Firewall: Wie eine Kultur der Cyber-Sicherheit geschaffen wird Florian Jörgens
1933 cover The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer [1 ed.] Perry Carpenter, Kai Roer 1
1934 cover Trust in Cyber-societies: Integrating the Human and Artificial Perspectives (Lecture Notes in Computer Science, 2246) Rino Falcone (editor), Munindar Singh (editor), Yao-Hua Tan (editor)
1935 cover Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools [1 ed.] Abbas Moallem 1
1936 cover Unmasking the social engineer: the human element of security Ekman, Paul,Hadnagy, Christopher
1937 cover Unmasking the Social Engineer: The Human Element of Security [1 ed.] Christopher Hadnagy, Paul Kelly F., Paul Ekman 1
1938 cover The art of intrusion: the real stories behind the exploits of hackers, intruders & deceivers Simon, William L., Mitnick, Kevin David
1939 cover The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers [1 ed.] Kevin D. Mitnick, William L. Simon 1
1940 cover The Stories of My Hackers and I Beatrice, Mrs, Walsh, Lin
1941 cover Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe Nirmal John
1942 cover Information Security Analyst Wil Mara
1943 cover Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers [1 ed.] Ping Li, Bing Sun, Chao Li (auth.), Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing (eds.) 1
1944 cover Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door Brian Krebs
1945 cover Exam Ref SC-100 Microsoft Cybersecurity Architect [1 ed.] Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez 1
1946 cover Look Both Ways: Help Protect Your Family on the Internet [1 ed.] Linda Criddle 1
1947 cover Exam Ref MS-101 Microsoft 365 Mobility and Security Brian Svidergol, Bob Clements
1948 cover A Cryptography Primer: Secrets and Promises [draft ed.] Klein P.N.
1949 cover Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! Occupytheweb
1950 cover Hunting Security Bugs [1 ed.] Tom Gallagher, Lawrence Landauer, Bryan Jeffries 1
1951 cover Analysis and design of networked control systems under attacks Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan
1952 cover Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion Jim Harrison, Yuri Diogenes, Mohit Saxena, Tom Shinder
1953 cover Project Zero Trust: A Story about a Strategy for Aligning Security and the Business [1 ed.] George Finney 1
1954 cover Deploying Secure 802 11 Wireless Networks with Microsoft Windows
1955 cover Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant Bud Ratliff, Jason Ballard
1956 cover Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers [1 ed.] Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo (auth.), Heung Youl Youm, Moti Yung (eds.) 1
1957 cover Microsoft Azure Sentinel Yuri Diogenes, Nicholas Dicola, Jonathan Trull
1958 cover Maintaining Network Separations with Trusted Solaris 8 Software Sun Microsystems, Inc.
1959 cover Hacked: the inside story of America's struggle to secure cyberspace Charlie Mitchell
1960 cover Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544) Tesch, Dale., Greg Abelar
1961 cover Microsoft Azure Sentinel: Planning and implementing Microsoft s cloud-native SIEM solution Jonathan Trull, Nicholas DiCola, Yuri Diogenes
1962 cover She’s In CTRL: How women can take back tech – to communicate, investigate, problem-solve, broker deals and protect themselves in a digital world Anne Imafidon
1963 cover Surviving a Ransomware Attack with Azure Site Recovery Dave Kawula, Emile Cabot, Cary Sun, Cristal Kawula, John O'Neill Sr.
1964 cover Exam Ref AZ-500 Microsoft Azure Security Technologies Yuri Diogenes , Orin Thomas
1965 cover Computer Security in the 21st Century [1 ed.] D.T. Lee, S. P. Shieh, J. Doug Tygar 1
1966 cover Security monitoring with Cisco security MARS Includes index Halleen, Gary, Kellogg, Greg
1967 cover Cutthroat: high stakes & killer moves on the electronic frontier Stephen Keating
1968 cover Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science, 1683) Luis Bathen (editor), Gokay Saldamli (editor), Xiaoyan Sun (editor), Thomas H. Austin (editor), Alex J. Nelson (editor)
1969 cover The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting (Business Skills) [1 ed.] Mark Morowczynski, Rod Trent, Matthew Zorich 1
1970 cover MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server 2003 Network Roberta Bragg
1971 cover Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science) [1st ed. 2021] Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) 1
1972 cover Secure and Trustworthy Transportation Cyber-Physical Systems [1 ed.] Yunchuan Sun,Houbing Song (eds.) 1
1973 cover Hacked: The Inside Story of America’s Struggle to Secure Cyberspace Charlie Mitchell
1974 cover MCSA/MCSE Self-paced Training Kit (exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 [1 ed.] Stan Reimer, Orin Thomas 1
1975 cover Cyber Security Defense with Microsoft Defender Kawula, Dave, O'Neill Sr, John, Kawula, Cristal, Cabot, Emile, Sun, Cary
1976 cover Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia Sarah Katz
1977 cover Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion (Pro -Administrator's Campanion) [1 ed.] Jim Harrison, Yuri Diogenes, Mohit Saxena 1
1978 cover Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century [1 ed.] Demetrius Klitou (auth.) 1
1979 cover Web and Information Security Ferrari E.
1980 cover CISSP Training Kit David R. Miller
1981 cover Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Security and Cryptology) Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor)
1982 cover Information Security and Ethics: Social and Organizational Issues Marian Quigley
1983 cover Internet Policy in China : A Field Study of Internet Cafés Helen Sun
1984 cover Reinventing Cybersecurity [1 ed.] Jasmine Henry, Alison Gianotto, Coleen Shane, Tracy Bannon, Dr. Meg Layton, Breanne Boland, Angela Marafino, Latha Maripuri, Carlota Sage, Carla Sun 1
1985 cover Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski
1986 cover Exam Ref AZ-500 Microsoft Azure Security Technologies Yuri Diogenes, Orin Thomas
1987 cover Breaking and Entering: The Extraordinary Story of a Hacker Called 'Alien' Jeremy Smith, Sue Buswell (editor)
1988 cover The news machine : hacking : the untold story Hanning, James, Mulcaire, Glenn
1989 cover Enumerating Esoteric Attack Surfaces: Recon for Bug Bounty Hunters, Penetration Testers and OSINT Aggressors Jann Moon
1990 cover International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors U. S. Department Of Defense, Strategic Studies Institute, United States Army War College, Department Of Homeland Security, Federal Bureau Of Investigation
1991 cover Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals [2 ed.] Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski 2
1992 cover Out of the Inner Circle. A Hacker's Guide to Computer Security Bill Landreth, Howard Rheingold
1993 cover Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III [1st ed.] Xingming Sun, Zhaoqing Pan, Elisa Bertino 1
1994 cover What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century Shimon Brathwaite
1995 cover What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century [1 ed.] Shimon Brathwaite 1
1996 cover MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004: Implementing Microsoft(r) Internet ... Acceleration Server 2004 (Pro-Certification [1 ed.] Stan Reimer, Orin Thomas 1
1997 cover CISSP Rapid Review Darril Gibson
1998 cover Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II [1 ed.] Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino (eds.) 1
1999 cover Deploying Microsoft Forefront Threat Management Gateway 2010 (TMG) [1 ed.] Yuri Diogenes, Thomas W. Shinder Dr 1
2000 cover Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks [1st ed.] Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun 1
2001 cover How to do Privacy in the 21st Century: The True Story of Hacktivism [1 ed.] Peter Burnett, Valeria Vescina 1
2002 cover MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft® Internet Security and Acceleration Server 2004 Reimer Stan
2003 cover Microsoft Azure Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution (IT Best Practices - Microsoft Press) [2 ed.] Yuri Diogenes, Nicholas DiCola, Tiander Turpijn 2
2004 cover Hacking Cyberspace David J. Gunkel
2005 cover Project Zero Trust : A Story about a Strategy for Aligning Security and the Business Finney, George,Kindervag, John,
2006 cover Microsoft Internet Security and Acceleration (ISA) Server 2000: Administrator's Pocket Consultant [illustrated edition] Jason Ballard, Bud Ratliff
2007 cover The Darkest Web Drugs, death and destroyed lives ... the inside story of the internet’s evil twin Eileen Ormsby
2008 cover The Hacker Crackdown: Law and Disorder on the Electronic Frontier Michael Bruce Sterling
2009 cover Analysis and design of networked control systems under attacks [First edition] Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan
2010 cover Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings [1 ed.] Ruilin Li, Bing Sun, Chao Li, Longjiang Qu (auth.), Ron Steinfeld, Philip Hawkes (eds.) 1
2011 cover A British Hacker in America: The story of PMF & 'Operation Cybersnare' - The U.S. Secret Service's first online sting Pmf
2012 cover Improving Web Application Security: Threats and Countermeasures [1 ed.] Microsoft Corporation 1
2013 cover Breaking and entering: the extraordinary story of a hacker called Smith, Jeremy N
2014 cover Exam Ref AZ-700 Designing and Implementing Microsoft Azure Networking Solutions [1 ed.] Charles Pluta 1
2015 cover Assessing Network Security Kevin Lam, David LeBlanc, Ben Smith
2016 cover Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II [1st ed.] Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena 1
2017 cover Internet Wars: The Struggle for Power in the 21st Century [1st ed.] Fergus Hanson 1
2018 cover Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World Stefanick, Lorna
2019 cover The Internet in Everything: Freedom and Security in a World with No Off Switch Laura Denardis
2020 cover Economics of Information Security and Privacy III [1 ed.] Sam Ransbotham, Sabyasachi Mitra (auth.), Bruce Schneier (eds.) 1
2021 cover Economics of Information Security (Advances in Information Security) [1 ed.] L. Jean Camp, Stephen Lewis 1
2022 cover Securing Freedom in the Global Commons (Stanford Security Studies) Scott Jasper
2023 cover Cyber Terrorism: Political And Economic Implications Andrew M. Colarik
2024 cover Cybersecurity Investments: Decision Support Under Economic Aspects [1 ed.] Stefan Beissel (auth.) 1
2025 cover Coding freedom: the ethics and aesthetics of hacking Enid Gabriella Coleman
2026 cover Protecting America's Freedom in the Information Age (A Report of the Markle Foundation Task Force) Zoe Baird, James Barksdale
2027 cover Dark Web and Deep Web: Place of anonymity and freedom of expression Smin Oienen
2028 cover The Economics of Information Security and Privacy [1 ed.] Matthias Brecht, Thomas Nowey (auth.), Rainer Böhme (eds.) 1
2029 cover Cyber War and Cyber Peace: Digital Conflict in the Middle East Mike Sexton, Eliza Campbell (editors)
2030 cover Digital Whoness: Identity, Privacy And Freedom In The Cyberworld [1st Edition] Rafael Capurro, Michael Eldred, Daniel Nagel 1
2031 cover OECD guidelines for the security of information systems and networks : towards a culture of security = Lignes directrices de l’OCDE régissant la sécurité des systèmes et réseaux d’information : vers un culture de la sécurité. OECD
2032 cover The real cyber war : the political economy of Internet freedom [1st Edition] Jablonski, Michael, Powers, Shawn M 1
2033 cover The Economics of Computer Hacking Peter T., Christopher J.
2034 cover Digital whoness : identity, privacy and freedom in the cyberworld Capurro, Rafael, Eldred, Michael, Nagel, Daniel
2035 cover Hacking University: Mobile Phone & App Hacking & Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps & Precisely ... (Hacking Freedom and Data Driven Book 5) Isaac D. Cody
2036 cover This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information Andy Greenberg
2037 cover Information Security Across Federal Agencies: Analysis Of Adequacy And Effectiveness Shane Palmer
2038 cover Developing a Cybersecurity Immune System for Industry 4.0 Sergei Petrenko (author)
2039 cover Managing Information Risk and the Economics of Security (Medizinische Informatik Und Satistik) [1 ed.] M. Eric Johnson 1
2040 cover Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 [1 ed.] Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) 1
2041 cover Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and ... and Technologies for Security Applications) Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor)
2042 cover This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world’s information Andy Greenberg
2043 cover Developing a Cybersecurity Immune System for Industry 4.0 Sergei Petrenko,
2044 cover Data Security and Privacy in Massachusetts [2 ed.] Stephen Y. Chow (editor) 2
2045 cover The Privacy Handbook: Proven Countermeasures for Combating Threats to Privacy, Security, and Personal Freedom Michael E. Chesbro
2046 cover Economics of Identity Theft: Avoidance, Causes and Possible Cures [1 ed.] L. Jean Camp 1
2047 cover Encryption Works : How to Protect Your Privacy in the Age of NSA Surveillance Micah Lee
2048 cover Take control of your online privacy Joe Kissell
2049 cover Implementing NAP and NAC security technologies : the complete guide to network access control Daniel Hoffman
2050 cover Mastering Kali Linux for Advanced Penetration Testing [all] Robert W. Beggs
2051 cover Official (Isc)2 Guide to the Issmp Cbk
2052 cover Risk management solutions for Sarbanes-Oxley section 404 IT compliance John S Quarterman
2053 cover Network Intrusion Detection [3rd ed] Stephen Northcutt, Judy Novak 3
2054 cover OECD Guidelines for the Security of Information Systems and Networks : Towards a Culture of Security OECD
2055 cover Nmap Cookbook: The Fat-free Guide to Network Scanning Nicholas Marsh
2056 cover Web Penetration Testing with Kali Linux Joseph Muniz, Aamir Lakhani
2057 cover Network Security Bible [1 ed.] Eric Cole, Ronald L. Krutz, James Conley 1
2058 cover Phishing : cutting the identity theft line Rachael Lininger, Russell Dean Vines
2059 cover Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility Russell Smith
2060 cover CEH : official certified ethical hacker review guide Kimberly Graves
2061 cover Digital Crime and Forensic Science in Cyberspace [illustrated edition] et al, Panagiotis Kanellis
2062 cover Firewalls For Dummies [2nd ed] Brian Komar, Ronald Beekelaar, Joern Wettern 2
2063 cover Integrating security and software engineering: advances and future visions [illustrated edition] Haralambos Mouratidis, Haralambos Mouratidis, Paolo Giorgini
2064 cover PCI DSS : a Pocket Guide Alan Calder, Nicki Carter