Number |
Cover |
TextBook for Cyber Security |
Author |
Edition |
0 |
|
Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night |
McHale, David |
|
1 |
|
CC Certified in Cybersecurity Study Guide (Sybex Study Guide) |
Mike Chapple |
|
2 |
|
CCNP and CCIE Security Core SCOR 350-701 Exam cram [1 ed.] |
Eugenio Iavarone |
1 |
3 |
|
The Rules for Online Dating: Capturing the Heart of Mr. Right in Cyberspace |
Ellen Fein, Sherrie Schneider |
|
4 |
|
Advanced Certificate in Information Security (ACISE) Part-I |
IGNOU |
|
5 |
|
Advanced Certificate in Information Security (ACISE) Part-II |
IGNOU |
|
6 |
|
Transactions on data hiding and multimedia security VI |
Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.) |
|
7 |
|
Cyber Dragon: Inside China's Information Warfare and Cyber Operations |
Dean Cheng |
|
8 |
|
Cyberbullies, Cyberactivists, Cyberpredators: Film, TV, and Internet Stereotypes |
Lauren Rosewarne |
|
9 |
|
The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals |
Paul Bocij |
|
10 |
|
Understanding Online Piracy: The Truth about Illegal File Sharing |
Nathan Fisk |
|
11 |
|
Securing India in the Cyber Era |
Sameer Patil |
|
12 |
|
Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science) |
Pantelimon Stănică (editor), Sihem Mesnager (editor), Sumit Kumar Debnath (editor) |
|
13 |
|
Cyberspace and Instability |
Robert Chesney (editor), James Shires (editor), Max Smeets (editor) |
|
14 |
|
Cybersexualities: A Reader on Feminist Theory, Cyborgs and Cyberspace |
Jenny Wolmark |
|
15 |
|
Handbook on Securing Cyber-Physical Critical Infrastructure |
Sajal K. Das, Krishna Kant and Nan Zhang (Auth.) |
|
16 |
|
Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) |
Jeffrey Pawlick, Quanyan Zhu |
|
17 |
|
Cyber Security Threats and Challenges Facing Human Life [1 ed.] |
Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) |
1 |
18 |
|
Cybersecurity: A Practical Engineering Approach |
Henrique M. D. Santos |
|
19 |
|
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) |
Brent Chapman |
|
20 |
|
Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) |
Maymi, Fernando,Chapman, Brent,Parker, Jeff T |
|
21 |
|
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide |
Fernando Maymi, Brent Chapman |
|
22 |
|
Career Opportunities in Computers and Cyberspace, 2nd Edition [2 ed.] |
Harry Henderson |
2 |
23 |
|
Cyber Infrastructure for the Smart Electric Grid |
Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser |
|
24 |
|
Cyber-physical Systems: Theory, Methodology, and Applications (IEEE Press) [1 ed.] |
Pedro H. J. Nardelli |
1 |
25 |
|
Cybersecurity in Intelligent Networking Systems (IEEE Press) [1 ed.] |
Shengjie Xu, Yi Qian, Rose Qingyang Hu |
1 |
26 |
|
Game Theory and Machine Learning for Cyber Security [1 ed.] |
Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) |
1 |
27 |
|
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program [1 ed.] |
John Jackson |
1 |
28 |
|
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity |
Dan Shoemaker, Anne Kohnke, Ken Sigler |
|
29 |
|
Blockchain for Distributed Systems Security |
Sachin S. Shetty (editor), Charles A. Kamhoua (editor), Laurent L. Njilla (editor) |
|
30 |
|
Information security : an integrated collection of essays [[2. Dr.] ed.] |
Marshall D. Abrams (editor),Sushil Jajodia (editor), Harold J. Podell (editor) |
2 |
31 |
|
Cyber Warfare |
Rosenzweig, Paul |
|
32 |
|
Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 |
Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor) |
|
33 |
|
Using Science in Cybersecurity |
Leigh Metcalf, Jonathan Spring |
|
34 |
|
Security in Ad-hoc and Sensor Networks (Computer and Network Security) |
Raheem Beyah, Janise Mcnair, Cherita Corbett |
|
35 |
|
Comptia Security+ Guide to Network Security Fundamentals [7 ed.] |
Mark Ciampa |
7 |
36 |
|
CompTIA Network+ Guide to Networks 9th edition [9 ed.] |
Jill West |
9 |
37 |
|
Wireless Safety [1 ed.] |
EC-Council |
1 |
38 |
|
Secure Network Infrastructures |
EC-Council |
1 |
39 |
|
Computer Insecurity: Risking the System [1 ed.] |
Steven Furnell BSc (Hons) Phd, CEng FBCS (auth.) |
1 |
40 |
|
Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks |
Josephine Wolff |
|
41 |
|
Cybersecurity [1 ed.] |
Duane C. Wilson |
1 |
42 |
|
Foundations of Computer Security [1 ed.] |
Professor David Salomon (auth.) |
1 |
43 |
|
Guide to Computer Network Security [3 ed.] |
Joseph Migga Kizza (auth.) |
3 |
44 |
|
Hacking Europe: From Computer Cultures to Demoscenes [1 ed.] |
Gerard Alberts, Ruth Oldenziel (eds.) |
1 |
45 |
|
Internet and Intranet Security [2 ed.] |
Rolf Oppliger, Rolf Oppliger |
2 |
46 |
|
Medical Device Cybersecurity for Engineers and Manufacturers |
Axel Wirth, Christopher Gates, Jason Smith |
|
47 |
|
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) |
Michael Roytman and Ed Bellis |
|
48 |
|
New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) |
Howard Shrobe, David L. Shrier, Alex Pentland |
|
49 |
|
Security Technologies for the World Wide Web [2 ed.] |
Rolf Oppliger |
2 |
50 |
|
Understanding Voice over IP Security (Artech House Telecommunications Library) [1 ed.] |
Alan B. Johnston, David M. Piscitello |
1 |
51 |
|
Google Hacking for Penetration Testers, Volume 1 |
Long J. |
|
52 |
|
How to Hack Computers: how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning |
|
|
53 |
|
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali |
OccupyTheWeb |
|
54 |
|
Carry On: Sound Advice from Schneier on Security |
Schneier, Bruce |
|
55 |
|
CEH Certified Ethical Hacker Study Guide |
Graves, Kimberly |
|
56 |
|
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions |
Ric Messier |
|
57 |
|
CEHv8: Certified Ethical Hacker Version 8 Study Guide |
Oriyano, Sean-Philip |
|
58 |
|
Cehv9: Certified Ethical Hacker Version 9 [3rd ed] |
Oriyano, Sean-Philip |
3 |
59 |
|
Communications and Information Infrastructure Security |
John G. Voeller |
1 |
60 |
|
Cyber Investigations : A Research Based Textbook for Advanced Studies |
Årnes, André, |
|
61 |
|
Cyber Security Policy Guidebook |
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt |
|
62 |
|
Cybercrime Investigators Handbook |
Graeme Edwards |
|
63 |
|
Cybersecurity Law [2nd ed.] |
Jeff Kosseff |
2 |
64 |
|
Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States |
Matthew Webster |
|
65 |
|
Hacking For Dummies [5th ed.] |
Kevin Beaver |
5 |
66 |
|
Hacking for Dummies, 7th Edition |
KEVIN BEAVER |
7 |
67 |
|
Hacking IPod and ITunes |
Scott Knaster |
|
68 |
|
Hacking sales : the ultimate playbook and tool guide to building a high-velocity sales machine |
Altschuler, Max |
|
69 |
|
iOS Hacker's Handbook |
Charlie Miller &, Dion Blazakis &, Dino DaiZovi &, Stefan Esser &, Vincenzo Iozzo &, Ralf-Philip Weinmann |
|
70 |
|
Secrets and Lies: Digital Security in a Networked World [15th Anniversary Edition] |
Schneier, Bruce |
15 |
71 |
|
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition [3 ed.] |
David R. Miller, Michael Gregg |
3 |
72 |
|
Security and privacy in the digital era Volume 1 |
Guerrier, Claudine |
|
73 |
|
Security, privacy and digital forensics in the cloud |
Chen, Lei, Le-Khac, Nhien-An, Takabi, Hassan |
|
74 |
|
Seismic data interpretation using digital image processing |
Al-Dossary, Saleh A.,Al-Shuhail, Abdullatif A.,Mousa, Wail Abdul-Hakim |
|
75 |
|
Story Circle: Digital Storytelling Around the World [1 ed.] |
John Hartley, Kelly McWilliam |
1 |
76 |
|
XDA's Android Hacker's Toolkit: the Complete Guide to Rooting, ROMs and Theming [2nd ed] |
Tyler, Jason, Verduzco, Will |
2 |
77 |
|
Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany [1 ed.] |
Karl Scheibelhofer (auth.), Ralf Steinmetz, Jana Dittman, Martin Steinebach (eds.) |
1 |
78 |
|
Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15–18, 2004, Windermere, The Lake District, United Kingdom [1 ed.] |
Jan Iwanik, Marek Klonowski, Miroslaw Kutyłowski (auth.), David Chadwick, Bart Preneel (eds.) |
1 |
79 |
|
Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany |
Reinhard Posch (eds.) |
|
80 |
|
Communications and Multimedia Security: Volume 3 |
Sokratis Katsikas (eds.) |
|
81 |
|
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity |
Reza Montasari |
|
82 |
|
Cyber Situational Awareness: Issues and Research [1 ed.] |
Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) |
1 |
83 |
|
Practical Internet Security [1 ed.] |
John R. Vacca (auth.) |
1 |
84 |
|
Wireless Network Security [1 ed.] |
Jonathan Lutz, M. Anwarul Hasan (auth.), Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du (eds.) |
1 |
85 |
|
Cyberliteracy: Navigating the Internet with Awareness |
Laura J. Gurak |
|
86 |
|
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us [1 ed.] |
Eugene Spafford, Leigh Metcalf, Josiah Dykstra |
1 |
87 |
|
Security in Computing, 6th Edition (Rough Cuts) [6 ed.] |
Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp |
6 |
88 |
|
Security in Computing [6 ed.] |
Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp |
6 |
89 |
|
Computer Security [Art and Science] [2nd ed.] |
Matthew Bishop |
2 |
90 |
|
Effective Cybersecurity: A Guide to Using Best Practices and Standards [1 ed.] |
William Stallings |
1 |
91 |
|
Cyber-Physical Systems: A Model-Based Approach |
Raj Rajkumar, Dionisio de Niz, Mark Klein |
|
92 |
|
Hacker's Delight (2nd Edition) [2 ed.] |
Henry S. Warren |
2 |
93 |
|
Software Security Engineering: A Guide for Project Managers: A Guide for Project Managers (SEI Series in Software Engineering) |
Julia H. Allen |
|
94 |
|
Chained Exploits: Advanced Hacking Attacks from Start to Finish |
Whitaker, Andrew J,Evans, Keatron,Voth, Jack |
|
95 |
|
Virtual Honeypots: From Botnet Tracking to Intrusion Detection [1 ed.] |
Niels Provos, Thorsten Holz |
1 |
96 |
|
Protect Your Windows Network From Perimeter to Data |
Jesper M. Johansson, Steve Riley |
|
97 |
|
The art of computer virus research and defense |
Szor, Peter |
|
98 |
|
Introduction to computer security |
Matt Bishop |
|
99 |
|
Firewalls and Internet Security: Repelling the Wily Hacker [2 ed.] |
William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin |
2 |
100 |
|
Web Hacking: Attacks and Defense |
McClure, Stuart, Shah, Shreeraj, Shah, Saumil |
3 |
101 |
|
Computer Security: Art and Science |
Matt Bishop |
|
102 |
|
Inside Internet Security: What Hackers Don't Want You To Know [1 ed.] |
Jeff Crume |
1 |
103 |
|
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity |
Grid, Alan |
|
104 |
|
Network Security, Firewalls, and VPNs |
J. Michael Stewart &, Denise Kinsey |
|
105 |
|
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies |
Corey Schou and Steven Hernandez |
|
106 |
|
Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and |
Cody, Isaac D |
|
107 |
|
Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to Hack Websites, Smartphones, Wireless Networks) + Linux Basic for Hackers (Command line and all the essentials) + Hacking with Kali Linux |
Julian James McKinnon |
|
108 |
|
The Pocket Guide to Cyber Security |
James H &, Usha D |
|
109 |
|
Guide to Computer Network Security |
Kizza, Joseph Migga |
|
110 |
|
Guide to Computer Network Security, Fourth Edition |
Joseph Migga Kizza |
4 |
111 |
|
Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking With Kali Linux |
Kou, Jim |
|
112 |
|
HACKING GMAIL: How to Hack Gmail |
HAT, BLACK |
|
113 |
|
Hacking: How to Make Your Own Keylogger in C++ Programming Language |
Norman, Alan T. |
|
114 |
|
Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow |
Karnel, Erickson |
|
115 |
|
Hacking: Fundamentals for Absolute Beginners |
Bell, Alexander |
|
116 |
|
Infinity Ethical Hacking: Learn basic to advance hacks |
Sapp, Arthur S |
|
117 |
|
Cyber Security Awareness for CEOs and Management [1 ed.] |
Dalziel, Henry, Willson, David |
1 |
118 |
|
Cyber Security Awareness for Corporate Directors and Board Members |
Willson, David, Dalziel, Henry |
|
119 |
|
Cyber warfare : techniques, tactics and tools for security practitioners |
Jason Andress, Steve Winterfeld, Russ Rogers |
|
120 |
|
Cyber warfare: techniques, tactics and tools for security practitioners |
Andress, Jason,Winterfeld, Steve,Northcutt, Stephen,Rogers, Russ |
|
121 |
|
Cybersecurity and Applied Mathematics |
Casey, William,Metcalf, Leigh,William Casey |
|
122 |
|
Mobile Malware Attacks and Defense |
Ken Dunham |
|
123 |
|
The Basics of Cyber Safety Computer and Mobile Device Safety Made Easy |
Cross, Michael,Sammons, John |
|
124 |
|
Understanding the Internet: A Clear Guide to Internet Technologies (Computer Weekly Professional Series) [1st ed.] |
Keith Sutherland |
1 |
125 |
|
Virtual Pedophilia: Sex Offender Profiling and U.S. Security Culture |
Gillian Harkins |
|