Number Cover TextBook for Cyber Security Author Edition
0 cover Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts Maurizio Martellini, Andrea Malizia (eds.) 1
1 cover Fundamentals of Network Forensics: A Research Perspective [1 ed.] R.C. Joshi, Emmanuel S. Pilli (auth.) 1
2 cover Fundamentals of network security [1st ed.] John E. Canavan 1
3 cover Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night McHale, David
4 cover Access Control and Security Monitoring of Multimedia Information Processing and Transmission (Computing and Networks) Zhihan Lyu (editor), Jaime Lloret (editor), Houbing Herbert Song (editor)
5 cover Advanced Computer Science Applications. Recent Trends in AI, Machine Learning, and Network Security Karan Singh, Latha Banda, Manisha Manjul
6 cover Advanced Product Management Series: Cybersecurity [1 ed.] Alex Cowan 1
7 cover Advanced Techniques of Artificial Intelligence in IT Security Systems (Studies in Big Data, 146) [1st ed.] Marcin Korytkowski 1
8 cover AI for Peace Branka Panic, Paige Arthur
9 cover Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I [1 ed.] Christina Pöpper, Lejla Batina 1
10 cover Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II [1 ed.] Christina Pöpper, Lejla Batina 1
11 cover Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III [1 ed.] Christina Pöpper, Lejla Batina 1
12 cover Artificial Intelligence for Cyber Defense and Smart Policing S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
13 cover Azure Security [1 ed.] Bojan Magusic 1
14 cover Beyond Digital Distraction: Educating Today's Cyber Student (Digital Education and Learning) [1st ed.] Kurt C. Schuett 1
15 cover Big Data, Emerging Technologies and Intelligence: National Security Disrupted Miah Hammond-Errey
16 cover Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals Ramakrishnan, Ganesh, Haqanee, Mansoor
17 cover Blockchain-Based Data Security in Heterogeneous Communications Networks Dongxiao Liu, Xuemin (Sherman) Shen
18 cover Blockchain-based Internet of Things [1 ed.] Iraq Ahmad Reshi (editor), Sahil Sholla (editor) 1
19 cover Cold War 2.0 : Artificial Intelligence in the New Battle between China, Russia, and America George S. Takach
20 cover Building Cybersecurity Applications with Blockchain and Smart Contracts Nour El Madhoun, Ioanna Dionysiou, Emmanuel Bertin
21 cover CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003) [3 ed.] Mya Heath 3
22 cover CompTIA Security+ Practice Tests: Exam SY0-701 [3 ed.] David Seidl 3
23 cover CompTIA Security+ SY0-701 Certification Guide, Third Edition (for DUC PHAM) [3 ed.] Ian Neil 3
24 cover CompTIA Security+ SY0-701 Practice Tests & PBQs: Exam SY0-701 Nikolaos Gorgotsias
25 cover CompTIA® Security+ SY0-701 Cert Guide (for True Epub) Lewis Heuermann
26 cover Computer networks. Data communications, Internet and security. Ata Elahi, Alex Cushman
27 cover Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings Part 3 Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor)
28 cover Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science) Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor)
29 cover Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part II (Lecture Notes in Computer Science) Gene Tsudik (editor), Mauro Conti (editor), Kaitai Liang (editor), Georgios Smaragdakis (editor)
30 cover Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised ... I (Lecture Notes in Computer Science, 14398) Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens-Boulahia (editor), Costas Lambrinoudakis (editor), Joaquin Garcia-Alfaro (editor), Guillermo Navarro-Arribas (editor), Pantaleone Nespoli (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor)
31 cover CC Certified in Cybersecurity Study Guide (Sybex Study Guide) Mike Chapple
32 cover Children, Young People and Online Harms: Conceptualisations, Experiences and Responses Emily Setty (editor), Faith Gordon (editor), Emma Nottingham (editor)
33 cover Security with Intelligent Computing and Big-data Services Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao
34 cover Security with Intelligent Computing and Big-data Services: Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018) Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
35 cover Security-Enriched Urban Computing and Smart Grid: Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings Kai-Di Chang, Chi-Yuan Chen (auth.), Ruay-Shiung Chang, Tai-hoon Kim, Sheng-Lung Peng (eds.)
36 cover Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy) [1 ed.] Ari Takanen, Jared DeMott, Charlie Miller 1
37 cover Advanced Certificate in Information Security (ACISE) Part-I IGNOU
38 cover Advanced Certificate in Information Security (ACISE) Part-II IGNOU
39 cover Data Security in Internet of Things Based RFID and WSN Systems Applications Korhan Cengiz, Rohit Sharma, Rajendra Prasad Mahapatra
40 cover Post Graduate Diploma in Information Security (PGDIS) Part 1 IGNOU
41 cover Post Graduate Diploma in Information Security (PGDIS) Part 2 IGNOU
42 cover Post Graduate Diploma in Information Security (PGDIS) Part 3 IGNOU
43 cover Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences: PCCDS 2022 Rajendra Prasad Yadav, Satyasai Jagannath Nanda, Prashant Singh Rana, Meng-Hiot Lim
44 cover Transactions on data hiding and multimedia security VI Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.)
45 cover Cyber Dragon: Inside China's Information Warfare and Cyber Operations Dean Cheng
46 cover Cyber Security: Threats and Responses for Government and Business Caravelli, Jack,Jones, Nigel,Kozup, John C
47 cover Cybercrime: Criminal Threats from Cyberspace Susan W. Brenner
48 cover Digital Influence Warfare in the Age of Social Media James J. F. Forest
49 cover Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers Philip Alexander
50 cover Myths and Realities of Cyber Warfare: Conflict in the Digital Realm Nicholas Michael Sambaluk
51 cover The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals Paul Bocij
52 cover The Technology Trap: Where Human Error and Malevolence Meet Powerful Technologies Lloyd J. Dumas
53 cover The War on Privacy Jacqueline Klosek
54 cover Weaponizing Cyberspace: Inside Russia's Hostile Activities Nicholas Sambaluk
55 cover Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings Rudrapatna K. Shyamasundar,Virendra Singh,Jaideep Vaidya (eds.)
56 cover Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings Sabu M. Thampi,Gregorio Martínez Pérez,Carlos Becker Westphall,Jiankun Hu,Chun I. Fan,Félix Gómez Mármol (eds.)
57 cover Smart Secure Systems – IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings Guru Prasadh Venkataramani,Karthik Sankaranarayanan,Saswati Mukherjee,Kannan Arputharaj,Swamynathan Sankara Narayanan (eds.)
58 cover A Deep Learning based Approach to Proactive and Reactive Enterprise Security Sumit Chakraborty
59 cover Adaptively Secure Broadcast: Threat Analytics & Security Intelligence Sumit Chakraborty
60 cover Advanced Computing and Systems for Security: Volume 1 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.)
61 cover Advanced Computing and Systems for Security: Volume 2 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki (eds.)
62 cover Advanced Informatics for Computing Research: Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
63 cover Advancements in Smart Computing and Information Security: First International Conference, ASCIS 2022 Rajkot, India, November 24–26, 2022 Revised Selected Papers, Part I Sridaran Rajagopal, Parvez Faruki, Kalpesh Popat
64 cover Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.)
65 cover Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II Gaëtan Leurent, Thomas Peyrin, Lei Wang (auth.), Kazue Sako, Palash Sarkar (eds.)
66 cover Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 Hiran V. Nath (auth.), David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai (eds.)
67 cover An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection S. V. Raghavan, E. Dawson (auth.), S.V. Raghavan, E Dawson (eds.)
68 cover Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
69 cover Applied Computation and Security Systems: Volume One Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.)
70 cover Applied Computation and Security Systems: Volume Two Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki (eds.)
71 cover Bioterrorism : Cryptographic Challenges Sumit Chakraborty
72 cover Bioterrorism, Threat Analytics and Secure Multi-party Computation Sumit Chakraborty
73 cover Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe John, Nirmal
74 cover Combating Cyber Threat P. K. Singh
75 cover Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar
76 cover Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan
77 cover Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan
78 cover Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 Anthony Bonato, Stephen Finbow, Przemysław Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)
79 cover Computer Networks and Information Technologies: Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, Bangalore, India, March 10-11, 2011. Proceedings Snehlata Mishra, Vandana Neha Tigga, S. N. Singh (auth.), Vinu V Das, Janahanlal Stephen, Yogesh Chaba (eds.)
80 cover Computer Networks and Intelligent Computing: 5th International Conference on Information Processing, ICIP 2011, Bangalore, India, August 5-7, 2011. Proceedings Saritha S., Santhosh Kumar G. (auth.), K. R. Venugopal, L. M. Patnaik (eds.)
81 cover Cryptography and network security 3rd edition Atul Kahate 3
82 cover Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Series on Asian Criminology and Criminal Justice Research) Balsing Rajput
83 cover Cyber Security in India: Education, Research and Training (IITK Directions, 4) Sandeep Kumar Shukla (editor), Manindra Agrawal (editor)
84 cover Cyber Technological Paradigms and Threat Landscape in India Ramnath Reghunadhan
85 cover Cyber Warfare, Security and Space Research: First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers Sandeep Joshi (editor), Amit Kumar Bairwa (editor), Amita Nandal (editor), Milena Radenkovic (editor), Cem Avsar (editor)
86 cover Cyber Warfare: Its Implications on National Security Sanjeev Relia
87 cover Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science, 1436) Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor)
88 cover Distributed Computing and Networking: 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings Sanjit A. Seshia (auth.), Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha (eds.)
89 cover India Today [April 09, 2018] | Your Privacy is Dead ! India Today
90 cover Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings Atul Prakash, Rudrapatna Shyamasundar (eds.)
91 cover Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings Sushil Jajodia, Chandan Mazumdar (eds.)
92 cover Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.)
93 cover Information Systems Security: 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar
94 cover Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar
95 cover Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur
96 cover Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings (Security and Cryptology) Somanath Tripathy (editor), Rudrapatna K. Shyamasundar (editor), Rajiv Ranjan (editor)
97 cover Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings (Lecture Notes in Computer Science) Venkata Ramana Badarla (editor), Surya Nepal (editor), Rudrapatna K. Shyamasundar (editor)
98 cover Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings (Lecture Notes in Computer Science) Vallipuram Muthukkumarasamy (editor), Sithu D. Sudarsan (editor), Rudrapatna K. Shyamasundar (editor)
99 cover Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings Sriram K. Rajamani (auth.), Somesh Jha, Anish Mathuria (eds.)
100 cover Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia (auth.), Sushil Jajodia, Chandan Mazumdar (eds.)
101 cover Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings Christopher Kruegel (auth.), Venkat Venkatakrishnan, Diganta Goswami (eds.)
102 cover Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings Chris Clifton, Balamurugan Anandan (auth.), Aditya Bagchi, Indrakshi Ray (eds.)
103 cover Information theory coding and cryptography Mandal, Surajit, Manna, Nilotpal, Saha, Arjit
104 cover Information Theory Coding And Cryptography Ranjan Bose
105 cover Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part I Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao
106 cover Machine Learning, Image Processing, Network Security and Data Sciences: Second International Conference, MIND 2020, Silchar, India, July 30 - 31, 2020, Proceedings, Part II Arup Bhattacharjee, Samir Kr. Borgohain, Badal Soni, Gyanendra Verma, Xiao-Zhi Gao
107 cover Network security essentials: applications and standards William Stallings
108 cover Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal
109 cover Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas
110 cover Progress in Cryptology – INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings Roger Dingledine (auth.), Daniel J. Bernstein, Sanjit Chatterjee (eds.)
111 cover Progress in Cryptology – INDOCRYPT 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang (auth.), Goutam Paul, Serge Vaudenay (eds.)
112 cover Progress in Cryptology – INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings Orr Dunkelman, Somitra Kumar Sanadhya (eds.)
113 cover Progress in Cryptology – INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings Debrup Chakraborty, Tetsu Iwata
114 cover Progress in Cryptology – INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings Feng Hao, Sushmita Ruj, Sourav Sen Gupta
115 cover Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran
116 cover Progress in Cryptology – INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings (Security and Cryptology) Avishek Adhikari (editor), Ralf Küsters (editor), Bart Preneel (editor)
117 cover Progress in Cryptology – INDOCRYPT 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11–14, 2022, Proceedings (Lecture Notes in Computer Science) Takanori Isobe (editor), Santanu Sarkar (editor)
118 cover Quality, Reliability, Security and Robustness in Heterogeneous Networks: 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers Rahul Johari, Neelima Gupta, Sandhya Aneja (auth.), Karan Singh, Amit K. Awasthi (eds.)
119 cover Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (auth.), Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (eds.)
120 cover Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko, Lei Shu (eds.)
121 cover Securing India in the Cyber Era Sameer Patil
122 cover Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science) Pantelimon Stănică (editor), Sihem Mesnager (editor), Sumit Kumar Debnath (editor)
123 cover Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki
124 cover Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings Sanjay Burman (auth.), Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (eds.)
125 cover Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.)
126 cover Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero
127 cover Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers ... in Computer and Information Science, 1208) Sabu M. Thampi (editor), Gregorio Martinez Perez (editor), Ryan Ko (editor), Danda B. Rawat (editor)
128 cover Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers (Communications in Computer and Information Science) Sabu M. Thampi (editor), Guojun Wang (editor), Danda B. Rawat (editor), Ryan Ko (editor), Chun-I Fan (editor)
129 cover Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings Sunil Malipatlolla (auth.), Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
130 cover Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (eds.)
131 cover Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.)
132 cover Security in Computing: 5th Edition Charles P. Pfleeger And Shari Lawrence Pfleeger 5
133 cover Security Intelligence for Broadcast : Threat Analytics Sumit Chakraborty
134 cover Security Intelligence for Broadcast: Algorithmic Complexity Sumit Chakraborty
135 cover Security, Privacy, and Applied Cryptography Engineering. 12th International Conference, SPACE 2022 Jaipur, India, December 9–12, 2022 Proceedings Lejla Batina, Stjepan Picek, Mainack Mondal
136 cover Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, December 17–21, 2020, Proceedings (Security and Cryptology) Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor)
137 cover Security, Privacy, and Applied Cryptography Engineering: 11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings (Security and Cryptology) Lejla Batina (editor), Stjepan Picek (editor), Mainack Mondal (editor)
138 cover Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science) Francesco Regazzoni (editor), Bodhisatwa Mazumdar (editor), Sri Parameswaran (editor)
139 cover Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont (eds.)
140 cover Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth (eds.)
141 cover SIVA: Security Intelligence Verification Algorithm for Location based Services Sumit Chakraborty
142 cover Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I Amos Beimel, Stefan Dziembowski
143 cover Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II Amos Beimel, Stefan Dziembowski
144 cover Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings Tanja Ažderska (auth.), Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (eds.)
145 cover Cyber Laundering: International Policies And Practices Nathalie Rebe
146 cover Regulating Cyber Technologies: Privacy Vs Security Nathalie Rébé
147 cover Innovations in Digital Forensics [Team-IRA] Suryadipta Majumdar (editor), Paria Shirani (editor), Lingyu Wang (editor)
148 cover Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory Selda Calkavur, Alexis Bonnecaze, Romar Dela Cruz, Patrick Sole
149 cover Internet of Everything: Key Technologies, Practical Applications and Security of IoT Hang Song
150 cover Cryptography In The Information Society Ryabko, Boris, Fionov, Andrey,
151 cover Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor)
152 cover Dynamically Enabled Cyber Defense Lin Yang, Quan Yu
153 cover Data Analysis for Network Cyber-Security Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard
154 cover Using Science in Cybersecurity Leigh Metcalf, Jonathan Spring
155 cover Computer Viruses: A High-tech Disease [2nd ed.] Rolf Burger 2
156 cover Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings [1st ed.] Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung 1
157 cover Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings Shlomi Dolev, Sachin Lodha
158 cover The Kish Cypher:The Story of KLJN for Unconditional Security Laszlo B. Kish
159 cover Cyberspace and Instability Robert Chesney (editor), James Shires (editor), Max Smeets (editor)
160 cover The Political Mapping of Cyberspace Jeremy Crampton
161 cover Integer Algorithms in Cryptology and Information Assurance Boris S Verkhovsky
162 cover CyberForensics: Understanding Information Security Investigations Jennifer Bayuk (editor)
163 cover Firewall Design and Analysis (Computer and Network Security) Alex X. Liu
164 cover Mind Games Richard Thieme
165 cover Biometrics: identity verification in a networked world [1st ed.] Samir Nanavati, Michael Thieme, Raj Nanavati 1
166 cover Algorithms, architectures and information systems security Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy
167 cover Security in Iot Social Networks [1° ed.] Fadi Al-turjman (editor), B. D. Deebak (editor) 1
168 cover RIoT Control. Understanding and Managing Risks and the Internet of Things [1 ed.] Tyson Macaulay 1
169 cover Computer and Information Security Handbook [3 ed.] John R. Vacca (Editor) 3
170 cover Malware Diffusion Models for Modern Complex Networks: Theory and Applications Vasileios Karyotis, M.H.R. Khouzani
171 cover Emerging trends in ICT security [1 ed.] Babak Akhgar, Hamid R. Arabnia (editors) 1
172 cover Computer and Information Security Handbook [2 ed.] John R. Vacca (editor) 2
173 cover Handbook on Securing Cyber-Physical Critical Infrastructure Sajal K. Das, Krishna Kant and Nan Zhang (Auth.)
174 cover System Assurance: Beyond Detecting Vulnerabilities [1 ed.] Nikolai Mansourov, Djenana Campara 1
175 cover Computer and information security handbook [1 ed.] John R. Vacca (editor) 1
176 cover Disappearing Cryptography: Information Hiding: Steganography and Watermarking [3 ed.] Peter Wayner 3
177 cover Digital watermarking and steganography [2nd ed] Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker 2
178 cover Network security : know it all James B D Joshi, et al
179 cover Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking) Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi
180 cover Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking) Jan L. Harrington
181 cover Policy-Based Network Management: Solutions for the Next Generation (The Morgan Kaufmann Series in Networking) [1 ed.] John Strassner 1
182 cover Digital Watermarking [1st ed.] Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller 1
183 cover Virus: Detection and Elimination [Pap/Dskt ed.] Rune Skardhamar
184 cover Security in Ad-hoc and Sensor Networks (Computer and Network Security) Raheem Beyah, Janise Mcnair, Cherita Corbett
185 cover Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) Jeffrey Pawlick, Quanyan Zhu
186 cover Cyber Security Applications for Industry 4.0 R Sujatha, G Prakash, Noor Zaman Jhanjhi
187 cover AI-Based Metaheuristics for Information Security and Digital Media (Advances in Metaheuristics) [1 ed.] Apoorva S Shastri (editor), Mangal Singh (editor), Anand J. Kulkarni (editor), Patrick Siarry (editor) 1
188 cover Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems) Bishwajeet Pandey, Shabeer Ahmad
189 cover Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia 1
190 cover Cyber Security Threats and Challenges Facing Human Life [1 ed.] Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) 1
191 cover Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) [1 ed.] Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) 1
192 cover Introduction to Machine Learning with Applications in Information Security (Chapman & Hall/CRC Machine Learning & Pattern Recognition) [2 ed.] Mark Stamp 2
193 cover Cybersecurity: A Practical Engineering Approach Henrique M. D. Santos
194 cover Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh
195 cover Phishing Detection Using Content-Based Image Classification Shekhar Khandelwal, Rik Das
196 cover Security Analytics: A Data Centric Approach to Information Security [1 ed.] Mehak Khurana, Shilpa Mahajan 1
197 cover CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) Brent Chapman
198 cover Zero Trust Security: An Enterprise Guide Jason Garbis, Jerry W. Chapman
199 cover Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (Chapman & Hall/CRC Internet of Things) [1 ed.] Chinmay Chakraborty (editor), Sree Ranjani Rajendran (editor), Muhammad Habibur Rehman (editor) 1
200 cover Cyberspace, Data Analytics, and Policing [1 ed.] David Skillicorn 1
201 cover Cloud Security: Attacks, Techniques, Tools, and Challenges [1 ed.] Preeti Mishra, Emmanuel S Pilli, R C Joshi 1
202 cover Protecting Your Privacy in a Data-Driven World Claire McKay Bowen
203 cover Internet of Things and Secure Smart Environments: Successes and Pitfalls Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
204 cover Security Risk Models for Cyber Insurance Caroline Baylon, Jose Vila, David Rios Insua
205 cover Artificial intelligence safety and security [First edition.] Yampolskiy, Roman V.
206 cover Emerging security algorithms and techniques [1st ed.] Ahmad, Khaleel, Doja, M. N., Singh, Manu, Udzir, Nur Izura 1
207 cover Security for software engineers Helfrich, James N
208 cover Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) Maymi, Fernando,Chapman, Brent,Parker, Jeff T
209 cover The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart Cities Termanini, Rocky
210 cover Data privacy: principles and practice Nataraj Venkataramanan, Ashwin Shriram
211 cover CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide Fernando Maymi, Brent Chapman
212 cover Introduction to Machine Learning with Applications in Information Security [1 ed.] Mark Stamp 1
213 cover Network performance and security : testing and analyzing using open source and low-cost tools [1 ed.] Chapman, Chris 1
214 cover Managing Trust in Cyberspace Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
215 cover Implementing Cisco IOS network security (IINS): (CCNA Security Exam 640-553) (Authorized self-study guide) Chapman, David W., Whitaker, Andrew, Paquet, Catherine
216 cover Introduction to Network Security [Online-ausg ed.] Jacobson, Douglas
217 cover Building Internet Firewalls: Internet and Web security [2nd ed] Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman 2
218 cover Building Internet Firewalls D. Brent Chapman
219 cover Privacy for Sale: How Big Brother and Others Are Selling Your Private Secrets for Profit [1 ed.] Michael E. Chesbro 1
220 cover Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition [2 ed.] James E Fitzpatrick, Joseph G Morelli 2
221 cover Fighting Terror in Cyberspace Mark Last, Abraham Kandel
222 cover Cyber Infrastructure for the Smart Electric Grid Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser
223 cover Data Exfiltration Threats and Prevention Techniques: Machine Learning and Memory-Based Data Security [1 ed.] Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot 1
224 cover Security and Privacy Vision in 6G: A Comprehensive Guide [Team-IRA] [1 ed.] Pawani Porambage, Madhusanka Liyanage 1
225 cover Cybersecurity in Intelligent Networking Systems (IEEE Press) [1 ed.] Shengjie Xu, Yi Qian, Rose Qingyang Hu 1
226 cover Deep Learning Approaches for Security Threats in IoT Environments Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash
227 cover Game Theory and Machine Learning for Cyber Security [1 ed.] Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) 1
228 cover Intelligent Security Systems. How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security Leon Reznik
229 cover Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program [1 ed.] John Jackson 1
230 cover The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity Dan Shoemaker, Anne Kohnke, Ken Sigler
231 cover Assured cloud computing [First edition] Campbell, Roy Harold, Kamhoua, Charles A., Kwiat, Kevin A
232 cover DNS security management Michael Dooley: Timothy Rooney
233 cover Artificial Immune System: Applications in Computer Security [1 ed.] Ying Tan 1
234 cover Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures Houmansadr, Amir, Mazurczyk, Wojciech, Szczypiorski, Krzysztof, Wendzel, Steffen, Zander, Sebastian
235 cover Secure Messaging on the Internet Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Avrum Goldberg, Matthew Smith
236 cover Vehicular Ad Hoc Network Security and Privacy [1 ed.] Xiaodong Lin, Rongxing Lu 1
237 cover Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [2nd ed] Jacobs, Stuart 2
238 cover Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance [1 ed.] Stuart Jacobs 1
239 cover Network Security: Current Status and Future Directions
240 cover Electronic watermarking the first 50 years Cox Miller
241 cover Practical Cryptography for Internetworks [1 ed.] William Stallings 1
242 cover Information security : an integrated collection of essays [[2. Dr.] ed.] Marshall D. Abrams (editor),Sushil Jajodia (editor), Harold J. Podell (editor) 2
243 cover Stealing the Network: How to Own an Identity Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch, Timothy Mullen
244 cover Information security management handbook [7, 6 ed.] Richard O'Hanley, James S. Tiller (editor) 6
245 cover Weaponizing Cyberspace Nicholas Michael Sambaluk
246 cover Cyber Warfare Rosenzweig, Paul
247 cover Mobile and Wireless Networks Security Maryline Laurent-Maknavickius, Hakima Chaouchi
248 cover Ethical hacking and countermeasures. Book 4 of 4, Secure network operating systems and infrastructures [2nd edition] EC-Council Press,, International Council of E-Commerce Consultants 2
249 cover Hands-On Ethical Hacking and Network Defense (MindTap Course List) [4 ed.] Rob Wilson 4
250 cover Principles of Information Security [7 ed.] Michael E. Whitman, Herbert J. Mattord 7
251 cover Comptia Security+ Guide to Network Security Fundamentals [7 ed.] Mark Ciampa 7
252 cover Principles of Incident Response & Disaster Recovery (MindTap Course List) [3 ed.] Michael E. Whitman, Herbert J. Mattord 3
253 cover Guide to Firewalls and VPNs [3rd ed.] Michael E. Whitman, Herbert J. Mattord, Andrew Green 3
254 cover Management of Information Security [6 ed.] Michael E. Whitman, Herbert J. Mattord 6
255 cover Principles of Information Security [6 ed.] Whitman, Michael, Mattord, Herbert 6
256 cover Hands-On Ethical Hacking and Network Defense [Third ed.] Michael T. Simpson, Nicholas Antill
257 cover Guide to computer forensics and investigations : processing digital evidence [Fifth edition] Nelson, Bill, Phillips, Amelia, Steuart, Christopher
258 cover Principles of Information Security [5 ed.] Michael E. Whitman, Herbert J. Mattord 5
259 cover Management of Information Security [5 ed.] Michael E. Whitman, Herbert J. Mattord 5
260 cover CompTIA Security+ Guide to Network Security Fundamentals [5th ed.] Mark Ciampa 5
261 cover Guide to Network Defense and Countermeasures [3 ed.] Randy Weaver, Dawn Weaver, Dean Farwood 3
262 cover Hands-On Ethical Hacking and Network Defense [1 ed.] Backman, Kent, Corley, James E., Simpson, Michael T 1
263 cover Management of Information Security [4 ed.] Michael E. Whitman, Herbert J. Mattord 4
264 cover Guide to Network Security [1st ed.] Michael E. Whitman et al. 1
265 cover EIS: Inspection Testing and Commissioning [Applied Mathematics] Malcolm Doughton, John Hooper
266 cover Readings and cases in information security : law and ethics Michael E Whitman, Herbert J Mattord
267 cover Guide to Computer Forensics and Investigations Bill Nelson, Amelia Phillips, Christopher Steuart 3
268 cover CISSP Guide to Security Essentials P. Gregory
269 cover Access controlled: the shaping of power, rights, and rule in cyberspace [1 ed.] Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti 1
270 cover Computer forensics: investigating wireless networks and devices EC-Council Press
271 cover Computer Evidence: Collection And Preservation [2nd Edition] Christopher LT Brown 2
272 cover Security awareness: applying practical security in your world [3. ed] Ciampa, Mark D 3
273 cover Computer Forensics: Investigating Network Intrusions and Cybercrime [1 ed.] EC-Council 1
274 cover Security+ Guide to Network Security Fundamentals Mark D Ciampa 3
275 cover Ethical Hacking and Countermeasures: Threats and Defense Mechanisms [1 ed.] EC-Council 1
276 cover Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems [1 ed.] EC-Council 1
277 cover Secure Network Infrastructures EC-Council 1
278 cover Web 2.0 Security: defending Ajax, Ria, and Soa [1 ed.] Shreeraj (Shreeraj Shah) Shah 1
279 cover A Practical Guide to Managing Information Security (Artech House Technology Management Library) [illustrated edition] Steve Purser
280 cover Access Contested: Security, Identity, and Resistance in Asian Cyberspace Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain
281 cover An Information Security Handbook [1 ed.] John M. D. Hunter BA (Hons), FBCS, CEng (auth.) 1
282 cover Borders in Cyberspace: Information Policy and the Global Information Infrastructure [1 ed.] Brian Kahin, Charles R. Nesson 1
283 cover Computer and intrusion forensics George Mohay, Alison Anderson, Byron Collie, Olivier de Vel, Rodney McKemmish
284 cover Contemporary Cryptography Rolf Oppliger
285 cover Coordinating the Internet edited by Brian Kahin and James H. Keller.
286 cover Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks Josephine Wolff
287 cover Cybersecurity [1 ed.] Duane C. Wilson 1
288 cover International Relations in the Cyber Age: The Co-Evolution Dilemma Nazli Choucri, David D. Clark
289 cover Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings [v. 22, 1 ed.] Steve Barker (auth.), Vijay Atluri (eds.) 1
290 cover Data Security Breaches and Privacy in Europe [1 ed.] Rebecca Wong (auth.) 1
291 cover EC2ND 2005: Proceedings of the First European Conference on Computer Network Defence School of Computing, University of Glamorgan, Wales, UK [1 ed.] Liwen He, Nikolai Bode (auth.), Andrew Blyth BSc, MSc, PhD (eds.) 1
292 cover EC2ND 2006: Proceedings of the Second European Conference on Computer Network Defence, in conjunction with the First Workshop on Digital Forensics and Incident Analysis Faculty of Advanced Technology, University of Glamorgan, Wales, UK [1 ed.] Andrew Blyth BSc, MSc, PhD, Iain Sutherland BSc, MSc, PhD (auth.) 1
293 cover End-to-End Encrypted Messaging Rolf Oppliger
294 cover Governing Global Electronic Networks: International Perspectives on Policy and Power William J. Drake, Ernest J. Wilson III
295 cover Hacker States [First Edition] Follis, Luca, Fish, Adam,, Adam Fish
296 cover High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace Peter Ludlow, Loyd Blankenship
297 cover Implementing the ISO / IEC 27001 ISMS Standard [2 ed.] Edward Humphreys 2
298 cover Information Assurance: Security in the Information Environment [2 ed.] Andrew Blyth BSc, MSc, PhD, Gerald L. Kovacich MA, MSc, D.Crim (auth.) 2
299 cover Introduction to Identity-Based Encryption (Information Security and Privacy Series) [1 ed.] Luther Martin 1
300 cover Lifecycle IoT Security for Engineers Kaustubh Dhondge
301 cover Medical Device Cybersecurity for Engineers and Manufacturers Axel Wirth, Christopher Gates, Jason Smith
302 cover Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) Michael Roytman and Ed Bellis
303 cover Multicast and Group Security (Artech House Computer Security Series) Thomas Hardjono, Lakshminath R. Dondeti,
304 cover Networks and states: the global politics of Internet governance [First MIT Pbk. ed] Mueller, Milton
305 cover New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) Howard Shrobe, David L. Shrier, Alex Pentland
306 cover Outsourcing Information Security C. Warren Axelrod
307 cover Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems [1 ed.] Javier Herranz, Jordi Nin (auth.), Jordi Nin, Javier Herranz (eds.) 1
308 cover Computer Forensics and Privacy Michael A. Caloyannides 2
309 cover Privacy vs. Security [1 ed.] Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan (auth.) 1
310 cover Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues [1 ed.] Sanjib Sinha 1
311 cover Researching Internet Governance: Methods, Frameworks, Futures [1 ed.] Laura DeNardis, Derrick Cogburn, Nanette S. Levinson, Francesca Musiani 1
312 cover Resistance To The Current: The Dialectics Of Hacking [1 ed.] Johan Söderberg, Maxigas 1
313 cover Ruling the root: Internet governance and the taming of cyberspace Mueller, Milton
314 cover Secure Data Networking Michael Purser
315 cover Secure Information Management Using Linguistic Threshold Approach [1 ed.] Marek R. Ogiela, Urszula Ogiela (auth.) 1
316 cover Secure Messaging On The Internet Rolf Oppliger
317 cover Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers [1 ed.] Zhiyun Qian, Z. Morley Mao, Ammar Rayes, David Jaffe (auth.), Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis (eds.) 1
318 cover Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad
319 cover Smart Grid Security [1 ed.] Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou, Dariusz Kloza (auth.) 1
320 cover Social Engineering: How Crowdmasters, Phreaks, Hackers, And Trolls Created A New Form Of Manipulative Communication [1 ed.] Robert W. Gehl, Sean T Lawson 1
321 cover CEHV8 - Module 03 - Labs Scanning Networks.pdf
322 cover CEHv8 Module 03 Scanning Networks.pdf
323 cover SSL and TLS: Theory and Practice (Information Security and Privacy) Rolf Oppliger
324 cover SSL and TLS: Theory and Practice [2 ed.] Rolf Oppliger 2
325 cover Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
326 cover Cisco ASA Firewall Fundamentals, 3rd Edition Harris Andrea
327 cover Fundamentals of Network Security John E. Canavan
328 cover The New Hacker's Dictionary - 3rd Edition [3 ed.] Eric S. Raymond 3
329 cover Co-ordinated Port Scans
330 cover The official PGP user's guide Zimmermann, Philip R.
331 cover Tor Darknet series: Master the Art of Invisibility Lance Henderson
332 cover The secure information society: ethical, legal and political challenges [1 ed.] Chris Bronk (auth.), Jörg Krüger, Bertram Nickolay, Sandro Gaycken (eds.) 1
333 cover The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing Arun Vishwanath
334 cover Critical Infrastructures State of the Art in Research and Application [1 ed.] P. M. Herder, W. A. H. Thissen (auth.), W. A. H. Thissen, P. M. Herder (eds.) 1
335 cover We, the Data : Human Rights in the Digital Age Wendy H. Wong
336 cover Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P Robert W. Gehl
337 cover You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy) Josephine Wolff, Sandra Braman, Paul T. Jaeger
338 cover Your Computer Is on Fire Thomas S. Mullaney, Benjamin Peters, Mar Hicks, Kavita Philip
339 cover CEHV8 - Module 03 - Scanning Networks.pdf
340 cover Ethical Hacking and Countermeasures: Secure Network Infrastructures EC-Council
341 cover Privacy, Regulations, And Cybersecurity: The Essential Business Guide [1st Edition] Chris Moschovitis 1
342 cover Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit Sagar Rahalkar
343 cover Rtfm: Red Team Field Manual Ben Clark
344 cover Scanning Applications 2.0 Next generation scan, attacks and tools
345 cover Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide
346 cover SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Xun Yi
347 cover Secure connected objects Huon, Jean-Paul, Paret, Dominique
348 cover Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition [3 ed.] David R. Miller, Michael Gregg 3
349 cover Security engineering: a guide to building dependable distributed systems Ross J. Anderson 2
350 cover Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges Qing Li, Gregory Clark
351 cover Applied Incident Response [1 ed.] Steve Anson 1
352 cover Beyond cybersecurity: protecting your digital business Kaplan, James M,Bailey, Tucker,O'Halloran, Derek,Marcus, Alan J
353 cover Carry On: Sound Advice from Schneier on Security Schneier, Bruce
354 cover CEH Certified Ethical Hacker Study Guide Graves, Kimberly
355 cover CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions Ric Messier
356 cover CEHv8: Certified Ethical Hacker Version 8 Study Guide Oriyano, Sean-Philip
357 cover Cehv9: Certified Ethical Hacker Version 9 [3rd ed] Oriyano, Sean-Philip 3
358 cover CISSP for Dummies [6th edition] Gregory, Peter H.,Miller, Lawrence C 6
359 cover CISSP official (ISC)² practice tests Chapple, Mike,Seidl, David
360 cover CISSP Official (ISC)2 Practice Tests Mike Chapple, David Seidl 2
361 cover CISSP: Certified Information Systems Security Professional Study Guide [5th ed.] James M. Stewart, Ed Tittel, Mike Chapple 5
362 cover Communications and Information Infrastructure Security John G. Voeller 1
363 cover CompTIA CySA+ Study Guide: Exam CS0-001 Mike Chapple, David Seidl
364 cover CompTIA Security+ Deluxe Study Guide [1st edition] Dulaney, Emmett 1
365 cover CompTIA Security+ Review Guide: Sy0-201 Stewart, James M.
366 cover Computer Fraud Casebook: The Bytes That Bite [1. ed.] Joseph T. Wells (editor) 1
367 cover Computer Security Handbook [1, Sixth edition] Seymour Bosworth, Michel E. Kabay, Eric Whyne 1
368 cover Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk [1. ed.] Andrew Gorecki 1
369 cover Cyber Security Voeller, John G.
370 cover Cyber Security Policy Guidebook Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt
371 cover Cyber smart: five habits to protect your family, money, and identity from cyber criminals McDonough, Bart R
372 cover Cyber-risk informatics: engineering evaluation with data science Sahinoglu, Mehmet
373 cover Cybersecurity and Third-Party Risk: Third Party Threat Hunting Gregory C. Rasner
374 cover Cybersecurity In Humanities And Social Sciences: A Research Methods Approach [1, 1st Edition] Hugo Loiseau, Daniel Ventre, Hartmut Aden 1
375 cover Cybersecurity in Our Digital Lives Mowbray, Thomas J, LeClair, Jane
376 cover Cybersecurity of Industrial Systems Jean-Marie Flaus
377 cover Cybersecurity Program Development for Business: The Essential Planning Guide [1 ed.] Moschovitis, Christos J. P 1
378 cover Data Security For Dummies®, Immuta Special Edition [1 ed.] Steve Kaelble 1
379 cover Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States Matthew Webster
380 cover Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Roger A. Grimes, Dr. John N. Just
381 cover Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming [1. ed.] Matthew Hickey 1
382 cover Industrial Cyber Security for Dummies. David Meltzer and Jeff Lund
383 cover Information security governance: a practical development and implementation approach Brotby, W. Krag
384 cover Information Security: Principles and Practice Mark Stamp 2
385 cover Access Control Systems: Security, Identity Management and Trust Models [1 ed.] Dr. Messaoud Benantar (auth.) 1
386 cover Network Attacks and Exploitation: A Framework Matthew Monte
387 cover Network Forensics John Wiley and Sons,Messier, Ric
388 cover Next-Generation Firewalls For Dummies [2 ed.] Lawrence Miller 2
389 cover Phishing dark waters the offensive and defensive sides of malicious e-mails Dreeke, Robin,Fincher, Michele,Hadnagy, Christopher
390 cover Privacy Means Profit: Prevent identity theft and secure you and your bottom line [1 ed.] John D. Sileo 1
391 cover Schneier on Security Schneier, Bruce
392 cover Secrets and Lies: Digital Security in a Networked World [15th Anniversary Edition] Schneier, Bruce 15
393 cover Security 2020: reduce security risks this decade Schneier, Bruce, Howard, Doug, Prince, Kevin &, Kevin Prince
394 cover Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack Wallace, Matthew,Ottenheimer, Davi
395 cover Security and privacy in the digital era Volume 1 Guerrier, Claudine
396 cover Security designs for the cloud, IoT, and social networking [First edition] Bhatt, Chintan M., Le, Dac-Nhuong, Madhukar, Mani
397 cover Security Engineering: A Guide to Building Dependable Distributed Systems [3° ed.] Ross Anderson 3
398 cover Security Fundamentals Crystal Panek
399 cover Security Technologies and Social Implications Markarian, Garik,Karlovic, Ruza,Nitsch, Holger,Chandramouli, Krishna,, Ru?a Karlovi?, Holger Nitsch, Krishna Chandramouli
400 cover Security, privacy and digital forensics in the cloud Chen, Lei, Le-Khac, Nhien-An, Takabi, Hassan
401 cover Social Engineering Christopher Hadnagy
402 cover Social Engineering The Science of Human Hacking [2nd Edition] Christopher Hadnagy 2
403 cover Social engineering: the art of human hacking Hadnagy, Christopher, Wilson, Paul
404 cover The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers Simon, William L., Mitnick, Kevin D.
405 cover The death of the internet Markus Jakobsson
406 cover The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity Phil Quade
407 cover The Official (ISC)2 Guide to the SSCP CBK Gordon, Adam,Hernandez, Steven 4
408 cover The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter, Kai Roer
409 cover Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors [1. ed.] Perry Carpenter 1
410 cover Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity [1. ed.] Marcus J. Carey, Jennifer Jin 1
411 cover Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity Leadership [1st Edition] Marcus J. Carey, Jennifer Jin 1
412 cover Tribe Of Hackers: Cybersecurity Advice From The Best Hackers In The World Marcus J. Carey, Jennifer Jin
413 cover Vulnerability management for dummies Qualys
414 cover We Have Root: Even More Advice From Schneier On Security [1st Edition] Bruce Schneier 1
415 cover WHOIS running the Internet : protocol, policy, and privacy [1 ed.] Garth O. Bruen 1
416 cover Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework Bullock, Jessey,Kadijk, Jan
417 cover Advances in Information Security Management & Small Systems Security [1 ed.] Les Labuschagne (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon (eds.) 1
418 cover Advances in Network and Distributed Systems Security: IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium [1 ed.] Hideki Sakurada, Yasuyuki Tsukada (auth.), Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen (eds.) 1
419 cover Disseminating Security Updates at Internet Scale Jun Li, Peter Reiher, Gerald J. Popek (auth.) 1
420 cover Critical Information Infrastructures: Resilience and Protection [1 ed.] Director Maitland Hyslop (auth.) 1
421 cover Critical Infrastructure Protection [1 ed.] Neil Robinson, Lorenzo Valeri (auth.), Associate Director Eric Goetz, Professor Sujeet Shenoi (eds.) 1
422 cover Critical Infrastructure Protection II [1 ed.] Scott Dynes (auth.), Mauricio Papa, Sujeet Shenoi (eds.) 1
423 cover Cyber Situational Awareness: Issues and Research [1 ed.] Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) 1
424 cover Data and Application Security: Developments and Directions [1 ed.] Gio Wiederhold (auth.), Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari (eds.) 1
425 cover Data Warehousing and Data Mining Techniques for Cyber Security [1 ed.] Anoop Singhal (auth.) 1
426 cover Economics of information security and privacy [1 ed.] Tyler Moore, David Pym, Christos Ioannidis (auth.), Tyler Moore, David Pym, Christos Ioannidis (eds.) 1
427 cover Electronic Healthcare Information Security [1 ed.] Professor Charles A. Shoniregun, Dr. Kudakwashe Dube, Dr. Fredrick Mtenzi (auth.) 1
428 cover Fifth World Conference on Information Security Education: Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA [1 ed.] Colin J. Armstrong (auth.), Lynn Futcher, Ronald Dodge (eds.) 1
429 cover Global Initiatives to Secure Cyberspace: An Emerging Landscape [1 ed.] Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) 1
430 cover Hop Integrity in the Internet [1 ed.] Prof. Chin-Tser Huang, Dr. Mohamed G. Gouda (auth.) 1
431 cover Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES) [1 ed.] Charles A. Shoniregun (auth.) 1
432 cover Information Security -the Next Decade: Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95 Jan H. P. Eloff, Sebastiaan H. von Solms (eds.)
433 cover Information Security for Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22–24, 2000, Beijing, China [1 ed.] Kai Rannenberg (auth.), Sihan Qing, Jan H. P. Eloff (eds.) 1
434 cover Information Security Governance [1 ed.] S.H. Solms, Rossouw Solms (auth.) 1
435 cover Information Security in Research and Business: Proceedings of the IFIP TC11 13th international conference on Information Security (SEC ’97): 14–16 May 1997, Copenhagen, Denmark [1 ed.] A. K. Stanley (auth.), Louise Yngström, Jan Carlsen (eds.) 1
436 cover Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands [1 ed.] Rüdiger Weis (auth.), Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren (eds.) 1
437 cover Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22–27 August 2004 Toulouse, France Johan Van Niekerk, Rossouw Von Solms (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) 1
438 cover Information Systems Security: Facing the information society of the 21st century Sokratis K. Katsikas, Dimitris Gritzalis (eds.)
439 cover Insider Threats in Cyber Security [1 ed.] Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) 1
440 cover Intelligence and Security Informatics for International Security: Information Sharing and Data Mining [1 ed.] Hsinchun Chen Ph.D. (auth.) 1
441 cover Malware Detection [1 ed.] Brian Witten, Carey Nachenberg (auth.), Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang (eds.) 1
442 cover Managing Information Risk and the Economics of Security [1 ed.] M. Eric Johnson (auth.), M. Eric Johnson (eds.) 1
443 cover Network Infrastructure Security [1 ed.] Alan Yeung, Angus Wong (auth.) 1
444 cover Network Intrusion Detection and Prevention: Concepts and Techniques [1 ed.] Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee (auth.) 1
445 cover Network Security [1 ed.] Carlo Blundo, Stelvio Cimato, Barbara Masucci (auth.), Scott C.-H. Huang, David MacCallum, Ding-Zhu Du (eds.) 1
446 cover Network Security Policies and Procedures [1 ed.] Douglas W. Frye (auth.) 1
447 cover Network-Aware Security for Group Communications [1 ed.] Yan Sun, Wade Trappe, K. J. R. Liu (auth.) 1
448 cover Networking Security and Standards [1 ed.] Weidong Kou (auth.) 1
449 cover New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa [1 ed.] John Haggerty, Mark Taylor (auth.), Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms (eds.) 1
450 cover Online Business Security Systems [1 ed.] Godfried B. Williams (auth.) 1
451 cover Open Source Software for Digital Forensics [1 ed.] Stefano Zanero, Ewa Huebner (auth.), Ewa Huebner, Stefano Zanero (eds.) 1
452 cover Practical Internet Security [1 ed.] John R. Vacca (auth.) 1
453 cover Preserving Privacy in Data Outsourcing [1 ed.] Sara Foresti (auth.) 1
454 cover Preserving Privacy in On-Line Analytical Processing (OLAP) [1 ed.] Lingyu Wang, Sushil Jajodia, Duminda Wijesekera (auth.) 1
455 cover Principles of Data Security [1 ed.] Ernst L. Leiss (auth.) 1
456 cover Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy [1 ed.] Karsten Nohl, David Evans (auth.), Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (eds.) 1
457 cover Research Directions in Data and Applications Security XVIII: IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25–28, 2004, Sitges, Catalonia, Spain Lawrence H. Cox (auth.), Csilla Farkas, Pierangela Samarati (eds.) 1
458 cover Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK András Belokosztolszki, David Eyers (auth.), Ehud Gudes, Sujeet Shenoi (eds.) 1
459 cover Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden [1 ed.] Inger Anne Tøndel (auth.), Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, Stefan Lindskog (eds.) 1
460 cover Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece [1 ed.] Brian Toone, Michael Gertz, Premkumar Devanbu (auth.), Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas (eds.) 1
461 cover Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France Mohamed Hamdi, Noureddine Boudriga (auth.), Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (eds.) 1
462 cover Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA Dorothy E. Denning (auth.), Cynthia Irvine, Helen Armstrong (eds.) 1
463 cover Security of Data and Transaction Processing [1 ed.] Vijay Atluri, Pierangela Samarati (auth.), Vijay Atluri, Pierangela Samarati (eds.) 1
464 cover Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security [1 ed.] Edna Reid, Dr. Hsinchun Chen (auth.), Dr. Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor (eds.) 1
465 cover Vulnerability Analysis and Defense for the Internet [1 ed.] Abhishek Singh, Baibhav Singh, Hirosh Joseph (auth.), Abhishek Singh, Baibhav Singh, Hirosh Joseph (eds.) 1
466 cover Wireless Network Security [1 ed.] Jonathan Lutz, M. Anwarul Hasan (auth.), Yang Xiao, Xuemin Sherman Shen, Ding-Zhu Du (eds.) 1
467 cover The Information Security Dictionary Defining The Terms That Define Security For E-Business, Internet, Information And Wireless Technology Urs E. Gattiker
468 cover Data and applications security XVII : status and prospects : IFIP TC11/WG11.3 Seventeenth Annual Working Conference on Data and Applications Security, August 4-6, 2003, Estes Park, Colorado, USA Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray
469 cover Striking Back: The End of Peace in Cyberspace - And How to Restore It [1 ed.] Lucas Kello 1
470 cover Listening In: Cybersecurity in an Insecure Age Susan Landau
471 cover Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices [1 ed.] William Stallings 1
472 cover Database and Application Security: A Practitioner's Guide [1 ed.] R. Sarma Danturthi 1
473 cover Network Security: PRIVATE Communication in a PUBLIC World, Third Edition Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
474 cover Ransomware and Cyber Extortion: Response and Prevention [1 ed.] Sherri Davidoff, Matt Durrin, Karen Sprenger 1
475 cover Securing 5G and Evolving Architectures [1 ed.] Pramod Nair 1
476 cover Modern Security Operations Center, The [1 ed.] Joseph Muniz 1
477 cover Data Breaches: Crisis and Opportunity [1 ed.] Sherri Davidoff 1
478 cover Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services [1 ed.] Silvano Gai 1
479 cover Computer Security [Art and Science] [2nd ed.] Matthew Bishop 2
480 cover Effective Cybersecurity: A Guide to Using Best Practices and Standards [1 ed.] William Stallings 1
481 cover Cyber Security Engineering A Practical Approach for Systems and Software Assurance Carol Woody, Nancy R. Mead
482 cover Extrusion detection: security monitoring for internal intrusions Bejtlich, Richard
483 cover Troubleshooting Linux Firewalls Michael Shinn, Scott Shinn
484 cover The Executive Guide to Information Security: Threats, Challenges, and Solutions [1 ed.] Mark Egan, Tim Mather 1
485 cover Firewalls and Internet Security: Repelling the Wily Hacker [2 ed.] William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin 2
486 cover Managing information security risks: the OCTAVE approach Christopher Alberts, Audrey Dorofee
487 cover Inside Internet Security: What Hackers Don't Want You To Know [1 ed.] Jeff Crume 1
488 cover Linux Firewalls: Enhancing Security with nftables and Beyond [4th ed.] Steve Suehring 4
489 cover SSL and TLS: Designing and Building Secure Systems Eric Rescorla
490 cover Computer Programming for Beginners and Cybersecurity: 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn Step by Step How to Professionally Code and Protect Your Data. This Book Includes: Python, Java, C ++ and Cybersecurity Grid, Alan
491 cover Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe Shira Rubinoff
492 cover CompTIA CySA+ Practice Exams Dion, Jason
493 cover Next Generation Red Teaming Henry Dalziel
494 cover Build Your Own Cybersecurity Testing Lab Ric Messier
495 cover Agile Application Security Laura Bell
496 cover Developing Cybersecurity Programs and Policies, Third Edition (Christopher Mandelaris' Library) Omar Santos 3
497 cover Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative
498 cover Computer Networking First-Step: An introductory guide to understanding wireless and cloud technology, basic communications services and network security for beginners Laurence, Norman
499 cover Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and Cody, Isaac D
500 cover Hacking: 3 Books in 1: A Beginners Guide for Hackers (How to Hack Websites, Smartphones, Wireless Networks) + Linux Basic for Hackers (Command line and all the essentials) + Hacking with Kali Linux Julian James McKinnon
501 cover Penetration Testing For Dummies Robert Shimonski
502 cover The Pocket Guide to Cyber Security James H &amp, Usha D
503 cover HAZ CLIC AQUÍ PARA MATARLOS A TODOS Bruce Schneier
504 cover Basic Security Testing with Kali Linux Dieterle, Daniel
505 cover CEH - Ethical Hacking and Countermeasures v11 (CEH11) EC-Council
506 cover CEH v11 - Appendix A F3thinker !
507 cover CEH v11 - Appendix B F3thinker !
508 cover CEH v11 - Module 1 F3thinker !
509 cover CEH v11 - Module 10 F3thinker !
510 cover CEH v11 - Module 11 F3thinker !
511 cover CEH v11 - Module 12 F3thinker !
512 cover CEH v11 - Module 13 F3thinker !
513 cover CEH v11 - Module 14 F3thinker !
514 cover CEH v11 - Module 15 F3thinker !
515 cover CEH v11 - Module 16 F3thinker !
516 cover CEH v11 - Module 17 F3thinker !
517 cover CEH v11 - Module 18 F3thinker !
518 cover CEH v11 - Module 19 F3thinker !
519 cover CEH v11 - Module 2 F3thinker !
520 cover CEH v11 - Module 20 F3thinker !
521 cover CEH v11 - Module 3 F3thinker !
522 cover CEH v11 - Module 4 F3thinker !
523 cover CEH v11 - Module 5 F3thinker !
524 cover CEH v11 - Module 6 F3thinker !
525 cover CEH v11 - Module 7 F3thinker !
526 cover CEH v11 - Module 8 F3thinker !
527 cover CEH v11 - Module 9 F3thinker !
528 cover CND - Exam 312-38 - Module 0 F3thinker !
529 cover CND - Exam 312-38 - Module 1 F3thinker !
530 cover CND - Exam 312-38 - Module 10 F3thinker !
531 cover CND - Exam 312-38 - Module 11 F3thinker !
532 cover CND - Exam 312-38 - Module 12 F3thinker !
533 cover CND - Exam 312-38 - Module 13 F3thinker !
534 cover CND - Exam 312-38 - Module 14 F3thinker !
535 cover CND - Exam 312-38 - Module 2 F3thinker !
536 cover CND - Exam 312-38 - Module 3 F3thinker !
537 cover CND - Exam 312-38 - Module 4 F3thinker !
538 cover CND - Exam 312-38 - Module 5 F3thinker !
539 cover CND - Exam 312-38 - Module 6 F3thinker !
540 cover CND - Exam 312-38 - Module 7 F3thinker !
541 cover CND - Exam 312-38 - Module 8 F3thinker !
542 cover CND - Exam 312-38 - Module 9 F3thinker !
543 cover Cybersecurity Blue Team Toolkit Nadean H. Tanner
544 cover Ghost in the Wires Kevin Mitnick
545 cover How to Hack a Hacker Sherwood, AJ
546 cover Incident Response & Computer Forensics Prosise, Chris., Mandia, Kevin.
547 cover Kali Linux CTF Blueprints Buchanan, Cam
548 cover Kali Linux: Assuring Security by Penetration Testing Lee Allen,Tedi Heriyanto,Shakeel Ali
549 cover Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware K A, Monnappa
550 cover Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides Cameron H. Malin, Eoghan Casey, James M. Aquilina
551 cover Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides Casey, Eoghan,Malin, Cameron H.,Aquilina, James M.
552 cover Mastering Kali Linux Wireless Pentesting
553 cover Penetration Testing with Kali Linux 1 1 F3thinker !
554 cover Social Engineer Sutherland, Ian
555 cover The Network Bateman, E. G.
556 cover Untangle Network Security El-Bawab, Abd El-Monem A.
557 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance Chuvakin, Anton &amp, Williams, Branden R.
558 cover Bots: How to Detect and Prevent Them Dalziel, Max &amp, Bradley, Jaron
559 cover Turning BYOD Risk Into Mobile Security Strength Dalziel, Max &amp, Bradley, Jaron
560 cover Cyber Policy in China Greg Austin
561 cover Information Governance and Security Iannarelli, John G., OShaughnessy, Michael
562 cover Inside Anonymous Olson, Parmy
563 cover Core Software Security: Security at the Source James Ransome &amp, Anmol Misra
564 cover Multi-dimensional summarization in cyber-physical society Gregory S. Makowski 1
565 cover PCI Compliance. Implementing Effective PCI Data Security Standards Tony Bradley, James D. Burton, Jr., Anton Chuvakin, Dr., Anatoly Elberg, Brian Freedman, David King, Scott Paladino and Paul Shcooping (Eds.)
566 cover Guide to Computer Network Security Kizza, Joseph Migga
567 cover Seven Deadliest Microsoft Attacks Kraus, Rob &amp, Barber, Brian &amp, Borkin, Mike &amp, Alpern, Naomi
568 cover IoT Security: Advances in Authentication [1 ed.] An Braeken (editor), Pardeep Kumar (editor), Mika Ylianttila (editor), Madhusanka Liyanage (editor) 1
569 cover Python Passive Network Mapping Hosmer, Chet
570 cover The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Michael Hale Ligh &amp, Andrew Case &amp, Jamie Levy &amp, Aaron Walters
571 cover Wi Fi Security Miller, Stewart
572 cover Violent Python: a cookbook for hackers, forensic analysts, penetration testers, and security engineers O &, #39,Connor, TJ
573 cover What Is Computer Science?: An Information Security Perspective Page, Daniel &amp, Smart, Nigel
574 cover Cyber Adversary Characterization: Auditing the Hacker Mind Parker, Tom &amp, Sachs, Marcus &amp, Shaw, Eric &amp, Stroz, Ed
575 cover Safety of Computer Control Systems 1992 (Safecomp ' 92). Computer Systems in Safety-Critical Applications [1st ed.] H.H. Frey 1
576 cover Security Leader Insights for Effective Management. Lessons and Strategies from Leading Security Professionals [1 ed.] Randy Harrison 1
577 cover Security Careers. Skills, Compensation, and Career Paths Stephen W. Walker and James E. Foushée (Auth.)
578 cover Mobile Data Loss: Threats and Countermeasures Raggo, Michael T.
579 cover Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Shavers, Brett
580 cover Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Shipley, Todd &amp, Bowker, Art &amp, Selby, Nick
581 cover Cisco Software-Defined Access Srilatha Vemula, Jason Gooley, Roddie Hasan
582 cover La cryptologie au coeur du numérique Stern, Jacques
583 cover Security Risk Management: Building an Information Security Risk Management Program From the Ground Up Wheeler, Evan
584 cover Integrated Security Technologies and Solutions - Volume I 1 1 Aaron Woland, Vivek Santuka, Mason Harris, Jamie Sanbower
585 cover GRC 300 SAP ACCESS CONTROL IMPLEMENTATION AND CONFIGURATION SAP TRAINING
586 cover Modern Cryptography.
587 cover IT-Sicherheitsmanagement - Das umfassende Praxis-Handbuch für IT-Security und technischen Datenschutz nach ISO 27001 Thomas W. Harich
588 cover Guide to Computer Network Security, Fourth Edition Joseph Migga Kizza 4
589 cover SASE For Dummies®, Versa Networks Special Edition 1 Kumar Mehta &amp, Apurva Mehta
590 cover Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial Intelligence Callaway, Jason
591 cover COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing Dylan Mach
592 cover Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro HOFFMAN, HUGO &amp, HOFFMAN, HUGO
593 cover Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking with Kali Linux Jim Kou
594 cover A Machine-Learning Approach to Phishing Detection and Defense Akanbi, O.A., Amiri, Iraj Sadegh, Fazeldehkordi, E.
595 cover Ciberseguridad para la i-generación: Usos y riesgos de las redes sociales y sus aplicaciones Giant, Nikki
596 cover Educar niños y adolescentes en la era digital: El reto de la educación en el siglo XXI Rodríguez, Nora
597 cover Cybersecurity Readiness Chatterjee, Dave
598 cover Ciberleviatán Lassalle, José María
599 cover Identity 5 Mar-Gerrison, Heather
600 cover Penetration Testing mit mimikatz Brabetz, Sebastian
601 cover Internet, Hackers y Software Libre Varios
602 cover Breaking into Information Security Josh More &amp, Anthony J. Stieber &amp, Chris Liu
603 cover Hacking: How to Make Your Own Keylogger in C++ Programming Language Norman, Alan T.
604 cover HACKING GMAIL: How to Hack Gmail HAT, BLACK
605 cover Black Hat Go Dan Kottmann &amp, Chris Patten &amp, Tom Steele
606 cover Black Ice Valmore James &amp, John Gallagher
607 cover Hacking for Beginners: Step By Step Guide to Cracking Codes Discipline, Penetration Testing, and Computer Virus. Learning Basic Security Tools On How To Ethical Hack And Grow Karnel, Erickson
608 cover Cryptography & Network Security : Express Learning ITL Education Solutions Limited
609 cover Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying Henderson, Lance
610 cover Digitale Diktatur · Totalüberwachung Cyberkrieg Datenmissbrauch Aust, Stefan
611 cover Spurlos & Verschlüsselt! · Von sicherer Kommunikation und anonymem Surfen Gillen, Tobias
612 cover Transforming Information Security: Optimizing Five Concurrent Data Trends to Reduce Resource Drain Moriarty, Kathleen M.
613 cover Das Phantom im Netz: Die Autobiographie des meistgesuchten Hackers der Welt Mitnick, Kevin &amp, Simon, William M.
614 cover World Wide War: Angriff aus dem Internet Clarke, Richard A. &amp, Knake, Robert A.
615 cover The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack Levi West
616 cover Hacking: Fundamentals for Absolute Beginners Bell, Alexander
617 cover Infinity Ethical Hacking: Learn basic to advance hacks Sapp, Arthur S
618 cover The Hacker Playbook: Practical Guide To Penetration Testing Kim, Peter
619 cover Applied network security monitoring collection, detection, and analysis Bianco, David J.,Sanders, Chris,Smith, Jason
620 cover Android Forensics: Investigation, Analysis and Mobile Security for Google Android Andrew Hoog
621 cover Automated Security Analysis of Android and i: OS Applications with Mobile Security Framework [1 ed.] Abraham, Ajin, Dalziel, Henry 1
622 cover Automating open source intelligence : algorithms for OSINT [1 ed.] Layton, Robert, Watters, Paul A 1
623 cover Becoming a global chief security executive officer : a how to guide for next generation security leaders [1 ed.] Cloutier, Roland 1
624 cover Building a corporate culture of security : strategies for strengthening organizational resiliency [1 ed.] Sullivant, John 1
625 cover Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency Sullivant, John
626 cover Breakdowns in Computer Security. Commentary and Analysis Michael E Rentell and Peter M Jenner (Auth.)
627 cover Building an information security awareness program: defending against social engineering and technical threats Gardner, Bill G.,Thomas, Valerie
628 cover Building an information security awareness program : defending against social engineering hacks [1 ed.] Bill Gardner 1
629 cover Cloud storage security : a practical guide [1 ed.] Wheeler, Aaron, Winburn, Michael 1
630 cover Cloud storage security a practical guide [Online-Ausg ed.] Wheeler, Aaron,Winburn, Michael
631 cover CISSP Study Guide [2nd ed] Feldman, Joshua, Misenar, Seth, Conrad, Eric,Seth Misenar,Joshua Feldman,Kevin Riggins 2
632 cover Computer Fraud & Security Journel
633 cover Computer Security in Financial Organisations J. Essinger (Auth.)
634 cover Computer Security David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick and Robert L. Ashenhurst (Auth.)
635 cover Computer Security [2nd ed.] John M. Carroll (Auth.) 2
636 cover Computers, Business, and Security. The New Role for Security James A Schweitzer (Auth.)
637 cover Cybersecurity and Applied Mathematics Casey, William,Metcalf, Leigh,William Casey
638 cover Cyber Security Awareness for CEOs and Management [1 ed.] Dalziel, Henry, Willson, David 1
639 cover Data Breach Preparation and Response Fowler, Kevvie
640 cover Data Protection and Security for Personal Computers. A Manager's Guide to Improving the Confidentiality, Availability and Integrity of Data on Personal Computers and Local Area Networks R. Schifreen (Auth.)
641 cover Data breach preparation and response - breaches are certain, impact is not Fowler, Kevvie (partner And National Cyber Response Leader
642 cover Data hiding fundamentals and applications : content security in digital media Husrev T Sencar, Ramkumar Mahalingam., Ali N Akansu
643 cover Cyber Security Awareness for Corporate Directors and Board Members Willson, David, Dalziel, Henry
644 cover Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols Hosmer, Chet,Raggo, Michael T.,McGrew, Wesley
645 cover Detecting and Combating Malicious Email [1 ed.] Julie JCH Ryan, Cade Kamachi 1
646 cover Digital forensics : threatscape and best practices [1 ed.] Sammons, John 1
647 cover Digital Forensics with Open Source Tools Altheide, Cory,Carvey, Harlan A.,Davidson, Ray
648 cover Digital Identity Management [1 ed.] Maryline Laurent, Samia Bouzefrane 1
649 cover Digital.Investigation.February
650 cover Dissecting the hack : the v3rb0ten network [1 ed.] Baskin, Brian, Martin, Brian, Sims, Kristin, Street, Jayson E 1
651 cover Firewalls: jumpstart for network and systems administrators John R Vacca, Scott Ellis
652 cover Eleventh Hour CISSP Study Guide [2 ed.] Conrad, Eric,Misenar, Seth,Feldman, Joshua,Riggins, Kevin 2
653 cover Eleventh Hour CISSP [3rd edition] Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman 3
654 cover Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Sudhanshu Chauhan, Nutan Kumar Panda
655 cover Handbook of Social Media Use Online Relationships, Security, Privacy, and Society Volume 2 John McAlaney,
656 cover How to Cheat at Configuring Open Source Security Tools [1 ed.] Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson 1
657 cover How to Cheat at Configuring Open Source Security Tools Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
658 cover Implementing digital forensic readiness: from reactive to proactive process Ivtchenko, Dmitri,Sachowski, Jason
659 cover Implementing database security and auditing : a guide for DBAs, information security administrators and auditors Ron Ben-Natan
660 cover Insider threat: prevention, detection, mitigration, and deterrence Turner, James,Gelles, Michael G
661 cover Information security science: measuring the vulnerability to data compromises Young, Carl S
662 cover Information Security. Playbook [1 ed.] Greg Kane and Lorna Koppel (Eds.) 1
663 cover Infosec Management Fundamentals [1 ed.] Dalziel, Henry 1
664 cover Information Security [First Edition] Marvin Zelkowitz
665 cover Introduction to cyber-warfare: a multidisciplinary approach [1 ed.] Paulo Shakarian, Jana Shakarian, Andrew Ruef 1
666 cover Introduction to US Cybersecurity Careers Dalziel, Max
667 cover Job reconnaissance: using hacking skills to win the job hunt game [1 ed.] Josh More 1
668 cover Elsevier's Dictionary of Information Security [Mul ed.] G. Manoilov, B. Radichkova
669 cover How to defeat advanced malware new tools for protection and forensics Crosby, Simon,Dalziel, Henry
670 cover Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis Baird, John,Shavers, Brett
671 cover Low Tech Hacking: Street Smarts for Security Professionals Gudaitis, Terry,Jabbusch, Jennifer,Lowther, Sean,Rogers, Russ,Wiles, Jack
672 cover Lossless Information Hiding in Images [1 ed.] Zhe-Ming Lu, Shi-Ze Guo 1
673 cover Managing online risk : apps, mobile, and social media security [1 ed.] Deborah Gonzalez 1
674 cover America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare Joel Brenner
675 cover Mobile Malware Attacks and Defense Ken Dunham
676 cover Network and System Security [2nd ed] Vacca, John R 2
677 cover No Tech Hacking Long, Johnny, Mitnick, Kevin D.
678 cover Ninja Hacking Unconventional Penetration Testing Tactics and Techniques Thomas Wilhelm, Jason Andress, Bryan (con) Garner
679 cover PCI Compliance [3rd edition] Chuvakin, Anton,Williams, Branden 3
680 cover PCI DSS 3.1. The Standard That Killed SSL [1 ed.] Williams, Branden R 1
681 cover Penetration tester's open source toolkit Faircloth, Jeremy 3
682 cover PCI Compliance [4th edition] Williams, Branden R.,Chuvakin, Anton.,Anton A. Chuvakin,Derek Milroy 4
683 cover Penetration Tester's Open Source Toolkit [4th edition] Faircloth, Jeremy,Rogers, T. Michael 4
684 cover Physical Security for IT Michael Erbschloe
685 cover Physical Security Guidelines. Template [1 ed.] Bob Hayes (Eds.) 1
686 cover Practical anonymity: hiding in plain sight online [1 ed.] Peter Loshin 1
687 cover Practical anonymity hiding in plain sight online Loshin, Peter
688 cover Preparing for Next Generation Security Leader Opportunities. Proven Practices Bob Hayes (Auth.)
689 cover Professional Penetration Testing. Creating and Operating a Formal Hacking Lab Thomas Wilhelm
690 cover Professional penetration testing: creating and learning in a hacking lab [2 ed.] Thomas Wilhelm 2
691 cover Protecting Information on Local Area Networks James A Schweitzer (Auth.)
692 cover Professional Penetration Testing [1st edition] Wilhelm, Thomas 1
693 cover Securing the Cloud: Cloud Computer Security Techniques and Tactics [1st ed.] Graham Speake, Patrick Foxhoven 1
694 cover Securing the cloud : cloud computer security techniques and tactics J R Winkler
695 cover Securing Social Media in the Enterprise [1 ed.] Dalziel, Henry 1
696 cover Security operations center guidebook - a practical guide for a successful s Mccoy, Scott (cpp Cissp Asis International (isc)2)
697 cover Security Leader Insights for Information Protection. Lessons and Strategies from Leading Security Professionals [1 ed.] Bob Fahy 1
698 cover Security controls evaluation, testing, and assessment handbook Johnson, Leighton
699 cover Securing SQL Server [3rd edition] Cherry, Denny 3
700 cover Security Leadership of the Future. Article Collection [1 ed.] Bob Hayes (Eds.) 1
701 cover Securing the Smart Grid: Next Generation Power Grid Security Tony Flick, Justin Morehouse
702 cover Seven Deadliest USB Attacks
703 cover Seven Deadliest Wireless Technologies Attacks Brad Haines (Auth.)
704 cover Seven deadliest social networks attacks Perez, Richard,Timm, Carl
705 cover Simple steps to data encryption: a practical guide to secure computing Loshin, Peter
706 cover Smart Grid Security. Innovative Solutions for a Modernized Grid [1 ed.] Florian Skopik, Paul Dr. Smith 1
707 cover Smart Cities Cybersecurity and Privacy Danda B. Rawat (editor), Kayhan Zrar Ghafoor (editor)
708 cover Smart Security : Proven Practices Quilter, J. David
709 cover Smart Security: Practices That Increase Business Profits. Proven Practices J. David Quilter (Auth.)
710 cover Social engineering penetration testing executing social engineering pen tests, assessments and defense Ackroyd, Richard,Mason, Andrew,Watson, Gavin
711 cover SQL injection attacks and defense Description based on print version record Clarke, Justin
712 cover The Basics of Information Security [2nd edition] Andress, Jason 2
713 cover The basics of hacking and penetration testing: ethical hacking and penetration testing made easy [2nd Edition] Engebretson, Patrick,David Kennedy 2
714 cover The basics of hacking and penetration testing: ethical hacking and penetration testing made easy Broad, James, Engebretson, Patrick Henry
715 cover The Basics of Information Security. Understanding the Fundamentals of Infosec in Theory and Practice [2 ed.] Jason Andress (Auth.) 2
716 cover Trojans, Worms, And Spyware A Computer Security Professional's Guide To Malicious Code
717 cover Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments Diane Barrett, Greg Kipper
718 cover Voice over Internet Protocol (VoIP) Security PhD, CISM, CISSP, James F. Ransome, PhD, CISM, John Rittinghouse
719 cover Wireless reconnaissance in penetration testing [recurso electrónico] Hamerstone, Alex,Neely, Matthew,Sanyk, Chris
720 cover Wireless reconnaissance in penetration testing [1 ed.] Neely, Matthew, Sanyk, Chris, Hamerstone, Alex 1
721 cover The History of Information Security: A Comprehensive Handbook Karl Maria Michael de Leeuw, Jan Bergstra
722 cover The Manager's Handbook for Business Security [2 ed.] George Campbell (Eds.) 2
723 cover Theoretical and Experimental Methods for Defending Against DDOS Attacks [1 ed.] Amiri, Iraj Sadegh, Soltanian, Mohammad Reza Khalifeh 1
724 cover Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals Paul Mungo
725 cover Prying Eyes : Protect Your Privacy From People Who Sell to You, Snoop on You, or Steal From You Eric Gertler
726 cover The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats Clarke, Richard Alan,Knake, Robert K
727 cover Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility Andrew Jones, Craig Valli
728 cover Cyber-Attacks and the Exploitable Imperfections of International Law [1 ed.] Yaroslav Radziwill 1
729 cover Cybersecurity (Computer Science Fundamentals) Edet, Theophilus
730 cover Cyber Attacks: Protecting National Infrastructure [1 ed.] Edward Amoroso 1
731 cover From Lambda calculus to cybersecurity through program analysis
732 cover Hacker: Hack The System: The "Ethical" Python Hacking Guide [4 ed.] Takehiro Kanegi, Alice Schwartz 4
733 cover Information Assurance: Managing Organizational IT Security Risks [1st ed.] Joseph Boyce Employee of the Department of Defense, Daniel Jennings Information Systems Security Manager European Command (EUCOM) 1
734 cover Information Governance and Security: Protecting and Managing Your Company's Proprietary Information John G. Iannarelli, Michael O'Shaughnessy
735 cover Managing Online Risk Apps, Mobile, and Social Media Security Deborah Gonzalez
736 cover Networked Control Systems: Cloud Control and Secure Control Magdi S. Mahmoud, Yuanqing Xia
737 cover Risk management for computer security : Protecting your network and information assets Andy Jones, Debi Ashenden
738 cover The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program [2 ed.] Gerald L. Kovacich CFE CPP CISSP 2
739 cover Seven Deadliest Web Application Attacks Shema, Mike
740 cover Hackers. au cœur de la résistance numérique Guiton Amaelle
741 cover The darkening web: the war for cyberspace Klimburg, Alexander
742 cover The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats [Original retail ed.] Richard A. Clarke, Robert K. Knake
743 cover The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War Geoff White
744 cover The Trust Manifesto: What you Need to do to Create a Better Internet Damian Bradfield
745 cover Cyber Arms; Security in Cyberspace Martellini, Stanislav Abaimov, Maurizio
746 cover Cyber Wars Charles Arthur
747 cover Hackear al hacker Roger A. Grimes
748 cover Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra
749 cover Linux Firewalls Michael Rash
750 cover Next Level Cybersecurity: Detect the Signals, Stop the Hack Huda, Sai
751 cover Next Level Cybersecurity: Detect the Signals, Stop the Hack Sai Huda
752 cover Tout ce qu'il faut savoir pour protéger votre vie privée sur Internet David, Daniel-Jean
753 cover Gray Hat Hacking: The Ethical Hacker's Handbook [2nd edition] Safari, an O'Reilly Media Company., Eagle, Chris, Harper, Allen, Harris, Shon, Ness, Jonathan 2
754 cover AI Assurance: Towards Trustworthy, Explainable, Safe, and Ethical AI Feras A. Batarseh, Laura Freeman
755 cover Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) [1 ed.] Andrew A. Bochman, Sarah Freeman 1
756 cover Network Security with OpenSSL: Cryptography for Secure Communications John Viega, Matt Messier, Pravir Chandra
757 cover Practical Unix & Internet Security, 3rd Edition [3 ed.] Simson Garfinkel, Gene Spafford, Alan Schwartz 3
758 cover Managing Security with Snort & IDS Tools Gerg, Christopher,Cox, Kerry J
759 cover Network Security Tools [1 ed.] Nitesh Dhanjani, Justin Clarke 1
760 cover Internet Forensics R Jones
761 cover Network Security Assessment: Know Your Network Chris McNab
762 cover Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks [1 ed.] Chris Fry, Martin Nystrom 1
763 cover Snort Cookbook Biles, Simon,Orebaugh, Angela,Babbin, Jacob
764 cover Network Security Hacks [Second Edition] Andrew Lockhart
765 cover 97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts [1 ed.] Christina Morillo 1
766 cover Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware [1 ed.] Cassie Crossley 1
767 cover Policy as Code: Improving Cloud Native Security [1 ed.] Jimmy Ray 1
768 cover Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security [1 ed.] Russ Miles, Stephen Giguere, Taylor Smith 1
769 cover Cloud Native Security Cookbook: Recipes for a Secure Cloud [1 ed.] Josh Armitage 1
770 cover Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications Brendan Creane
771 cover Defensive Security Handbook: Best Practices for Securing Infrastructure [2 ed.] Amanda Berlin, Lee Brotherston, William Reyor III 2
772 cover Adversary Emulation with MITRE ATT&CK: Bridging the Gap between the Red and Blue Teams Drinor Selmanaj
773 cover Intelligence-Driven Incident Response: Outwitting the Adversary [2 ed.] Rebekah Brown, Scott Roberts 2
774 cover Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking [2 ed.] Ric Messier 2
775 cover Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust [1 ed.] Ev Kontsevoy, Sakshyam Shah, Peter Conrad 1
776 cover Web Application Security: Exploitation and Countermeasures for Modern Web Applications [2 ed.] Andrew Hoffman 2
777 cover Building a Cyber Risk Management Program: Evolving Security for the Digital Age [1 ed.] Brian Allen, Brandon Bapst, Terry Allan Hicks 1
778 cover Network Security Through Data Analysis: Building Situational Awareness [1 ed.] Michael Collins 1
779 cover JUNOS Security [1 ed.] Rob Cameron, Brad Woodberg, Timothy Eberhard, Patricio Giecco, James Quinn 1
780 cover Junos Security: A Practical Guide to Junos Enterprise Services Gateways, Software, and Certification Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, James Quinn
781 cover Network Security Assessment: Know Your Network [3 ed.] Chris McNab 3
782 cover Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems [Paperback ed.] Josiah Dykstra
783 cover Intelligence-Driven Incident Response: Outwitting the Adversary [1 ed.] Scott J. Roberts, Rebekah Brown 1
784 cover In Search of Certainty: The Science of Our Information Infrastructure [2 ed.] Mark Burgess 1
785 cover Defensive Security Handbook: Best Practices for Securing Infrastructure [1 ed.] Lee Brotherston, Amanda Berlin 1
786 cover Network Security Through Data Analysis: From Data to Action [2 ed.] Michael Collins 2
787 cover Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line [Original retail ed.] Paul Troncone, Carl Albing
788 cover Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan [1 ed.] Jeff Bollinger, Brandon Enright, Matthew Valites 1
789 cover The Cybersecurity Manager's Guide: The Art of Building Your Security Program [1 ed.] Todd Barnum 1
790 cover Zero Trust Networks [2 ed.] Razi Rais, Christina Morillo, Evan Gilman, Doug Barth 2
791 cover Cyber Sovereignty: The Future of Governance in Cyberspace [1 ed.] Lucie Kadlecová 1
792 cover Protecting Networks with SATAN [1st English ed.] Martin Freiss 1
793 cover Practical Unix and Internet Security, 2nd Edition [Second Edition] Simson Garfinkel, Gene Spafford PH.D.
794 cover Sicherheit im Internet 3. Auflage - O'Reilly Basics [3 ed.] Krzysztof Janowicz 3
795 cover Hacking Exposed 7, 7th Edition [7th edition] Safari, an O'Reilly Media Company., Kurtz, George, McClure, Stuart, Scambray, Joel 7
796 cover Kenne deinen Feind. Fortgeschrittene Sicherheitstechniken Anton Chuvakin
797 cover Computer Security Fundamentals, 4th Edition [1st edition] Safari, an O'Reilly Media Company., Easttom, Chuck 1
798 cover The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [2nd edition] Safari, an O'Reilly Media Company., Engebretson, Patrick 2
799 cover Network Security Hacks [1st ed.] Andrew Lockhart 1
800 cover Network Security Assessment [1st ed.] Chris McNab 1
801 cover Network Security Assessment (2007)(2nd)(en)(478s) [2 ed.] Chris McNab 2
802 cover Network security assessment [2nd ed] Chris McNab 2
803 cover Inside cyber warfare: mapping the cyber underworld Carr, Jeffrey
804 cover CompTIA PenTest+ Cert Guide, First Edition [1st edition] Safari, an O'Reilly Media Company., Santos, Omar, Taylor, Ron 1
805 cover Defensive Security Handbook, 2nd Edition Lee Brotherston, Amanda Berlin
806 cover Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) [3 ed.] Kim Crawley 3
807 cover Building a Cyber Risk Management Program Brian Allen
808 cover The Developer's Playbook for Large Language Model Security Steve Wilson
809 cover Ransomware and Data Extortion Ryan Golden, Anthony M. Freed
810 cover Intelligence-Driven Incident Response, 2nd Edition (5th Early Release) [2 ed.] Rebekah Brown and Scott J. Roberts 2
811 cover Software Supply Chain Security (First Early Release) [1 ed.] Cassie Crossley 1
812 cover Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (2nd Early Release) Kim Crawley
813 cover Ransomware and Data Extortion (for True Epub) Ryan Golden, Anthony M. Freed
814 cover Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition [3 ed.] Jeffrey Caruso 3
815 cover Managing the Insider Threat: No Dark Corners [1st edition] Safari, an O'Reilly Media Company., Catrantzos, Nick 1
816 cover Network Security Assessment: Know Your Network [3rd ed.] Chris McNab 3
817 cover Identity and data security for web development: best practices [First edition] LeBlanc, Jonathan,Messerschmidt, Tim
818 cover Network Security Tools Clarke, Justin,Dhanjani, Nitesh
819 cover Sharing big data safely managing data security [First edition (Online-Ausg.)] Dunning, Ted,Friedman, B. Ellen
820 cover Practical Cloud Security, 2nd Edition (Third Early Release) [2 ed.] Chris Dotson 2
821 cover Ransomware. Defending Against Digital Extortion Allan Liska, Timothy Gallo
822 cover Tyrants on Twitter: Protecting Democracies from Information Warfare David L. Sloss
823 cover Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition [2nd edition] O'Reilly for Higher Education (Firm), Bryce, Chapin, Miller, Preston 2
824 cover Cybercrime: Wie Sie Gefahren im Internet erkennen und sich schützen Jürgen Schuh
825 cover Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA [1 ed.] Denise Nicholson (eds.) 1
826 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition [5th edition.] Matt Walker, Safari, an O'Reilly Media Company. 5
827 cover Is Someone Watching You Online NOW?: Online Surveillance Ng, Freeman
828 cover Blocking Spam & Spyware For Dummies [1 ed.] Peter H. Gregory, Mike Simon 1
829 cover Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15–17, 2019, Proceedings [1st ed.] Simon N. Foley 1
830 cover Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers [1 ed.] Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgerald (eds.) 1
831 cover Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World [2 ed.] Simon Chesterman 2
832 cover Configuring Check Point NGX VPN-1 Firewall-1 [1 ed.] Robert Stephens, Barry Stiefel, Stephen Watkins, Simon Desmeules, Eli Faskha 1
833 cover Digital Forensic Investigation of Internet of Things (IoT) Devices [1st ed.] Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson 1
834 cover Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level [1 ed.] Robert M. Clark, Simon Hakim (eds.) 1
835 cover Hacking Hacking Practical Guide for Beginners (Hacking With Python) Jeff Simon
836 cover El arte de la intrusión: cómo ser un hacker o evitarlos Kevin D Mitnick, William L Simon
837 cover Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach [1st ed.] Simon Parkinson, Andrew Crampton, Richard Hill 1
838 cover L’art de la supercherie Kevin Mitnick, William L. Simon
839 cover Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers [1 ed.] Simon Meurer, Roland Wismüller (auth.), Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian (eds.) 1
840 cover Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation David Routin, Simon Thoores, Samuel Rossier
841 cover The art of deception: controlling the human element of security [1 ed.] Kevin D. Mitnick, William L. Simon, Steve Wozniak 1
842 cover The art of intrusion : the real stories behind the exploits of hackers, intruders, & deceivers Kevin D Mitnick, William L Simon
843 cover The Art of Deception: Controlling the Human Element of Security Kevin D. Mitnick, William L. Simon, Steve Wozniak
844 cover The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers [1 ed.] Kevin D. Mitnick, William L. Simon 1
845 cover Becoming an Ethical Hacker Gary Rivlin
846 cover Application Security Program Handbook Derek Fisher,
847 cover Cybersecurity in Finance: Getting the Policy Mix Right Sylvain Bouyon, Simon Krause
848 cover Techo-Security in an Age of Globalization: Perspectives From the Pacific Rim Denis Fred Simon
849 cover The Art of Deception: Controlling the Human Element of Security Kevin David Mitnick &, William L. Simon
850 cover The NSA Hack and its Implications Simon Luria
851 cover Net Neutrality: Towards a Co-regulatory Solution Christopher T. Marsden
852 cover Security in Cyberspace: Targeting Nations, Infrastructures, Individuals Giampiero Giacomello (editor)
853 cover Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future Aaron Mauro
854 cover The Hidden Potential of DNS in Security Joshua M. Kuo, Ross Gibson
855 cover Cyber Operations Building, Defending, and Attacking Modern Computer Networks [2nd edition] O'Leary, Mike 2
856 cover Professional Red Teaming: Conducting Successful Cybersecurity Engagements Oakley, Jacob G
857 cover Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program [2 ed.] Ryan Leirvik 2
858 cover DNS Security for Dummies [Infoblox special edition] Joshua M. Kuo, Robert Nagy, Cricket Liu
859 cover Personal Cybersecurity. How to avoid and recover from Cybercrime Marvin Waschke
860 cover Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence Kevin Cardwell
861 cover Managing Risk and Information Security: Protect to Enable [2 ed.] Malcolm W. Harkins (auth.) 2
862 cover Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies [3 ed.] Carey Parker 3
863 cover Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide Luis Ayala (auth.)
864 cover Cyber Operations: Building, Defending, and Attacking Modern Computer Networks [1 ed.] Mike O'Leary 1
865 cover The New School of Information Security [1 ed.] Adam Shostack, Andrew Stewart 1
866 cover Managing Risk and Information Security: Protect to Enable Malcolm Harkins
867 cover Security and Privacy for Modern Networks : Strategies and Insights for Safeguarding Digital Infrastructures Seshagirirao Lekkala, Priyanka Gurijala
868 cover Beginning Ethical Hacking with Python Sinha, Sanjib
869 cover Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed Yuri Diogenes
870 cover Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment [1st ed.] Dan Blum 1
871 cover Practical Information Security Management A Complete Guide to Planning and Implementation Tony Campbell
872 cover Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats [1 ed.] Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 1
873 cover Cybersecurity for Space: Protecting the Final Frontier [1st ed.] Jacob G. Oakley 1
874 cover Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents [Paperback ed.] Eric C. Thompson
875 cover How to Catch a Phish: A Practical Guide to Detecting Phishing Emails [1 ed.] Nicholas Oles 1
876 cover Implementing An Information Security Management System: Security Management Based On ISO 27001 Guidelines Abhishek Chopra, Mukund Chaudhary
877 cover The Manager’s Guide to Web Application Security:: A Concise Guide to the Weaker Side of the Web [1 ed.] Ron Lepofsky (auth.) 1
878 cover Linux Firewalls mit iptables & Co. Ralf Spenneberg
879 cover Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources [1 ed.] Morey J. Haber, Brian Chappell, Christopher Hills 1
880 cover Honeypots for Windows [1 ed.] Roger A. Grimes (auth.) 1
881 cover The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team Jacob G. Oakley, Michael Butler
882 cover Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls Jason Edwards
883 cover The InfoSec Handbook: An Introduction to Information Security [1st ed.] Umesha Nayak, Umesh Rao 1
884 cover Protective Security: Creating Military-Grade Defenses For Your Digital Business [1st Edition] James Seaman 1
885 cover The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things [1 ed.] Aditya Gupta 1
886 cover Managing risk and information security [2nd edition] Malcolm W. Harkins 2
887 cover Advanced Persistent Training : Take Your Security Awareness Program to the Next Level [1 ed.] Jordan Schroeder (auth.) 1
888 cover Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies [5 ed.] Carey Parker 5
889 cover Handbuch IT-Sicherheit : Strategien, Grundlagen und Projekte Walter Gora
890 cover Android Apps Security Sheran Gunasekera
891 cover Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server [1 ed.] Robert La Lau 1
892 cover Penetration Testing Basics: a Quick-Start Guide to Breaking into Systems Messier, Ric
893 cover Cube Farm [1 ed.] Bill Blunden (auth.) 1
894 cover iOS Penetration Testing A Definitive Guide to iOS Security Kunal Relan
895 cover Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Chet Hosmer
896 cover Abenteuer Kryptologie : Methoden, Risiken und Nutzen der Datenverschlüsselung [3., überarb. Aufl] Reinhard Wobst 3
897 cover Cybersecurity Essentials: Practical Tools for Today's Digital Defenders Kodi A. Cochran
898 cover Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations [1 ed.] Morey J. Haber,Brad Hibbert (auth.) 1
899 cover Cryptography and Data Security Dorothy Elizabeth Robling Denning
900 cover Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security [2nd ed.] Marshall Copeland, Matthew Jacobs 2
901 cover Pci Dss: An Integrated Data Security Standard Guide [1 ed.] Jim Seaman 1
902 cover Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [2 ed.] Tyler Wall, Jarrett Rodrick 2
903 cover Network Security: Private Communication in a Public World (Prentice Hall Series in Computer Networking and Distributed Systems) [3 ed.] Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner 3
904 cover The No-Nonsense Guide for CISOs and Security Managers Aaron Roberts
905 cover Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program [1 ed.] Ryan Leirvik 1
906 cover Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers [1st ed.] Sreejith Keeriyattil 1
907 cover Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions [1st ed.] Paul Rohmeyer, Jennifer L. Bayuk 1
908 cover Digital Archaeology: The Art and Science of Digital Forensics [1 ed.] Michael W. Graves 1
909 cover Enterprise Cybersecurity Study Guide [1st ed.] Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 1
910 cover 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy [1 ed.] Daniel G. Bachrach, Eric J. Rzeszut (auth.) 1
911 cover Privacy in the Age of Innovation: AI Solutions for Information Security Ranadeep Reddy Palle, Krishna Chaitanya Rao Kathala
912 cover Enterprise Cyber Risk Management as a Value Creator : Leverage Cybersecurity for Competitive Advantage Bob Chaput
913 cover Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment [1st ed.] Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler 1
914 cover Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu
915 cover Cybersecurity Lexicon [1 ed.] Luis Ayala (auth.) 1
916 cover Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks [1 ed.] Gunikhan Sonowal 1
917 cover PCI DSS: An Integrated Data Security Standard Guide Jim Seaman
918 cover Identity Attack Vectors: Strategically Designing And Implementing Identity Security [2 ed.] Morey J. Haber, Darran Rolls 2
919 cover Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records [1 ed.] Bernard Peter Robichau 1
920 cover 70 Tips and Tricks for Mastering the CISSP Exam [1st ed.] R. Sarma Danturthi 1
921 cover Cybersecurity for Space: A Guide to Foundations and Challenges [2 ed.] Jacob G. Oakley 2
922 cover Securing PHP Apps [1 ed.] Ben Edmunds (auth.) 1
923 cover Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information [1 ed.] Eric C. Thompson (auth.) 1
924 cover Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing [1 ed.] Ahmed Sheikh 1
925 cover Snowflake Security: Securing Your Snowflake Data Cloud [1 ed.] Ben Herzberg, Yoav Cohen 1
926 cover Linux® firewalls: enhancing security with nftables and beyond [4th edition] Addison-Wesley.,Suehring, Steve 4
927 cover Theoretical Cybersecurity: Principles and Advanced Concepts Jacob G. Oakley, Michael Butler, Matthew Puckett, J. Louis Sewell, Wayne York
928 cover Lesson-Based Review of Ethical Hacking and Penetration Testing Ahmed Sheikh
929 cover Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention [1 ed.] Luis Ayala (auth.) 1
930 cover Certified Ethical Hacker (CEH) Foundation Guide [1 ed.] Sagar Ajay Rahalkar (auth.) 1
931 cover Big Breaches: Cybersecurity Lessons for Everyone Neil Daswani, Moudy Elbayadi
932 cover Discovering Cybersecurity: A Technical Introduction For The Absolute Beginner [1 ed.] Seth James Nielson 1
933 cover Privileged Attack Vectors: Building Effective Cyber-defense Strategies to Protect Organizations [2 ed.] Morey J. Haber 2
934 cover The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management Arthur B. Cooper Jr., Jeff Hall, David Mundhenk, Ben Rothke
935 cover NTP Security: A Quick-Start Guide [1 ed.] Allan Liska (auth.) 1
936 cover Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center [1 ed.] Marshall Copeland (auth.) 1
937 cover Algebra for Secure and Reliable Communication Modeling Mustapha Lahyane, Edgar Martinez-moro
938 cover The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War [1 ed.] Steve Grobman, Allison Cerra (auth.) 1
939 cover Pirates de l’informatique : enquête sur les hackers français Blanchard, Philippe
940 cover Firewall Policies And VPN Configurations [1 ed.] Laura E. Hunter 1
941 cover Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations [1 ed.] Iwan Hoogendoorn 1
942 cover The Myths of Security: What the Computer Security Industry Doesn't Want You to Know John Viega
943 cover Android Apps Security: Mitigate Hacking Attacks and Security Breaches [2nd ed.] Sheran Gunasekera 2
944 cover Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners [1 ed.] Alexander J. Roxon 1
945 cover Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success [1 ed.] Tyler Wall, Jarrett Rodrick 1
946 cover A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities [1st ed.] Sagar Rahalkar 1
947 cover Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services Puthiyavan Udayakumar
948 cover Mastering Cybersecurity: Strategies, Technologies, and Best Practices [1 ed.] Jason Edwards 1
949 cover Internet Babylon: Secrets, Scandals, and Shocks on the Information Superhighway [1 ed.] Greg Holden (auth.) 1
950 cover Firewalls Don’t Stop Dragons: A Step-by-Step Guide To Computer Security And Privacy For Non-Techies [4th Edition] Carey Parker 4
951 cover Ransomware Revealed: A Beginner’s Guide To Protecting And Recovering From Ransomware Attacks Nihad A. Hassan
952 cover System Administration Ethics: Ten Commandments For Security And Compliance In A Modern Cyber World Igor Ljubuncic, Tom Litterer
953 cover The Passion of Bradley Manning: The Story of the Suspect Behind the Largest Security Breach in U.S. History Chase Madar
954 cover Full Stack Python Security: Cryptography, TLS, and attack resistance Dennis Byrne
955 cover CCNA cyber ops SECOPS #210-255 official cert guide Santos, Omar,Joseph Muniz,Stefano De Crescenzo
956 cover Network defense and countermeasures principles and practices [2nd ed] Easttom, Chuck 2
957 cover Linux Essentials for Cybersecurity (for True EPUB) William “Bo” Rothwell, Denise Kinsey
958 cover Democracy in danger. How hackers and activists exposed fatal flaws in the election system Jake Braun
959 cover Self-Sovereign Identity: Decentralized digital identity and verifiable credentials [1 ed.] Alex Preukschat, Drummond Reed 1
960 cover Cybersecurity Career Guide Alyssa Miller
961 cover Hacked: The Inside Story Of America's Struggle To Secure Cyberspace [1 ed.] Charlie Mitchell 1
962 cover The Unhackable Internet Thomas P. Vartanian,
963 cover CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam - The How To Pass on Your First Try Certification Study Guide William Manning
964 cover Facing Cyber Threats Head on: Protecting Yourself and Your Business Brian Minick
965 cover Personal Firewalls for Administrators and Remote Users [1st ed.] Lisa Yeo 1
966 cover Securing Devops: Safe Services in the Cloud [1 ed.] Julien Vehent 1
967 cover CCIE Security Exam Certification Guide Henry Benjamin
968 cover Building Secure and Reliable Network Applications [1st ed.] Kenneth P Birman 1
969 cover CCNA Cyber Ops SECFND 210-250 official cert guide De Crescenzo, Stefano,Muniz, Joseph,Santos, Omar
970 cover Secure By Design Daniel Deogun, Dan Bergh Johnsson, Daniel Sawano
971 cover CCNA Security Portable Command Guide Bob Vachon
972 cover Constructing cybersecurity: Power, expertise and the internet security industry (Manchester University Press) Andrew Whiting
973 cover The Art of Network Penetration Testing: Taking over any company in the world Royce Davis
974 cover Information Security Management [2 ed.] Michael Workman 2
975 cover Cryptography In The Database: The Last Line Of Defense Kevin Kenan
976 cover Managing Information Risks: Threats, Vulnerabilities, and Responses Saffady, William
977 cover Cybersecurity and Information Security Analysts: A Practical Career Guide Kezia Endsley
978 cover 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them [2nd Edition] Weisman, Steve 2
979 cover CISSP Cert Guide [3rd ed.] ROBIN ABERNATHY, TROY McMILLAN 3
980 cover Governing Cyberspace: Behavior, Power, and Diplomacy Dennis Broeders (editor), Bibi van den Berg (editor)
981 cover Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family Theresa M. Payton, Ted Claypoole
982 cover Cybersecurity And Human Rights In The Age Of Cyberveillance [1 ed.] Joanna Kulesza, Roy Balleste 1
983 cover Making Sense of Cybersecurity Thomas Kranz
984 cover Protecting Student Data Privacy: Classroom Fundamentals Linnette Attai
985 cover Exploring Careers in Cybersecurity and Digital Forensics Lucy K. Tsado, Robert Osgood
986 cover Hack by Dmitry Samarov [1ST ed.] Dmitry Samarov 1
987 cover Data Privacy: A runbook for engineers NISHANT BHAJARIA
988 cover The Art of Network Penetration Testing: How to take over any company in the world [1 ed.] Royce Davis 1
989 cover End-To-End Network Security: Defense-In-Depth Santos, Omar
990 cover API Security in Action [1 ed.] Neil Madden 1
991 cover Information security: principles and practices [2nd edition] Breithaupt, Jim,Merkow, Mark S 2
992 cover Application Security Program Handbook: A guide for software engineers and team leaders Derek Fisher
993 cover Democracy in Danger: How Hackers and Activists Exposed Fatal Flaws in the Election System Jake Braun
994 cover Cyber insecurity: navigating the perils of the next information age Harrison, Richard M.,Herr, Trey
995 cover Pearson Education: Certified Ethical Hacker (CEH) Version 10 (Certification Guide) [3 ed.] Pearson Education, Omar Santos, Michael Gregg 3
996 cover Casting Light On The Dark Web: A Guide For Safe Exploration Matthew Beckstrom, Brady Lund
997 cover Microsoft Azure Security Center Yuri Diogenes, Tom Shinder
998 cover Privacy in the age of big data: recognizing threats, defending your rights, and protecting your family [1st paperback ed] Claypoole, Theodore,Payton, Theresa M 1
999 cover Computer Security: Principles and Practice [Fourth Global edition] Stallings, William, Brown, Lawrie
1000 cover Cisco ASA All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition) Jazib Frahim, Omar Santos, Andrew Ossipov
1001 cover The Black Box Society: The Secret Algorithms That Control Money and Information Frank Pasquale
1002 cover The Hacker And The State: Cyber Attacks And The New Normal Of Geopolitics [1st Edition] Ben Buchanan 1
1003 cover The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
1004 cover A Leader’s Guide to Cybersecurity: Why Boards Need to Lead–and How to Do It Thomas J. Parenty, Jack J. Domet
1005 cover TECHNOLOGY AS SECURITY Declan McCullagh
1006 cover Cybersecurity: The Insights You Need from Harvard Business Review Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg, Roman V. Yampolskiy
1007 cover The U.S. Cybersecurity and Intelligence Analysis Challenges John Michael Weaver
1008 cover Digitalisation and Human Security: A Multi-Disciplinary Approach to Cybersecurity in the European High North [1st ed.] Mirva Salminen, Gerald Zojer, Kamrul Hossain 1
1009 cover Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices Joseph MacMillan
1010 cover Digital Platform Regulation: Global Perspectives on Internet Governance (Palgrave Global Media Policy and Business) Terry Flew (editor), Fiona R. Martin (editor)
1011 cover Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative Perspectives Gertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo
1012 cover Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry: A Comparative Study within the G-20 Felix I. Lessambo
1013 cover The Turn to Infrastructure in Internet Governance Francesca Musiani, Derrick L. Cogburn, Laura DeNardis, Nanette S. Levinson (eds.)
1014 cover A Closer Look at Cybersecurity and Cryptanalysis C. Rupa (editor), Sirajuddin (editor)
1015 cover Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism Michael Miller
1016 cover Cyberwarfare: Threats to Critical Infrastructure Kristan Stoddart
1017 cover Cyber Attack Margaret J. Goldstein,Martin Gitlin
1018 cover Computer Security Within Organizations Adrian R. Warman (auth.)
1019 cover Living With Hacktivism: From Conflict to Symbiosis [1 ed.] Vasileios Karagiannopoulos (auth.) 1
1020 cover Countering Cyber Threats to Financial Institutions: A Private and Public Partnership Approach to Critical Infrastructure Protection [1st ed.] Pierre-Luc Pomerleau, David L. Lowery 1
1021 cover Human Privacy In Virtual And Physical Worlds: Multidisciplinary Perspectives [1 ed.] Mary C. Lacity, Lynda Coon 1
1022 cover Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance: Analyzing IANA Transition [1st ed.] Nicola Palladino, Mauro Santaniello 1
1023 cover Cybercrime in the Pandemic Digital Age and Beyond (Palgrave Studies in Cybercrime and Cybersecurity) Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), Laurie Yiu-Chung Lau (editor)
1024 cover Cyber war versus cyber realities : cyber conflict in the international system [1 ed.] Maness, Ryan C., Valeriano, Brandon 1
1025 cover China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
1026 cover Binary bullets : the ethics of cyberwarfare [1 ed.] Allhoff, Fritz, Henschke, Adam, Strawser, Bradley Jay 1
1027 cover The cybersecurity dilemma : hacking, trust, and fear between nations [1 ed.] Buchanan, Ben 1
1028 cover Bulk Collection: Systematic Government Access To Private-Sector Data Fred H. Cate, James X. Dempsey
1029 cover Inside the Enemy's Computer: Identifying Cyber Attackers [1 ed.] Clement Guitton 1
1030 cover Cyberwar. How Russian hackers and trolls helped elect a president - what we don’t, can’t, and do know. Jamieson, Kathleen Hall
1031 cover Breached!: Why Data Security Law Fails and How to Improve It Daniel J. Solove, Woodrow Hartzog
1032 cover Internet governance: infrastructure and institutions Lee A. Bygrave, Jon Bing (editors)
1033 cover Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity Gregory J. Falco, Eric Rosenbach
1034 cover Escalation Dynamics in Cyberspace Erica D. Lonergan,Shawn W. Lonergan,
1035 cover Escalation Dynamics in Cyberspace Erica D. Lonergan, Shawn W. Lonergan
1036 cover Semi-State Actors in Cybersecurity Florian J. Egloff
1037 cover Data Sovereignty: From the Digital Silk Road to the Return of the State Anupam Chander (editor), Haochen Sun (editor)
1038 cover Cyber Persistence Theory: Redefining National Security in Cyberspace Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett
1039 cover Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power Charles D. Freilich, Matthew S. Cohen, Gabi Siboni
1040 cover The Oxford Handbook of Cyber Security Paul Cornish (ed.)
1041 cover Negotiating Internet Governance Roxana Radu
1042 cover Cyber War Will Not Take Place Thomas Rid
1043 cover Lessons From The Identity Trail: Anonymity, Privacy And Identity In A Networked Society [1st Edition] Ian Kerr, Carole Lucock, Valerie Steeves 1
1044 cover Cybersecurity and Cyberwar: What Everyone Needs to Know® [1 ed.] P.W. Singer, Allan Friedman 1
1045 cover Cybersecurity and cyberwar : what everyone needs to know Singer, Peter Warren, Friedman, Allan
1046 cover Cyber-attacks: Effects on UK Companies anon.
1047 cover Access Control and Identity Management (Information Systems Security & Assurance) [3 ed.] Mike Chapple 3
1048 cover Advanced persistent threat : understanding the danger and how to protect your organization [1 ed.] Cole, Eric 1
1049 cover Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies [1st Edition] Ira Winkler and Araceli Treu Gomes (Auth.) 1
1050 cover Advanced Persistent Threat
1051 cover Aggressive Network Self-defense [1 ed.] Neil R. Wyler, Bruce Potter, Chris Hurley 1
1052 cover Aggressive Network Self-Defense [1st ed.] Chris Hurley 1
1053 cover Android Forensics: Investigation, Analysis and Mobile Security for Google Android Hoog, Andrew
1054 cover Android Forensics: Investigation, Analysis and Mobile Security for Google Android [1 ed.] Andrew Hoog 1
1055 cover Antivirus Engines : From Methods to Innovations, Design, and Applications Paul A. Gagniuc
1056 cover Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure [1 ed.] Eric D. Knapp, Raj Samani 1
1057 cover Applied Network Security Monitoring: Collection, Detection, and Analysis [1 ed.] Chris Sanders, Jason Smith 1
1058 cover Applied network security monitoring : collection, detection, and analysis Chris Sanders, Jason Smith
1059 cover AVIEN Malware Defense Guide for the Enterprise David Harley, Ken Bechtel, Michael Blanchard, Henk K. Diemer, Andrew Lee, Igor Muttik, Bojan Zdrnja
1060 cover Audio Content Security. Attack Analysis on Audio Watermarking [1 ed.] Sogand Ghorbani, Iraj Sadegh Amiri 1
1061 cover Black Hat Physical Device Security: Exploiting Hardware and Software [1 ed.] Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services 1
1062 cover Botnets- The Killer Web App
1063 cover Botnets: The Killer Web App Craig Schiller, Jim Binkley, Gadi Evron, Carsten Willems, Tony Bradley, David Harley, Michael Cross
1064 cover Buffer Overflow Attacks: Detect, Exploit, Prevent James C. Foster &, Vitaly Osipov &, Nish Bhalla,Deckard, Jason
1065 cover Building a Practical Information Security Program [1 ed.] Jason Andress, Mark Leary 1
1066 cover Building an Intelligence-Led Security Program [1 ed.] Allan Liska 1
1067 cover Buffer Overflow Attacks: Detect, Exploit, Prevent James C. Foster
1068 cover Building a Practical Information Security Program Jason Andress, Mark Leary
1069 cover Check Point Next Generation Security Administration [1 ed.] Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon 1
1070 cover Check Point NGX R65 Security Administration Ralph Bonnell
1071 cover Check Point™ Next Generation with Application Intelligence Security [1st ed.] Chris Tobkin, Daniel Kligerman 1
1072 cover Check Point NG VPN-1/Firewall-1: Advanced Configuration and Troubleshooting [1 ed.] Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock, Cherie Amon 1
1073 cover Check Point NG VPN-1 FireWall-1 Advanced Configuration and Troubleshooting
1074 cover Check Point NG/AI: Next Generation with Application Intelligence Security Administration [1st ed.] Chris Tobkin, Daniel Kligerman 1
1075 cover CheckPoint NG Security Administration [2 ed.] Dan Kaminsky 2
1076 cover Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity [1st ed.] Dale Liu 1
1077 cover CISSP Study Guide [1 ed.] Eric Conrad, Seth Misenar, Joshua Feldman 1
1078 cover Cisco Security Professional's Guide to Secure Intrusion Detection Systems Baumrucker C.T., Burton J.D., Dentler S.
1079 cover Cisco Security Professionals Guide To Secure Intrusion Detection Systems Ebook [1 ed.] Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky 1
1080 cover CISSP® Study Guide [4 ed.] Eric Conrad, Seth Misenar, Joshua Feldman 4
1081 cover Cisco PIX Firewall Einrichtung und Betrieb einer sicheren Firewall
1082 cover Cisco security specialist's guide to PIX Firewall [1 ed.] Umer Khan, Vitaly Osipov, Mike Sweeney, Woody Weaver 1
1083 cover CISSP Study Guide [3rd edition] Conrad, Eric,Misenar, Seth,Feldman, Joshua,Seth Misenar,Joshua Feldman 3
1084 cover Client-Side Attacks and Defense [1 ed.] Oriyano Sean-Philip, Robert Shimonski 1
1085 cover Client-side Attacks and Defense Oriyano, Sean-Philip,Shimonski, Robert
1086 cover Cisco PIX Firewalls: configure / manage / troubleshoot [2 ed.] Charles Riley (Editor) 2
1087 cover CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E [3 ed.] Ido Dubrawsky, Jeremy Faircloth 3
1088 cover Configuring Juniper Networks NetScreen & SSG Firewalls Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin
1089 cover Configuring SonicWALL firewalls Chris Lathem, Daniel H Bendell, Benjamin W Fortenberry, Kevin Lynn, Joshua Reed
1090 cover Configuring ISA Server 2000 Building Firewalls for Windows 2000 [1 ed.] Thomas Shinder, Debra Littlejohn Shinder, Martin Grasdal 1
1091 cover Configuring Net: Screen Firewalls [1 ed.] Rob Cameron, Christopher Cantrell, Dave Killion, Kevin Russell and Kenneth Tam (Auth.) 1
1092 cover Configuring Sonicwall Firewalls [2 ed.] Charles Riley (Editor) 2
1093 cover Configuring Check Point NGX VPN-1/FireWall-1 [2 ed.] Charles Riley (Editor) 2
1094 cover Configuring NetScreen Firewalls [1 ed.] Rob Cameron 1
1095 cover Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation Ted G. Lewis
1096 cover Cross Site Scripting Attacks [2nd ed.] Jay Beale 2
1097 cover Cyber adversary characterization : auditing the hacker mind Tom Parker, et al
1098 cover Cyber Security and IT Infrastructure Protection John R. Vacca
1099 cover Cyber Security and IT Infrastructure Protection [1 ed.] John R. Vacca 1
1100 cover Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners [2 ed.] Jason Andress and Steve Winterfeld (Auth.) 2
1101 cover Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners [1 ed.] Jason Andress, Steve Winterfeld 1
1102 cover Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard [1 ed.] Brett Shavers 1
1103 cover Cyberwarfare: Information Operations in a Connected World [2 ed.] Mike Chapple, David Seidl 2
1104 cover Cya Securing Exchange Server 2003 & Outlook Web Access
1105 cover CYA Securing IIS 6.0. Cover Your A** by Getting It Right the First Time Chun Hai (Bernard) Cheah, Ken Schaefer and Chris Peiris (Auth.)
1106 cover CYA: Securing Exchange Server 2003 & Outlook Web Access [1st ed.] Henrik Walther, Patrick Santry 1
1107 cover Cyberspaces and Global Affairs Perry, Jake, Costigan, Sean S, Professor
1108 cover Cyber Security Awareness for Accountants and CPAs [1 ed.] David Willson, Henry Dalziel 1
1109 cover Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives [1st ed.] Ted Fair, Michael Nordfelt, Sandra Ring 1
1110 cover Cyber Security Awareness for Lawyers [1 ed.] David Willson, Henry Dalziel 1
1111 cover Cybersecurity and Applied Mathematics [1 ed.] Leigh Metcalf, William Casey 1
1112 cover Detecting and Combating Malicious Email Cade Kamachi, Julie JCH Ryan
1113 cover Dictionary of Information Security Robert Slade
1114 cover Digital Forensics, Investigation, and Response [4 ed.] Chuck Easttom 4
1115 cover Digital Forensics Processing and Procedures [1 ed.] 1
1116 cover Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data [1 ed.] Terrence V. Lillard 1
1117 cover Dissecting the Hack: The F0rb1dd3n Network, Revised Edition [Revised] Jayson E Street, Kent Nabors, Dustin L. Fritz
1118 cover Dissecting the hack the V3rb0ten network [Online-Ausg ed.] Baskin, Brian,Martin, Brian,Sims, Kristin,Street, Jayson E
1119 cover DNS Security. Defending the Domain Name System [1 ed.] Allan Liska, Geoffrey Stowe 1
1120 cover Dr Tom Shinder's ISA Server and Beyond : Real World Security Solutions for Microsoft Enterprise Networks Syngress
1121 cover Dr. Tom Shinder's ISA Server 2006 Migration Guide Thomas W Shinder, Debra Littlejohn Shinder, Adrian F. Dimcev, James Eaton-Lee, Jason Jones, Steve Moffat
1122 cover Dr. Tom Shinder's ISA Server and Beyond. Real World Security Solutions for Microsoft Enterprise Networks M.D. Thomas W. Shinder, Debra Littlejohn Shinder and Martin Grasdal (Auth.)
1123 cover Elementary Information Security [2 ed.] Richard E. Smith 2
1124 cover Elementary Information Security [3 ed.] Richard E. Smith 3
1125 cover Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures [1 ed.] Brian Contos, Dave Kleiman 1
1126 cover E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets Michael R. Overly
1127 cover Essential Skills for Hackers [1 ed.] Kevin Cardwell, Henry Dalziel 1
1128 cover Ethical Hacking: Techniques, Tools, and Countermeasures [4 ed.] Michael G. Solomon, Sean-Philip Oriyano 4
1129 cover Ethereal Packet Sniffing [1 ed.] Syngress 1
1130 cover Executing Windows Command Line Investigations. While Ensuring Evidentiary Integrity [1 ed.] Chet Hosmer, Joshua Bartolomie, Rosanne Pelli 1
1131 cover Firewall policies and VPN configurations Anne Henmi, Mark Lucas, Abhishek Singh, Chris Cantrell
1132 cover FISMA Certification & Accreditation Handbook [1 ed.] Laura P. Taylor, L. Taylor 1
1133 cover FISMA Compliance Handbook: Second Edition [1 ed.] Laura P. Taylor 1
1134 cover FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security Stephen D. Gantz and Daniel R. Philpott (Eds.)
1135 cover FISMA certification & accreditation handbook Laura Taylor, Matthew Shepherd
1136 cover FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security [1 ed.] Stephen D. Gantz, Daniel R. Philpott 1
1137 cover Fundamentals of information systems security [3 ed.] Kim, David, Solomon, Michael G 3
1138 cover GFI Network Security and PCI Compliance Power Tools [1st ed.] Brien Posey 1
1139 cover Google Hacking for Penetration Testers [3 ed.] Johnny Long, Bill Gardner, Justin Brown 3
1140 cover Google hacking for penetration testers. / Volume 2 Long, Johnny
1141 cover Hack Proofing Sun Solaris 8 [1 ed.] Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress 1
1142 cover Hack Proofing Windows 2000 Server Syngress, Syngress Publishing, Ryan Russell
1143 cover HACK PROOFING XML [1 ed.] Larry Loeb, Jeremy Faircloth, Ken Ftu, Carter Everett, Curtis, Jr. Franklin 1
1144 cover Hack Proofing Your E-commerce Site [1 ed.] Ryan Russell 1
1145 cover Hack Proofing Your Identity [1 ed.] Teri Bidwell 1
1146 cover Hack proofing your network David R Mirza Ahmad, Ryan Russell, et al
1147 cover Hack Proofing Your Network: Internet Tradecraft [1 ed.] Ryan Russell 1
1148 cover Hack proofing your wireless network Christian Barnes, Neal O'Farrell, et al
1149 cover Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network Michael Gregg
1150 cover Hacking Web Apps: Detecting and Preventing Web Application Security Problems [1 ed.] Mike Shema 1
1151 cover Hackproofing Your Wireless Network [1 ed.] Syngress, Eric Ouellet, Neal O'Farrell 1
1152 cover Hacking a Terror Network: The Silent Threat of Covert Channels [1 ed.] Ryan Russell 1
1153 cover Hack Proofing Your Network [1 ed.] Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress 1
1154 cover Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems [1 ed.] Edward Griffor 1
1155 cover HCISPP Study Guide [1 ed.] Timothy Virtue, Justin Rainey 1
1156 cover Hiding behind the keyboard : uncovering covert communication methods with forensic analysis [1 ed.] Bair, John, Shavers, Brett 1
1157 cover Host and Network Security for Microsoft, UNIX, and Oracle Chris Adams
1158 cover How to Cheat at Managing Information Security Mark Osborne
1159 cover How to cheat at securing your network Ido Dubrawsky
1160 cover How to Define and Build an Effective Cyber Threat Intelligence Capability [1 ed.] Henry Dalziel, Eric Olson, James Carnall 1
1161 cover i: Phone and i: OS Forensics. Investigation, Analysis and Mobile Security for Apple i: Phone, i: Pad and i: OS Devices [1 ed.] Andrew Hoog And Katie Strzempka (Auth.) 1
1162 cover Implementing digital forensic readiness : from reactive to proactive process [1 ed.] Ivtchenko, Dmitri, Sachowski, Jason 1
1163 cover Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems Eric Knapp
1164 cover Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [1 ed.] Eric D. Knapp 1
1165 cover Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems [2 ed.] Eric D. Knapp, Joel Thomas Langill 2
1166 cover Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data [1 ed.] Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin 1
1167 cover Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Mark Talabis, Jason Martin
1168 cover Information Security Principles and Practice Mark Stamp
1169 cover InfoSec Career Hacking Sell Your Skillz, Not Your Soul Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley
1170 cover InfoSec Career Hacking [1 ed.] Aaron W. Bayles, Chris Hurley, Johnny Long, Ed Brindley, James C. Foster, Christopher W. Klaus 1
1171 cover InfoSecurity 2008 Threat Analysis [1 ed.] Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg 1
1172 cover Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders Susan E. McGregor
1173 cover Information Security Illuminated [1 ed.] Michael G. Solomon, Mike Chapple 1
1174 cover Insider Threat. Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole and Sandra Ring (Auth.)
1175 cover Internet and Web Application Security [3 ed.] Mike Harwood, Ron Price 3
1176 cover Introduction to Information Security. A Strategic-Based Approach [1 ed.] Timothy Shimeall and Jonathan Spring (Auth.) 1
1177 cover Intrusion Prevention and Active Response [1 ed.] Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin 1
1178 cover Intrusion Prevention and Active Response. Deploying Network and Host IPS Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard and Jake Babbin (Eds.)
1179 cover iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices [1 ed.] Andrew Hoog, Katie Strzempka 1
1180 cover JavaScript for hackers: Learn to think like a hacker Gareth Heyes
1181 cover Legal and Privacy Issues in Information Security Grama, Joanna Lyn,
1182 cover Legal and Privacy Issues in Information Security [3 ed.] Joanna Lyn Grama 3
1183 cover Legal Issues in Information Security, 2nd Edition [2 ed.] Joanna Lyn Grama 2
1184 cover Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems [1 ed.] Cameron H. Malin, Eoghan Casey BS MA, James M. Aquilina 1
1185 cover Managing Cisco Network Security [2 ed.] 2
1186 cover Managing Information Security [2 ed.] John R. Vacca (editor) 2
1187 cover Managing Risk in Information Systems, 3rd Edition [3 ed.] Darril Gibson, Andy Igonor 3
1188 cover Managing Cisco Network Security [1 ed.] Florent Parent, Oliver Steudler 1
1189 cover Managing Information Security [1 ed.] John R. Vacca 1
1190 cover Managing Cisco Network Security Building Rock-Solid Networks
1191 cover MCSE (Exam 70-298) Study Guide. Designing security for a Windows Server 2003 network: Exam 70-298 Elias N. Khnaser, Susan Snedaker, Chris Peiris, Rob Amini and Laura E. Hunter (Eds.)
1192 cover MCSE Designing Security for a Windows Server 2003 Network [1st ed.] Elias Khasner, Laura E. Hunter 1
1193 cover MCSE Implementing and Administering Security in a Windows 2000 Network Study Guide [1 ed.] Will Schmied, Thomas W. Shinder 1
1194 cover Mission Critical Internet Security [1 ed.] Bradley Dunsmore 1
1195 cover Mobile Security and Privacy. Advances, Challenges and Future Research Directions [1 ed.] Man Ho Au, Raymond Choo 1
1196 cover Mobile Data Loss: Threats and Countermeasures [1 ed.] Michael T. Raggo 1
1197 cover Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series) [1 ed.] Neil Archibald, Gilbert Ramirez, Noam Rathaus 1
1198 cover Network performance and security: testing and analyzing using open source and low-cost tools Chapman, Chris
1199 cover Network Security, Firewalls, and VPNs (Jones & Bartlett Learning Information Systems Security & Assurance) [1 ed.] J. Stewart 1
1200 cover Nessus Network Auditing [1 ed.] Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson 1
1201 cover Nessus Network Auditing [2 ed.] Russ Rogers 2
1202 cover Netcat Power Tools [1 ed.] Jan Kanclirz, Brian Baskin, Thomas Wilhelm 1
1203 cover Netcat Power Tools Jan Kanclirz, Brian Baskin, Thomas Wilhelm
1204 cover Network and System Security John R. Vacca
1205 cover Network Security Assessment: From Vulnerability to Patch [1 ed.] Steve Manzuik, Andre Gold, Chris Gatford 1
1206 cover Network and System Security [2nd Edition] John R. Vacca 2
1207 cover Network Intrusion Analysis
1208 cover Network Security, Firewalls, and VPNs, 3rd Edition J. Michael Stewart, Denise Kinsey
1209 cover Network security firewalls and VPNs [2nd ed.] Stewart, James Michael 2
1210 cover Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques Thomas Wilhelm, Jason Andress
1211 cover No Tech Hacking A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick
1212 cover Nokia Firewall, VPN, and IPSO Configuration Guide Andrew Hay, Keli Hay, Peter Giannoulis
1213 cover Nmap in the Enterprise: Ваше руководство к сети Сканирование Angela Orebaugh, Becky Pinkard
1214 cover Nmap in the Enterprise: Your Guide to Network Scanning Angela Orebaugh, Becky Pinkard
1215 cover Nokia network security : solutions handbook Doug Maxwell, Cherie Amon
1216 cover Nokia Network Security Solutions Handbook [1 ed.] Syngress, Doug Maxwell 1
1217 cover OSSEC Host-Based Intrusion Detection Guide Andrew Hay, Daniel Cid, Rory Bray
1218 cover PCI Compliance, Fourth Edition: Understand and Implement Effective PCI Data Security Standard Compliance [4 ed.] Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY 4
1219 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [3° ed.] Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY. 3
1220 cover PCI Compliance Bradley T. (ed.)
1221 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [2 ed.] Anton Chuvakin, Branden R. Williams 2
1222 cover Perfect Password: Selection, Protection, Authentication Mark Burnett
1223 cover Perfect Password: Selection, Protection, Authentication [1 ed.] Mark Burnett, Dave Kleiman 1
1224 cover Perfect Passwords. Selection, Protection, Authentication Mark Burnett and Dave Kleiman (Auth.)
1225 cover Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft [1 ed.] Markus Jakobsson, Steven Myers 1
1226 cover Phishing Exposed Lance James, (Auth.)
1227 cover Physical and logical security convergence: powered by enterprise security management [1 ed.] Brian T. Contos, William P. Crowell, Colby DeRodeff, Dan Dunkel, Dr. Eric Cole 1
1228 cover Power and security in the information age: investigating the role of the state in cyberspace [1 ed.] Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) 1
1229 cover Practical Deployment of Cisco Identity Services Engine [1 ed.] Andy Richter, Jeremy Wood 1
1230 cover Protecting Patient Information. A Decision-Maker's Guide to Risk, Prevention, and Damage Control [1 ed.] Paul Cerrato 1
1231 cover Publishing IT Security Project Management Handbook
1232 cover Research Methods for Cyber Security [1st Edition] Thomas Edgar and David Manz (Auth.) 1
1233 cover Rogue Code: A Jeff Aiken Novel Mark Russinovich
1234 cover HACKING: Become The Ultimate Hacker - Computer Virus, Cracking, Malware, IT Security Joseph Connor
1235 cover Hacking: Hacking for Beginners - Computer Virus, Cracking, Malware, IT Security - 2nd Edition (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security) Connor, Joseph
1236 cover The little black book of computer viruses Volume 1 Mark A. Ludwig
1237 cover Scene of the Cybercrime: Computer Forensics Handbook Debra Littlejohn Shinder, Ed Tittel (editor)
1238 cover Scene of the CyberCrime - Computer Forensics Handbook
1239 cover Scene of the Cybercrime, Second Edition [2 ed.] Debra Littlejohn Shinder, Michael Cross 2
1240 cover Scene of the Cybercrime: Computer Forensics Handbook [1 ed.] Debra Littlejohn Shinder, Ed Tittel 1
1241 cover Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century Christopher Burgess, Richard Power
1242 cover Securing the Smart Grid: Next Generation Power Grid Security Tony Flick, Justin Morehouse
1243 cover Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT Eric Seagren
1244 cover Securing SQL Server, Third Edition: Protecting Your Database from Attackers [3 ed.] Denny Cherry 3
1245 cover Securing SQL Server: Protecting Your Database from Attackers [2 ed.] Denny Cherry 2
1246 cover Securing the Internet of Things [1st Edition] Shancang Li and Li Da Xu (Auth.) 1
1247 cover Securing VoIP: Keeping Your VoIP Network Safe [1 ed.] Regis J. Jr (Bud) Bates 1
1248 cover Securing Windows Server 2008: Prevent Attacks from Outside Aaron Tiensivu
1249 cover Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Aaron Tiensivu
1250 cover Security Assessment: Case Studies for Implementing the NSA IAM [2 ed.] Sean Thurston 2
1251 cover Security Assessment [1st ed.] Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra 1
1252 cover Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Derrick Rountree
1253 cover Security sage's guide to hardening the network infrastructure Steven Andrés, et al
1254 cover Security+ study guide Michael Cross, Norris L Jr Johnson, Tony Piltzecker, Robert J Shimonski, Debra Littlejohn Shinder
1255 cover Security+ Study Guide and DVD Training System [1 ed.] Norris L. Johnson, Michael Cross, Tony Piltzecker, Robert J. Shimonski, Debra Littlejohn Shinder 1
1256 cover Security+ Study Guide and DVD Training System [1 ed.] Norris L. Johnson, Michael Cross, Tony Piltzecker 1
1257 cover Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks) Dan York
1258 cover Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks) Stacy Prowell, Rob Kraus, Mike Borkin
1259 cover Seven Deadliest USB Attacks Brian Anderson, Barbara Anderson
1260 cover Seven Deadliest Wireless Technologies Attacks Haines, Brad
1261 cover Simple Steps to Data Encryption: A Practical Guide to Secure Computing Pete Loshin
1262 cover Smart Technologies And The End(s) Of Law: Novel Entanglements Of Law And Technology [1st Edition] Mireille Hildebrandt 1
1263 cover Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense [1 ed.] Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.) 1
1264 cover Snort 2.0 Intrusion Detection [1 ed.] Brian Caswell, Jay Beale, James C. Foster, Jeremy Faircloth 1
1265 cover Snort 2.1 Intrusion Detection, Second Edition [1 ed.] Michael Rash, Angela D. Orebaugh, Graham Clark, Becky Pinkard, Jake Babbin 1
1266 cover Snort 2.1 Intrusion Detection [1 ed.] Johnny Long, Ed Skoudis, Alrik van Eijkelenborg 1
1267 cover Smart Technologies and the End(s) of Law: Novel Entanglements of Law and Technology Mireille Hildebrandt
1268 cover Snort IDS and IPS Toolkit Brian Caswell, Jay Beale, Andrew Baker
1269 cover Sniffer Pro Network Optimization and Troubleshooting Handbook [1 ed.] Robert J. Shimonski, Wally Eaton, Umer Khan, Yuri Gordienko 1
1270 cover Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle [1 ed.] Erik Pace Birkholz, Stuart McClure 1
1271 cover SQL Injection Attacks and Defense [2 ed.] Justin Clarke 2
1272 cover SSCP Systems Security Certified Practitioner Study Guide Syngress
1273 cover SSCP Study Guide [1 ed.] Jeffrey Posulns, Robert J. Shimonski, Jeremy Faircloth 1
1274 cover SSCP Systems Security Certified Practitioner Study Guide and DVD Training System [1 ed.] Syngress 1
1275 cover SSCP : study guide and & DVD training system Josh Jacobs
1276 cover SQL injection attacks and defense [2nd ed.] Clarke, Justin 2
1277 cover SQL Injection Attacks and Defense [2nd Edition] Justin Clarke, Kevvie Fowler, Erlend Oftedal, Rodrigo Marcos Alvarez 2
1278 cover Stealing the Network: How to Own a Continent [1st ed.] FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale 1
1279 cover Stealing the Network: How to Own a Shadow. The Chase for Knuth Johnny Long, Timothy (Thor) Mullen and Ryan Russell (Auth.)
1280 cover State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law Eliza Watt
1281 cover Stealing The Network How To Own A Continent
1282 cover Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD [1 ed.] Johnny Long, Ryan Russell, Timothy Mullen 1
1283 cover Syngress force emerging threat analysis : from mischief to malicious David Maynor, et al
1284 cover Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious Michael Gregg, Brian Baskin
1285 cover System Forensics, Investigation, and Response [3rd ed.] Chuck Easttom 3
1286 cover Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware [1 ed.] Aditya Sood and Richard Enbody (Auth.) 1
1287 cover Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook [Pap/DVD ed.] Jack Wiles
1288 cover Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators Wiles J., Long J., Rogers R.
1289 cover Techno Security's Guide to Securing SCADA. A Comprehensive Handbook On Protecting The Critical Infrastructure Jack Wiles (Auth.)
1290 cover Techno Securitys Guide to Managing Risks for IT Managers, Auditors and Investigators Jack Wiles, Johnny Long, Russ Rogers, Ron Green
1291 cover Terrorism in cyberspace : the next generation Weimann, Gabriel
1292 cover The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online [1 ed.] Denny Cherry 1
1293 cover The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice [1 ed.] Jason Andress 1
1294 cover The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy [1 ed.] Patrick Engebretson 1
1295 cover The Best Damn Firewall Book Period [1 ed.] Syngress Media Inc 1
1296 cover The Best Damn Firewall Book Period [2 ed.] Thomas W Shinder 2
1297 cover The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age [1st ed.] Mark S. Merkow CCP, James Breithaupt 1
1298 cover The History of Information Security: A Comprehensive Handbook [1 ed.] Karl M. M. de Leeuw, Jan Bergstra, Karl Maria Michael de Leeuw 1
1299 cover The international handbook of computer security Jae K. Shim
1300 cover Trojan Horse: A Jeff Aiken Novel Mark Russinovich, Kevin Mitnick
1301 cover War: Driving and Wireless Penetration Testing [1 ed.] Chris Hurley, Russ Rogers, Frank Thornton, Daniel Connelly and Brian Baker (Auth.) 1
1302 cover CISSP Practice Exams [3e edition] Harris, Shon 3
1303 cover Advanced malware analysis [1 ed.] Elisan, Christopher C 1
1304 cover CompTIA security+ (exam SY0-401) [4th ed] Dunkerley, Dawn, Meyers, Mike, Samuelle, T. J 4
1305 cover Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments [1 ed.] Ric Messier 1
1306 cover CompTIA Security+ All-in-One Exam Guide (Exam SY0-501) [5th ed.] Wm. Arthur Conklin, Gregory White 5
1307 cover CompTIA Security+ All-in-One Exam Guide [2 ed.] Gregory White, Wm. Arthur Conklin, Dwayne Williams, Roger Davis, Chuck Cothren 2
1308 cover CompTIA Security+ (Exam SY0-501) [5 ed.] Dawn Dunkerley 5
1309 cover Hacking Exposed Linux, 3rd Edition [3 ed.] ISECOM 3
1310 cover Anti-Hacker Tool Kit [2 ed.] Mike Shema, Bradley C. Johnson 2
1311 cover Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Bodungen, Clint E.,Hilt, Stephen,Shbeeb, Aaron,Singer, Bryan L.,Wilhoit, Kyle
1312 cover CompTIA security+ all-in-one exam guide, (Exam SY0-501) [Fifth edition] Conklin, W. Arthur,White, Greg,Williams, Dwayne,Cothren, Chuck,Davis, Roger L
1313 cover Network Security: A Beginner’s Guide [2 ed.] Maiwald, Eric 2
1314 cover Anti-Hacker Tool Kit [Fourth edition /] Shema, Mike
1315 cover Network security: the complete reference Bragg, Roberta,Strassberg, Keith,Rhodes-Ousley, Mark
1316 cover Securing the Clicks Network Security in the Age of Social Media Gary Bahadur, Jason Inasi, Alex de Carvalho
1317 cover Network Security: A Beginners Guide Eric Maiwald
1318 cover Anti-Spam Tool Kit [1 ed.] Paul Wolfe, Charlie Scott, Mike Erwin 1
1319 cover CompTIA Security+ Certification Practice Exams (Exam SY0-501) [3 ed.] Daniel Lachance, Glen E. Clarke 3
1320 cover CompTIA Security+ Certification Bundle (Exam SY0-601) Glen E. Clarke
1321 cover Gray Hat Hacking: The Ethical Hacker’s Handbook [4 ed.] Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims 4
1322 cover The Law and Economics of Cybersecurity Mark F. Grady, Francesco Parisi
1323 cover Data Analytics for Cybersecurity Vandana P. Janeja
1324 cover Wireless Internet Security: Architecture and Protocols [1 ed.] James Kempf 1
1325 cover The Net And The Nation State: Multidisciplinary Perspectives On Internet Governance [1 ed.] Uta Kohl 1
1326 cover Privacy And Power: A Transatlantic Dialogue In The Shadow Of The NSA-Affair [1 ed.] Russell A. Miller 1
1327 cover Cyber Security And The Politics Of Time [1st Edition] Tim Stevens 1
1328 cover Cyber Mercenaries: The State, Hackers, and Power Tim Maurer
1329 cover Cyber Peace: Charting A Path Toward A Sustainable, Stable, And Secure Cyberspace [1 ed.] Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen 1
1330 cover Governing New Frontiers In The Information Age: Toward Cyber Peace [1st Edition] Scott J. Shackelford 1
1331 cover Network Security: A Decision and Game-Theoretic Approach [1 ed.] Tansu Alpcan, Tamer Baar 1
1332 cover Information Theoretic Security and Privacy of Information Systems [1 ed.] Rafael F. Schaefer, Holger Boche, Ashish Khisti, H. Vincent Poor 1
1333 cover Hacking exposed, network security secrets and solutions [Notations ed.] Joel Scambray
1334 cover Wireless security Merritt Maxim, David Pollino
1335 cover Wi-Fi security Miller, Stewart S
1336 cover IT Auditing Using Controls to Protect Information Assets, 2nd Edition [2 ed.] Chris Davis, Mike Schiller, Kevin Wheeler 2
1337 cover IT Auditing: Using Controls to Protect Information Assets [1 ed.] Chris Davis, Mike Schiller, Kevin Wheeler 1
1338 cover Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601) Jonathan S. Weissman
1339 cover IT Auditing Using Controls to Protect Information Assets [3rd ed.] Mike Kegerreis,Mike Schiller,Chris Davis 3
1340 cover Hacking Exposed: Mobile Security Secrets & Solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray
1341 cover Certification and Security in Health-Related Web Applications: Concepts and Solutions Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
1342 cover Medical Device Cybersecurity for Engineers and Manufacturers [2 ed.] Axel Wirth 2
1343 cover Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT) Sunil Gupta, Hitesh Kumar Sharma, Monit Kapoor
1344 cover Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States [1 ed.] Matthew Webster 1
1345 cover Cybersecurity for Connected Medical Devices [1 ed.] Arnab Ray 1
1346 cover Future Trends in Biomedical and Health Informatics and Cybersecurity in Medical Devices: Proceedings of the International Conference on Biomedical and Health Informatics, ICBHI 2019, 17-20 April 2019, Taipei, Taiwan [1st ed. 2020] Kang-Ping Lin, Ratko Magjarevic, Paulo de Carvalho 1
1347 cover How HIPAA Can Crush Your Medical Practice: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It Craig a Petronella
1348 cover Health Data in the Information Age : Use, Disclosure, and Privacy [1 ed.] Institute of Medicine, Committee on Regional Health Data Networks, Kathleen N. Lohr, Molla S. Donaldson 1
1349 cover Biometrics: Theory, Applications, and Issues : Theory, Applications, and Issues [1 ed.] Ellen R. Nichols 1
1350 cover Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security John Medicine
1351 cover Decrypting the Encryption Debate: A Framework for Decision Makers [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Law Enforcement and Intelligence Access to Plaintext Information 1
1352 cover Recoverability As a First-Class Security Objective: Proceedings of a Workshop [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Frances Johnson 1
1353 cover Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Peter J. Weinberger, Baruch Fischhoff, Lynette I. Millett 1
1354 cover Data Breach Aftermath and Recovery for Individuals and Institutions: Proceedings of a Workshop [1 ed.] and Medicine Engineering National Academies of Sciences, Forum on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Johnson 1
1355 cover Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop [1 ed.] and Medicine Engineering National Academies of Sciences, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Planning Committee for a Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext, Jon Eisenberg, Emily Grumbling, Anne Johnson 1
1356 cover Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies [1 ed.] Alessandro Parisi 1
1357 cover AI in Cybersecurity Leslie F. Sikos (Editor)
1358 cover Confluence of AI, Machine, and Deep Learning in Cyber Forensics Sanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (editor)
1359 cover Cyber defense mechanisms security, privacy, and challenges Kumar, Gautam(Editor),Saini, Dinesh Kumar(Editor),Cuong, Nguyen Ha Huy(Editor)
1360 cover AI-Enabled Threat Detection and Security Analysis for Industrial IoT Hadis Karimipour, Farnaz Derakhshan
1361 cover Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications) Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Nishan Chelvachandran (editor), Jaime Ibarra (editor)
1362 cover Policing In The Era Of AI And Smart Societies [1st Edition] Hamid Jahankhani, Babak Akhgar, Peter Cochrane, Mohammad Dastbaz 1
1363 cover Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making Hamid Jahankhani, Liam M. O’Dell, Gordon Bowen, Daniel Hagan, Arshad Jamal
1364 cover AI in the Age of Cyber-Disorder. Actors, Trends, and Prospects Fabio Rugge
1365 cover The NICE Cyber Security Framework: Cyber Security Management Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh
1366 cover The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms Raj Badhwar
1367 cover Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Parisi, Alessandro
1368 cover Practical AI for Cybersecurity [1 ed.] Ravi Das 1
1369 cover Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications [1 ed.] Gautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor) 1
1370 cover Secure and Smart Internet of Things (IoT) Using Blockchain and AI Ahmed Banafa
1371 cover Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) [1 ed.] Gautam Kumar (editor), Dinesh Kumar Saini (editor), Nguyen Ha Huy Cuong (editor) 1
1372 cover Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence, 1030) Nadia Nedjah (editor), Ahmed A. Abd El-Latif (editor), Brij B. Gupta (editor), Luiza M. Mourelle (editor)
1373 cover Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21 Yassine Maleh, Mamoun Alazab, Noreddine Gherabi, Lo’ai Tawalbeh, Ahmed A. Abd El-Latif
1374 cover AI, Machine Learning and Deep Learning: A Security Perspective Fei Hu, Xiali Hei
1375 cover Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers Chunhua Su, Kouichi Sakurai
1376 cover Explainable AI for Cybersecurity [1st ed. 2023] Zhixin Pan, Prabhat Mishra 1
1377 cover Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things) Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor)
1378 cover Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat
1379 cover 10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques Rajvardhan Oak
1380 cover Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing) [1 ed.] Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor) 1
1381 cover Emerging Role of AI Based Expert Systems in Cyber Defense and Security Kirti Raj Bhatele, Astitwa Bhargava, Anand Jha
1382 cover Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu
1383 cover Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) [1 ed.] Ravindra Das 1
1384 cover Adversarial AI Attacks, Mitigations, and Defense Strategies [1 ed.] John Sotiropoulos 1
1385 cover Combating Cyberattacks Targeting the AI Ecosystem Aditya K. Sood
1386 cover Next-Generation Cybersecurity: AI, ML, and Blockchain (Blockchain Technologies) [2024 ed.] Keshav Kaushik (editor), Ishu Sharma (editor) 2024
1387 cover AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability [2024 ed.] Iqbal H. Sarker 2024
1388 cover ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills [1 ed.] Clint Bodungen 1
1389 cover AI Embedded Assurance for Cyber Systems Cliff Wang, S. S. Iyengar, Kun Sun
1390 cover Adaptive Anomalies: AI in Intrusion Detection Systems amie Flux
1391 cover Mastering AI, Machine Learning and Cyber Security Rahul Vadisetty
1392 cover Supply Chain Software Security: AI, IoT, and Application Security Aamiruddin Syed
1393 cover Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions [1 ed.] Ahmed A. Abd El-Latif (editor), Lo'ai Tawalbeh (editor), Manoranjan Mohanty (editor), Brij B. Gupta (editor), Konstantinos E. Psannis (editor) 1
1394 cover Leveraging Artificial Intelligence (AI) Competencies for Next-Generation Cybersecurity Solutions [1 ed.] Pethuru Raj (editor), B. Sundaravadivazhagan (editor), V. Kavitha (editor) 1
1395 cover Generative AI, Cybersecurity, and Ethics Mohammad Rubyet Islam
1396 cover Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 Hamid Jahankhani
1397 cover AI-Driven: Social Media Analytics and Cybersecurity Wael M. S. Yafooz, Yousef Al-Gumaei (Eds.)
1398 cover Inside Cyber : How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Our Security Chuck Brooks
1399 cover Safeguarding the Future: Security and Privacy by Design for AI, Metaverse, Blockchain, and Beyond [1 ed.] Alan Tang 1
1400 cover Hacking und Cyber Security mit KI: Prompt Engineering, Phishing, Pentesting, IT security uvm. mithilfe von ChatGPT Inkl. vielen Challenges Florian Dalwigk
1401 cover Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) Padmavathi Ganapathi (editor), D. Shanmugapriya (editor)
1402 cover Deep Learning Applications for Cyber Security [1st ed. 2019] Mamoun Alazab, MingJian Tang 1
1403 cover Machine Learning for Cybersecurity: Innovative Deep Learning Solutions Marwan Omar
1404 cover Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks) Kwangjo Kim, Harry Chandra Tanuwidjaja
1405 cover Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript J. D. Glaser
1406 cover Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) Stanislav Abaimov, Maurizio Martellini
1407 cover Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem Soma Halder, Sinan Ozdemir
1408 cover Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python Chiheb Chebbi
1409 cover Data Mining and Machine Learning in Cybersecurity Sumeet Dua, Xian Du
1410 cover Data Mining and Machine Learning in Cybersecurity [1 ed.] Sumeet Dua, Xian Du 1
1411 cover Machine Learning and Cryptographic Solutions for Data Protection and Network Security J Anitha Ruth, Vijayalakshmi G V Mahesh, P Visalakshi
1412 cover Hands-on Machine Learning for Cyber Security Soma Halder
1413 cover Machine learning et security: protecting systems with data and algorithms Chio, Clarence,Freeman, David
1414 cover Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings [1 ed.] Shlomi Dolev, Sachin Lodha (eds.) 1
1415 cover Social Network Forensics, Cyber Security, and Machine Learning [1st ed.] P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat 1
1416 cover Machine Learning for Cybersecurity Cookbook Emmanuel Tsukerman
1417 cover Machine learning for computer and cyber security: principles, algorithms, and practices Gupta, Brij, Sheng, Quan Z
1418 cover Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings [1st ed. 2019] Xiaofeng Chen, Xinyi Huang, Jun Zhang 1
1419 cover Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python [1 ed.] Emmanuel Tsukerman 1
1420 cover Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals Zach Codings
1421 cover Cyber Security Cryptography and Machine Learning [1st ed.] Itai Dinur, Shlomi Dolev, Sachin Lodha 1
1422 cover Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I [1st ed.] Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang 1
1423 cover Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings [1st ed.] Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss 1
1424 cover Cyber Security Meets Machine Learning Xiaofeng Chen, Willy Susilo, Elisa Bertino
1425 cover Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III [1st ed.] Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang 1
1426 cover Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II [1st ed.] Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang 1
1427 cover Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann
1428 cover Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) [1st ed. 2022] Stanislav Abaimov, Maurizio Martellini 1
1429 cover Machine Learning for Cyber Security Preeti Malik, Lata Nautiyal, Mangey Ram
1430 cover Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301) [1st ed. 2022] Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor) 1
1431 cover Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks) Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
1432 cover Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part I Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1433 cover Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them Ram Shankar, Siva Kumar, Hyrum Anderson
1434 cover Machine Learning, Image Processing, Network Security and Data Sciences. 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings [Part II] Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni
1435 cover Machine Learning Techniques for Cybersecurity Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub
1436 cover Machine Learning for Cyber Security Preeti Malik (editor), Lata Nautiyal (editor), Mangey Ram (editor)
1437 cover Machine Learning, Image Processing, Network Security and Data Sciences: Select Proceedings of 3rd International Conference on MIND 2021 Rajesh Doriya, Badal Soni, Anupam Shukla, Xiao-Zhi Gao
1438 cover Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part I Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1439 cover Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1440 cover Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part III] Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1441 cover Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings [Part II] Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
1442 cover Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022 Virtual Event, January 19–20, 2023 Proceedings, Part II Nilay Khare, Deepak Singh Tomar, Mitul Kumar Ahirwal, Vijay Bhaskar Semwal, Vaibhav Soni
1443 cover Not with a Bug, But with a Sticker : Attacks on Machine Learning Systems and What To Do About Them Ram Shankar Siva Kumar, Hyrum Anderson
1444 cover Machine Learning, Image Processing, Network Security and Data Sciences: 4th International Conference, MIND 2022, Virtual Event, January 19–20, 2023, ... in Computer and Information Science) Nilay Khare (editor), Deepak Singh Tomar (editor), Mitul Kumar Ahirwal (editor), Vijay Bhaskar Semwal (editor), Vaibhav Soni (editor)
1445 cover Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems) Bimal Kumar Roy (editor), Atul Chaturvedi (editor), Boaz Tsaban (editor), Sartaj Ul Hasan (editor)
1446 cover Autorschaftserkennung und Verstellungsstrategien: Textanalysen und -vergleiche im Spektrum forensischer Linguistik, Informationssicherheit und Machine-Learning Steffen Hessler
1447 cover Fusion of Artificial Intelligence and Machine Learning for Advanced Image Processing, Data Analysis, and Cyber Security Arun Kumar Rana, Rashmi Gupta, Sharad Sharma, Ahmed A. Elngar, Sachin Dhawan
1448 cover Intelligent Systems Modeling and Simulation III: Artificial Intelligent, Machine Learning, Intelligent Functions and Cyber Security Samsul Ariffin, Abdul Karim
1449 cover Python Web Penetration Testing Cookbook Buchanan C., Ip T., Mabbitt A. et al.
1450 cover Python Penetration Testing Essentials Mohit Raj.
1451 cover Gray Hat Python: Python Programming for Hackers and Reverse Engineers Justin Seitz
1452 cover Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware Fahad Ali Sarwar
1453 cover Cyber Security: Python for Penetration Testing Travis Czech
1454 cover Ethical Hacking with Python - Build your own Hacking Scripts and Tools with Python from Scratch Abdeladim Fadheli
1455 cover Python for Cybersecurity Howard E. Poston lll
1456 cover Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker Attacks Alan Grid
1457 cover The secret of bug hunting. Bug bounty automation with python Syed Abuthahir
1458 cover Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python [1 ed.] Bastian Ballmann (auth.) 1
1459 cover Understanding Network Hacks: Attack and Defense with Python [1 ed.] Bastian Ballmann (auth.) 1
1460 cover Understanding Network Hacks Attack and Defense with Python [Softcover reprint of the original 1st ed. 2015] Bastian Ballmann 1
1461 cover Hacking: Hacking With Python - The Complete Beginner's Course to Learn Ethical Hacking With Python in 7 Clear-Cut Lessons - Including Dozens of Practical Examples & Exercises (Hacking Series Book 1) Alphy Books, Hacking
1462 cover Beginning Ethical Hacking with Python [1 ed.] Sanjib Sinha (auth.) 1
1463 cover Python Digital Forensics Cookbook Preston Miller, Chapin Bryce
1464 cover Hacking with Python: Beginner's Guide to Ethical Hacking, Basic Security, Penetration Testing, and Python Hacking Lane, Evan
1465 cover Python Penetration Testing Essentials: Techniques for ethical hacking with Python [2nd Edition] Raj, Mohit 2
1466 cover Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python Hussam Khrais
1467 cover Hands-On Penetration Testing with Python Enhance your ethical hacking skills to build automated and intelligent systems Furqan Khan
1468 cover Hands-on penetration testing with Python enhance your ethical hacking skills to build automated and intelligent systems Khan, Furqan
1469 cover Python for Beginners : An Essential Guide to Easy Learning with Basic Exercises : Python programming Crash Course for Data Analysis and for Beginner Hackers Walsh, Conley
1470 cover COMPUTER PROGRAMMING 4 Books In 1: Data Science, Hacking with Kali Linux, Computer Networking for Beginners, Python Programming Jason Callaway
1471 cover Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 [2. Aufl.] Bastian Ballmann 2
1472 cover LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERS DARWIN, TYE
1473 cover Network Hacks - Intensivkurs: Angriff und Verteidigung mit Python 3 Bastian Ballmann
1474 cover Understanding Network Hacks: Attack and Defense with Python 3 [2 ed.] Bastian Ballmann 2
1475 cover Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity Grid, Alan
1476 cover Understanding Network Hacks: Attack and Defense with Python 3 [2nd ed. 2021] Bastian Ballmann 2
1477 cover Python for Cybersecurity: Using Python for Cyber Offense and Defense [1 ed.] Howard E. Poston 1
1478 cover Python for Cybersecurity: Using Python for Cyber Offense and Defense Howard E. Poston III
1479 cover Black Hat Python, 2nd Edition Justin Seitz, Tim Arnold
1480 cover Python for OSINT. 21 day course for beginners [First ed.] cyb_detective
1481 cover Practical Ethical Hacking with Python: Develop your own ethical hacking tools using Python Tony Snake
1482 cover Top 10 Hacking Scripts in Python, C#, and ASP.NET: 2 Books in 1 Devwebtuts Publishing
1483 cover Mastering Computer Programming: A Comprehensive Guide to Python, C, C++, C#, HTML Coding, and Ethical Hacking Kameron Hussain, Frahaan Hussain
1484 cover Learn Penetration Testing with Python 3.x : An ethical hacker’s blueprint for offensive security [2 ed.] Yehia Elghaly 2
1485 cover Ethical Hacking with Python: Developing Cybersecurity Tools Nate Phoetean
1486 cover Python For Cybersecurity : Securing Systems And Networks With Python Programming Jackson, Marley
1487 cover Python Programming For Cybersecurity With PyShark And Cryptography: A Hands-On Beginner's Guide To Leveraging PyShark for Network Traffic Analysis and Cryptography for Secure Communication Caldwell, Alex
1488 cover Master Python Cybersecurity 2024 Rodrigues, Diego
1489 cover Java 2 network security Marco Pistoia, International Business Machines Corporation., et al
1490 cover Java 2 Network Security [2nd ed.] Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok Ramani 2
1491 cover Cryptography for Internet and database applications: developing secret and public key techniques with Java [1st ed.] Nick Galbreath 1
1492 cover The Decision to Attack: Military and Intelligence Cyber Decision-Making Brantly Aaron Franklin, Keller William.
1493 cover The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You Matherly John.
1494 cover Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense Jean Nestor M. Dahj
1495 cover Romanian Intelligence Service - OSINT Handbook
1496 cover Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks Aditya K. Sood PhD
1497 cover Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT [1 ed.] Rajdeep Chowdhury 1
1498 cover Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Vinny Troia
1499 cover Dark Web and Deep Web Intelligence Schuster Louis
1500 cover Check Point Advanced Technical Reference Guide NG with Application Intelligence
1501 cover Intelligent Multimedia Data Hiding: New Directions [1 ed.] Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain, Wai-Chi Fang 1
1502 cover Intelligence and Security Informatics: Techniques and Applications [1 ed.] Bhavani Thuraisingham (auth.), Hsinchun Chen, Christopher C. Yang (eds.) 1
1503 cover Safeguards in a world of ambient intelligence [1. softcover print ed.] Wright, David,Vildjiounaite, Elena,Gutwirth, Serge,Punie, Yves,Friedewald, Michael 1
1504 cover Internet searches for vetting, investigations, and open-source intelligence [1 ed.] Edward J. Appel 1
1505 cover Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System [1 ed.] Álvaro Herrero, Emilio Corchado (auth.) 1
1506 cover Chaos-Based Cryptography: Theory,Algorithms and Applications [1 ed.] Dimitar Solev, Predrag Janjic, Ljupco Kocarev (auth.), Ljupco Kocarev, Shiguo Lian (eds.) 1
1507 cover Enabling Open Source Intelligence (OSINT) in Private Social Networks [12347] Benjamin Robert Holland 12347
1508 cover Verification of security intelligence for a resilient SCADA system Sumit Chakraborty
1509 cover Risk Assessment and Management in the Networked Economy [1 ed.] Omar K. Hussain, Tharam S. Dillon, Farookh K. Hussain, Elizabeth J. Chang (auth.) 1
1510 cover Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings [1 ed.] Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang (eds.) 1
1511 cover Intelligent Methods for Cyber Warfare [1 ed.] Ronald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.) 1
1512 cover Cybercrime, Digital Forensics and Jurisdiction [1 ed.] Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.) 1
1513 cover Advanced Research in Data Privacy [1 ed.] Guillermo Navarro-Arribas, Vicenç Torra (eds.) 1
1514 cover (OSINT) Open Source Intelligence Glossary Volume I: Guide to Keywords, Phrases for Improved Internet Research Results [1] Nicholas Crowder 1
1515 cover The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You Matherly, John
1516 cover Security Intelligence A Practitioners Guide to Solving Enterprise Security Challenges Qing Li, Gregory Clark
1517 cover The Tao of Open Source Intelligence IT Governance Publishing
1518 cover Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks Claude Fachkha
1519 cover Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 [1 ed.] Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) 1
1520 cover Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach [1 ed.] Roman Gumzej (auth.) 1
1521 cover The Tao of Open Source Intelligence [1 ed.] Stewart K. Bertram 1
1522 cover Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [5 ed.] Michael Bazzell 5
1523 cover Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level [1 ed.] Florian Skopik 1
1524 cover Introduction to Artificial Intelligence for Security Professionals [1 ed.] The Cylance Data Science Team 1
1525 cover Intelligence and Security Informatics: 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings [1 ed.] G. Alan Wang, Michael Chau, Hsinchun Chen (eds.) 1
1526 cover Darkweb cyber threat intelligence mining Robertson, John
1527 cover Information Fusion for Cyber-Security Analytics Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George
1528 cover Intelligence-driven incident response outwitting the adversary [First edition] Brown, Rebekah,Roberts, Scott J
1529 cover Cyber Security for Cyber Physical Systems [1 ed.] Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) 1
1530 cover Information Fusion for Cyber-Security Analytics [1st edition] Aleroud, Ahmed,Alsmadi, Izzat M.,Karabatis, George 1
1531 cover Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level [1 ed.] Florian Skopik 1
1532 cover International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence [1 ed.] Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) 1
1533 cover Artificial Intelligence Tools for Cyber Attribution Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef
1534 cover Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection Shilpa Mahajan, Mehak Khurana, Vania Vieira Estrela
1535 cover Cyber Threat Intelligence [1st ed.] Ali Dehghantanha, Mauro Conti, Tooska Dargahi 1
1536 cover Digital Defence: Harnessing the Power of Artificial Intelligence for Cybersecurity and Digital Forensics Kumar, Ahlad, Kumar Chaudhary, Naveen, Shastri, Apoorva S., Singh, Mangal, Kulkarni, Dr Anand J.
1537 cover Convergence of Blockchain and Explainable Artificial Intelligence: BlockXAI (River Publishers Series in Digital Security and Forensics) [1 ed.] Akansha Singh (editor), Krishna Kant Singh (editor) 1
1538 cover The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity. M. A. Jabbar, Sanju Tiwari, Subhendu Kumar Pani, Stephen Huang
1539 cover Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117) Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor)
1540 cover Advanced OSINT Strategies: Online Investigations and Intelligence Gathering Rob Botwright
1541 cover Mathematics of Computer Science, Cybersecurity and Artificial Intelligence Cheikh Thiecoumba Gueye, Papa Ngom, Idy Diop (Eds.)
1542 cover Network Security Empowered by Artificial Intelligence Yingying Chen, Jie Wu, Paul Yu, Xiaogang Wang
1543 cover Cybersecurity and Artificial Intelligence: Transformational Strategies and Disruptive Innovation (Advanced Sciences and Technologies for Security Applications) [2024 ed.] Hamid Jahankhani (editor), Gordon Bowen (editor), Mhd Saeed Sharif (editor), Osama Hussien (editor) 2024
1544 cover Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107) [2024 ed.] Yingying Chen (editor), Jie Wu (editor), Paul Yu (editor), Xiaogang Wang (editor) 2024
1545 cover Artificial Intelligence for Cyber-Physical Systems Hardening Issa Traore, Isaac Woungang, Sherif Saad
1546 cover Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons Erendor, Mehmet Emin
1547 cover Computational Intelligence Applications in Cyber Security [1 ed.] Suhel Ahmad Khan (editor), Mohammad Faisal (editor), Nawaf Alharbe (editor), Rajeev Kumar (editor), Raees Ahmad Khan (editor) 1
1548 cover Deep Dive : Exploring the Real‐world Value of Open Source Intelligence Rae Baker
1549 cover The Art of Cyber Defense: From Risk Assessment to Threat Intelligence [1 ed.] Youssef Baddi (editor), Mohammed Amin Almaiah (editor), Omar Almomani (editor), Yassine Maleh (editor) 1
1550 cover Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics [1 ed.] Adam Tilmar Jakobsen 1
1551 cover Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities Sharma, Smita, Thirumalaisamy, Manikandan, Balusamy, Balamurugan, Chilamkurti, Naveen
1552 cover Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman
1553 cover Artificial Intelligence and Cyber Security in Industry 4.0 Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi
1554 cover Artificial Intelligence and Cybersecurity. Theory and Applications Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
1555 cover Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications Ouaissa, Mariya, Ouaissa, Mariyam, Boulouard, Zakaria, Kumar, Abhishek
1556 cover The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Cyber Defense Donnie W. Wendt
1557 cover The OSINT Codebook: Cracking Open Source Intelligence Strategies Alexandre DeGarmo
1558 cover Deep Dive: Exploring the Real-world Value of Open Source Intelligence [1 ed.] Rae L. Baker 1
1559 cover Kids Cybersecurity Using Computational Intelligence Techniques Wael Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara
1560 cover Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang
1561 cover Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2 Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang
1562 cover Computational Intelligence for Cybersecurity Management and Applications [1 ed.] Yassine Maleh (editor), Mamoun Alazab (editor), Soufyane Mounir (editor) 1
1563 cover The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [2 ed.] Izzat Alsmadi 2
1564 cover Cyber Threat Intelligence Martin Lee
1565 cover International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th ... (Lecture Notes in Networks and Systems, 748) Pablo García Bringas (editor), Hilde Pérez García (editor), Francisco Javier Martínez de Pisón (editor), Francisco Martínez Álvarez (editor), Alicia Troncoso Lora (editor), Álvaro Herrero (editor), José Luis Calvo Rolle (editor), Héctor Quintián (editor), Emilio Corchado (editor)
1566 cover Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
1567 cover Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman
1568 cover Dancho Danchev's Cyber Intelligence Cybercrime Research Memoir Second Edition [2 ed.] Dancho Danchev 2
1569 cover The OSINT Codebook : Cracking Open Source Intelligence Strategies Alexandre DeGarmo
1570 cover Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications Ahmed A. Abd El-Latif, Mohammed Adel Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk
1571 cover Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
1572 cover Artificial Intelligence and Blockchain in Digital Forensics (River Publishers Series in Digital Security and Forensics) [1 ed.] P. Karthikeyan (editor), Hari Mohan Pande (editor), Velliangiri Sarveshwaran (editor) 1
1573 cover Open Source Intelligence 101 : From Novice to Expert Lyam Arnaud
1574 cover Artificial Intelligence for Intrusion Detection Systems Mayank Swarnkar, Shyam Singh Rajput
1575 cover Advancing Computational Intelligence Techniques for Security Systems Design Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan
1576 cover Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) [1st ed. 2022] Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) 1
1577 cover Visual Threat Intelligence: An Illustrated Guide For Threat Researchers Thomas Roccia
1578 cover Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information [9 ed.] Michael Bazzell 9
1579 cover Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) [1 ed.] Ishaani Priyadarshini (editor), Rohit Sharma (editor) 1
1580 cover Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Kyle Wilhoit, Joseph Opacki
1581 cover Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies, 109) [1st ed. 2022] Sanjay Misra (editor), Chamundeswari Arumugam (editor) 1
1582 cover Finding Beacons in the Dark [1 ed.] BlackBerry Research and Intelligence Team 1
1583 cover Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007) Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor)
1584 cover Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices Dr. Erdal Ozkaya
1585 cover Big Data Analytics and Computational Intelligence for Cybersecurity Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar
1586 cover Mastering Cyber Intelligence Jean Nestor M. Dahj,
1587 cover Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT Rajdeep Chowdhury, S. K. Niranjan
1588 cover Artificial Intelligence and Cybersecurity: Theory and Applications Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
1589 cover The Intelligence Handbook: A Roadmap for Building an Intelligence-Led Security Program [4 ed.] CyberEdge Group, LLC 4
1590 cover Methods, Implementation, and Application of Cyber Security Intelligence and Analytics Jena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar
1591 cover Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)
1592 cover Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123) Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor)
1593 cover Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity (The Human Element in Smart and Intelligent Systems) [1 ed.] Abbas Moallem (editor) 1
1594 cover Artificial Intelligence and Blockchain for Future Cybersecurity Applications (Studies in Big Data, 90) [1st ed. 2021] Yassine Maleh (editor), Youssef Baddi (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor) 1
1595 cover Artificial Intelligence for Cybersecurity (Advances in Information Security, 54) [1st ed. 2022] Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) 1
1596 cover Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools [1 ed.] Valentina Palacín 1
1597 cover Machine Intelligence and Big Data Analytics for Cybersecurity Applications Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi
1598 cover Offensive Intelligence: 300 Techniques, Tools and Tips to Know Everything [2 ed.] Philippe Dylewski 2
1599 cover Artificial Intelligence and Blockchain for Future Cybersecurity Applications [1 ed.] Yassine Maleh, Youssef Baddi, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani 1
1600 cover Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop
1601 cover Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler Ravi Devarasetty
1602 cover Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence, 978) Madhusudan Singh
1603 cover Cyber Security Intelligence and Analytics [1st ed.] Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh 1
1604 cover Cyber Intelligence: Actors, Policies, Practices Constance S. Uthoff
1605 cover Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147) [1 ed.] Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) 1
1606 cover Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction (SpringerBriefs in Computer Science) Hamidreza Alvari, Elham Shaabani, Paulo Shakarian
1607 cover Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities [1 ed.] Sanjay Misra (editor), Amit Kumar Tyagi (editor) 1
1608 cover Cyber Security, Artificial Intelligence, Data Protection & the Law Robert Walters, Marko Novak
1609 cover Artificial Intelligence, Cybersecurity and Cyber Defence Daniel Ventre
1610 cover Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques [1 ed.] Vinny Troia 1
1611 cover Artificial Intelligence, Cybersecurity and Cyber Defence Book Daniel Ventre
1612 cover Open Source Intelligence and Cyber Crime: Social Media Analytics [1st ed.] Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn 1
1613 cover Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II [1st ed.] Xingming Sun, Jinwei Wang, Elisa Bertino 1
1614 cover Combating Security Challenges in the Age of Big Data: Powered by State-of-the-Art Artificial Intelligence Techniques [1st ed.] Zubair Md. Fadlullah, Al-Sakib Khan Pathan 1
1615 cover Data Science In Cybersecurity And Cyberthreat Intelligence [1st Edition] Leslie F. Sikos, Kim-Kwang Raymond Choo 1
1616 cover Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I [1st ed.] Xingming Sun, Jinwei Wang, Elisa Bertino 1
1617 cover Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II [1st ed.] Xingming Sun, Zhaoqing Pan, Elisa Bertino 1
1618 cover Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part II [1st ed. 2019] Huansheng Ning 1
1619 cover Artificial Intelligence and Global Security: Future Trends, Threats and Considerations Yvonne R. Masakowski
1620 cover The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research Open Source Researchers
1621 cover Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146) Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)
1622 cover Artificial Intelligence and Security Challenges in Emerging Networks (Advances in Computational Intelligence and Robotics) [1 ed.] Ryma Abassi (editor) 1
1623 cover Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources US Department of Justice
1624 cover Cyber-Enabled Intelligence [1 ed.] Huansheng Ning (Editor), Liming Chen (Editor), Ata Ullah (Editor), Xiong Luo (Editor) 1
1625 cover The Threat Intelligence Handbook [2 ed.] Christopher Ahlberg 2
1626 cover The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics [1st ed.] Izzat Alsmadi 1
1627 cover Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147) Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)
1628 cover The Threat Intelligence Handbook [ebook ed.] Chris Pace (ed.)
1629 cover Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202 Richard Medlin, Nitin Sharma, Justin Casey
1630 cover The decision to attack: military and intelligence cyber decision-making [Paperback edition] Brantly, Aaron Franklin
1631 cover Practical cyber intelligence how action-based intelligence can be an effective response to incidents Wilson Bautista Jr
1632 cover International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and Intelligence [1st ed.] Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman 1
1633 cover Open Source (OSINT) Intelligence Gathering and Analysis - SANS SEC487 Micah Hoffman
1634 cover Big Data Security Shibakali Gupta (editor), Indradip Banerjee (editor), Siddhartha Bhattacharyya (editor)
1635 cover Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks) [1st ed. 2018] Darren Quick, Kim-Kwang Raymond Choo 1
1636 cover Cyber terrorism: a guide for facility managers [1 ed.] Gustin, Joseph F 1
1637 cover Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) [1 ed.] Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko 1
1638 cover Mathematics in cyber research Paul L. Goethals (editor), Natalie Michele Scala (editor), Daniel T. Bennett (editor)
1639 cover A Multidisciplinary Introduction to Information Security Mjolsnes, Stig F.
1640 cover Modern Cryptography Applied Mathematics for Encryption and Information Security William Easttom
1641 cover Modern Cryptograph.y Applied Mathematics for Encryption and Information Security [2 ed.] Chuck Easttom 2
1642 cover Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology [1 ed.] Nicholas J. Daras, Themistocles M. Rassias (eds.) 1
1643 cover A Human Readable Guide to Cyber Security Dane Christian
1644 cover Analyzing Human Behavior In Cyberspace Zheng Yan
1645 cover Advances in Human Factors in Cybersecurity [1st ed.] Tareq Z. Ahram, Denise Nicholson 1
1646 cover Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA [1st ed.] Isabella Corradini, Enrico Nardelli, Tareq Ahram 1
1647 cover Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA [1st ed.] Tareq Ahram, Waldemar Karwowski 1
1648 cover Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17–21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA Denise Nicholson (editor)
1649 cover Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (Lecture Notes in Networks and Systems) [1st ed. 2021] Matteo Zallio (editor), Carlos Raymundo Ibañez (editor), Jesus Hechavarria Hernandez (editor) 1
1650 cover Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Derrick Rountree
1651 cover Wireshark & Ethereal Network Protocol Analyzer Toolkit Angela Orebaugh, Gilbert Ramirez, Jay Beale, Joshua Wright
1652 cover X-Ways Forensics Practitioner's Guide [1 ed.] Brett Shavers, Eric Zimmerman 1
1653 cover Zen and the Art of Information Security [1 ed.] Ira Winkler 1
1654 cover Zero Day Mark Russinovich
1655 cover Zero Day Exploit: Countdown to Darkness [First Edition] Rob Shein, David Litchfield, Marcus Sachs
1656 cover Zero To Mastery In Information Security And Cyber Laws: No.1 Book To Become Zero To Hero In Information Security And Cyber Laws, This Amazing Book Covers ... Edition (Zero To Mastery Computer Series) Rajiv Jain, Vei Publishing
1657 cover Zero To Mastery In Network Security- No.1 Network Security Book To Become Zero To Hero In Network Security, This Amazing Network Security Book Covers A-Z ... Edition (Zero To Mastery Computer Series) Rajiv Jain, Vei Publishing, Ayaz Uddin (editor)
1658 cover Zero-Day Exploit Rob Shein, David Litchfield, Marcus Sachs
1659 cover The Cybersecurity Body of Knowledge-The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity [1 ed.] Daniel Shoemaker (Author), Anne Kohnke (Author), Ken Sigler (Author) 1
1660 cover Wireless security Maxim M, Pollino D.
1661 cover Distributed Denial of Service Attacks-Real-world Detection and Mitigation [1 ed.] İlker Özçelik (Author), Richard Brooks (Author) 1
1662 cover Network security: a beginner's guide [Third edition] Maiwald, Eric
1663 cover Hacking Exposed Mobile Security Secrets & Solutions Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse
1664 cover Ccsp Certified Cloud Security Professional All-In-One Exam Guide [ebook ed.] Daniel Carter
1665 cover CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition [4 ed.] Daniel Lachance, Glen E. Clarke 4
1666 cover Cryptography & Network Security (McGraw-Hill Forouzan Networking) [1 ed.] Behrouz Forouzan 1
1667 cover Network Security Portable Reference [1 ed.] Michael Horton 1
1668 cover Network Security Illustrated [1 ed.] Jason Albanese, Wes Sonnenreich 1
1669 cover Hacking Exposed Mobile: Security Secrets & Solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price
1670 cover Cryptography and network security Atul Kahate
1671 cover Network Security Illustrated
1672 cover Cryptography And Network Security [2 ed.] Atul Kahate 2
1673 cover CompTIA Security+ Certification Study Guide (Exam SY0-601) Glen E. Clarke
1674 cover Cipm Certified Information Privacy Manager All-In-One Exam Guide Peter H. Gregory
1675 cover Hacking exposed Web 2.0 : Web 2.0 security secrets and solutions Rich Cannings, Himanshu Dwivedi, Zane Lackey
1676 cover Comptia Security+ Certification Study Guide, Third Edition (Exam Sy0-501) [Third edition] Clarke, Glen E
1677 cover CIPM Certified Information Privacy Manager All-in-One Exam Guide [1 ed.] Peter Gregory 1
1678 cover Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions David Endler, Mark Collier
1679 cover Special OPS: Host and Network Security for Microsoft, Unix and Oracle [1st ed.] Joel Scambray, Stuart McClure 1
1680 cover CCSP Certified Cloud Security Professional. Exam Guide [3 ed.] 3
1681 cover Cryptography InfoSec Pro Guide [1 ed.] Sean-Philip Oriyano 1
1682 cover Network Security A Beginner’s Guide, Third Edition [3 ed.] Eric Maiwald 3
1683 cover Principles of Computer Security CompTIA Security+ and Beyond Lab Manual [2. Auflage.] Vincent J. Nestler, Gregory B. White, W. Arthur Conklin 2
1684 cover Firewalls complete. Marcus Goncalves
1685 cover Network security Eric Maiwald
1686 cover Principles of Computer Security - CompTIA Security+ and Beyond, 2nd Edition [2 ed.] Dr. Wm. Arthur Conklin, Dr. Gregory White, Dwayne Williams, Roger L. Davis, Chuck Cothren 2
1687 cover Botnets: The Killer Web Applications [3 ed.] David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi 3
1688 cover Cryptography InfoSec Pro Guide Sean-Philip Oriyano
1689 cover CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI) [1 ed.] Robert Larson 1
1690 cover Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Tyler Wrightson
1691 cover Hacking Exposed Web Applications [3rd edition] Liu, Vincent,Scambray, Joel,Sima, Caleb 3
1692 cover Hacking Exposed Wireless, 2nd Edition: Wireless Security Secrets and Solutions Johnny Cache, Joshua Wright, Vincent Liu
1693 cover CEH Certified Ethical Hacker All-in-One Exam Guide [1 ed.] Matt Walker 1
1694 cover CEH Certified Ethical Hacker all-in-one exam guide [2nd edition] Horton, Bradley B.,Walker, Matthew 2
1695 cover Ceh Certified Ethical Hacker All-In-One Exam Guide [Fourth edition] Walker, Matthew
1696 cover CEH Certified Ethical Hacker All-in-One Exam Guide [3rd edition] Walker, Matthew 3
1697 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition [5 ed.] Matt Walker 5
1698 cover Gray Hat Hacking - The Ethical Hacker's Handbook [2 ed.] Shon Harris, Allen Harper, Chris Eagle, and Jonathan Ness 2
1699 cover All in One CISSP Exam Guide [9 ed.] Fernando Maymí, Shon Harris 9
1700 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition, 4th Edition [4 ed.] Walker, Matt 4
1701 cover CEH Certified Ethical Hacker All-in-One Exam Guide, Premium Third Edition with Online Practice Labs (Allinone Exam Guides) [Hardcover ed.] Matt Walker
1702 cover Gray hat hacking : the ethical hacker’s handbook [4 ed.] Daniel Regalado et al. 4
1703 cover Hacking Exposed, 6th Edition: Network Security Secrets and Solutions Stuart McClure, Joel Scambray, George Kurtz
1704 cover Hacking Exposed. Linux [3 ed.] ISECOM 3
1705 cover CEH Certified Ethical Hacker Bundle Walker, Matt
1706 cover CEH Certified Ethical Hacker Exam Guide [3rd ed.] Matt Walker 3
1707 cover CEH Certified Ethical Hacker Bundle [5 ed.] Matt Walker 5
1708 cover CEH Certified Ethical Hacker Practice Exams [3 ed.] Matt Walker 3
1709 cover Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition [3 ed.] Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams 3
1710 cover CEH Certified Ethical Hacker Practice Exams [1 ed.] Matt Walker 1
1711 cover Hacking Exposed: Industrial Control Systems: ICS and SCADA Security Secrets and Solutions [First (1st) ed.] Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt 1
1712 cover Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims
1713 cover CEH Certified Ethical Hacker Practice Exams [5 ed.] Matt Walker 5
1714 cover Gray Hat Hacking The Ethical Hacker’s Handbook [5th ed.] coll. 5
1715 cover CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) Walker, Matt
1716 cover Gray Hat Hacking the Ethical Hacker’s Handbook coll.
1717 cover Computer Forensics InfoSec Pro Guide [1 ed.] David Cowen 1
1718 cover SSCP systems security certified practitioner: all-in-one exam guide [2nd edition] Gibson, Darril 2
1719 cover CEH Certified Ethical Hacker Practice Exams, Second Edition (All-in-One) Matt Walker
1720 cover CEH Certified Ethical Hacker Practice Exams, Fourth Edition [4 ed.] Matt Walker 4
1721 cover Hacking Exposed: Network Security Secrets & Solutions [3 ed.] Jean Letessier, Johann Rafelski 3
1722 cover Hacking Exposed: Network Security Secrets & Solutions [3rd ed.] Stuart McClure, Joel Scambray, George Kurtz 3
1723 cover Modern Cryptography: Applied Mathematics for Encryption and Information Security [1st ed.] Chuck Easttom 1
1724 cover Modern cryptography : applied mathematics for encryption and information security Easttom, Chuck
1725 cover CEH, Certified Ethical Hacker bundle [Third edition] Walker, Matthew
1726 cover CSSLP Certification All-in-One Exam Guide Arthur Conklin
1727 cover Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook [2 ed.] Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness 2
1728 cover Reverse Deception: Organized Cyber Threat Counter-Exploitation [1 ed.] Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones 1
1729 cover CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide [3 ed.] Wm. Arthur Conklin, Daniel Shoemaker 3
1730 cover Gray Hat Hacking: The Ethical Hacker's Handbook Allen Harper, Shon Harris, Jonathan Ness, Gideon Lenkey, Chris Eagle, Terron Williams 3
1731 cover CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Bobby E. Rogers
1732 cover CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002) [2 ed.] SPARKS 2
1733 cover Mike Meyers' CompTIA Security+ Certification Passport (Exam SY0-501) [Fifth edition] Dunkerley, Dawn
1734 cover Comptia Cysa+ Cybersecurity Analyst Certification Practice Exams (Exam Cs0-001) Rogers, Bobby E
1735 cover Hacking Exposed™ Web applications [1 ed.] Joel Scambray, Mike Shema 1
1736 cover Introduction to Cryptography and Network Security Behrouz A. Forouzan
1737 cover Certified Ethical Hacker Exam Guide [2 ed.] Matt Walker 2
1738 cover Reverse Deception: Organized Cyber Threat Counter-Exploitation [1st edition] Bodmer, Sean,Carpenter, Gregory,Jones, Jade,Kilger, Max 1
1739 cover Gray Hat Hacking: The Ethical Hacker's Handbook [6 ed.] Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost 6
1740 cover Information security: the complete reference [2 ed.] Mark Rhodes-Ousley 2
1741 cover Information Security The Complete Reference [2nd edition] Rhodes-Ousley, Mark 2
1742 cover Gray Hat Hacking: The Ethical Hacker's Handbook [1 ed.] Shon Harris 1
1743 cover Gray Hat Hacking: The Ethical Hacker's Handbook 2nd Edition [2 ed.] Shon Harris 2
1744 cover Gray Hat Hacking: The Ethical Hacker's Handbook Sixth Edition [6 ed.] Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost 6
1745 cover Hardening Network Infrastructure: Bulletproof Your Systems Before You Are Hacked! [1 ed.] Wes Noonan 1
1746 cover Seguridad informática para empresas y particulares Gonzalo Alvarez Marañón, Pedro Pablo Pérez Garía, Pedro Bustamante
1747 cover HackNotes(tm) Network Security Portable Reference [1 ed.] Michael Horton, Clinton Mugge 1
1748 cover Intrusion Detection and Prevention [1 ed.] Carl Endorf, Gene Schultz, Jim Mellander 1
1749 cover Gray Hat Hacking: The Ethical Hacker’s Handbook [2 ed.] Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness 2
1750 cover Extreme Exploits: Advanced Defenses Against Hardcore Hacks Victor Oppleman, Oliver Friedrichs, Brett Watson
1751 cover Gray Hat Hacking: The Ethical Hacker’s Handbook [6 ed.] Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huascar Tejeda, Moses Frost 6
1752 cover Hacker's Challenge 3 [3rd ed] Bradley, Tony,Dwivedi, Himanshu,Pennington, Bill,Pollino, David 3
1753 cover CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition [2 ed.] Peter Gregory 2
1754 cover Cism Certified Information Security Manager Practice Exams, Second Edition Peter H. Gregory
1755 cover CISM Certified Information Security Manager. Exam Guide [2 ed.] Peter H. Gregory 2
1756 cover Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios [Edition Unstated] Mike Schiffman
1757 cover CISSP All in One Exam Guide [4 ed.] 4
1758 cover Hacker's challenge: test your incident response skills using 20 scenarios Schiffman, Mike
1759 cover 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them [1 ed.] Michael Howard, David LeBlanc, John Viega 1
1760 cover Hacker’s challenge: test your incident response skills using 20 scenarios [First edition.] Mike Schiffman
1761 cover Incident Response & Computer Forensics [3 edition] Jason Luttgens, Matthew Pepe, Kevin Mandia 3
1762 cover CISSP All in one Exam Guide [8 ed.] Shon Harris, Fernando Maymí 8
1763 cover GCIH GIAC Certified Incident Handler All-in-One Exam Guide [1 ed.] Nick Mitropoulos 1
1764 cover Casp+ Comptia Advanced Security Practitioner Certification All-in-one Exam Guide, Exam Cas-003 Lane, Nicholas, Conklin, Arthur, White, Gregory B., Williams, Dwayne
1765 cover Incident Response and Computer Forensics [2 ed.] Chris Prosise, Kevin Mandia, Matt Pepe 2
1766 cover The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration [1st ed.] Guy Hart-Davis 1
1767 cover CISSP All-in-One Exam Guide [7th edition] Harris, Shon,Maymi, Fernando 7
1768 cover CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide Brooks, Charles L
1769 cover Security Sage's Guide to Hardening the Network Infrastructure [4 ed.] Stuart McClure 4
1770 cover CISSP All-in-One Exam Guide [Eighth edition] Maymi, Fernando,Harris, Shon
1771 cover Hacking Exposed [5 ed.] Stuart McClure, Joel Scambray, George Kurtz 5
1772 cover Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition [Paperback ed.] Lee Reiber
1773 cover Hacking Exposed - Linux: Linux Security Secrets
1774 cover CISSP All-in-One Exam Guide, [9 ed.] Fernando Maymi, Shon Harris 9
1775 cover Hacking Exposed [2nd ed] Cowen, David,Davis, Chris,Philipp, Aaron 2
1776 cover CISSP All-in-One Exam Guide, Fifth Edition [5 ed.] Shon Harris 5
1777 cover People-centric security : transforming your enterprise security culture [1 ed.] Hayden, Lance 1
1778 cover Hacking exposed 6 : network security secrets & solutions Stuart McClure, Joel Scambray, George Kurtz
1779 cover Hacking exposed 6: network security secrets & solutions [10th anniversary ed] McClure, Stuart,Scambray, Joel,Kurtz, George 10
1780 cover CC Certified in Cybersecurity All-in-One Exam Guide [1 ed.] Jordan Genung, Steven Bennett 1
1781 cover CISSP Certification All-in-One Exam Guide [4 ed.] Shon Harris 4
1782 cover Mobile application security Himanshu Dwivedi, Chris Clark, David V Thiel
1783 cover CompTIA PenTest+ Certification All-in-One Exam Guide [2 ed.] Heather Linn, Raymond Nutting 2
1784 cover Hacking Exposed 7. Network Security Secrets and Solutions [7th Edition] Stuart McClure and Joel Scambray 7
1785 cover CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-002) Heather Linn
1786 cover CompTIA PenTest+ certification all-in-one exam guide (exam PT0-001) Nutting, Raymond
1787 cover Hacking Exposed 7: Network Security Secrets & Solutions [7 ed.] Stuart McClure, Joel Scambray, George Kurtz 7
1788 cover Comptia Pentest+ Certification All-In-One Exam Guide, Second Edition (Exam Pt0-002) Heather Linn, Raymond Nutting
1789 cover CompTIA PenTest+ certification practice exams (exam PT0-001) Ammerman, Jonathan
1790 cover Hacking exposed Cisco networks: Cisco security secrets & solutions Vladimirov, Andrew A
1791 cover CISSP Passport Bobby E. Rogers
1792 cover Hacking exposed computer forensics : secrets & solutions [2nd ed] Aaron Philipp, David Cowen, Chris Davis, CISSP 2
1793 cover CISSP Practice Exams [5 ed.] Shon Harris, Jonathan Ham 5
1794 cover CCISO Certified Chief Information Security Officer All-in-One Exam Guide Steve Bennett, Jordan Genung
1795 cover Mike Meyers CompTIA Security+ Certification Passport (Exam SY0-601) Dawn Dunkerley
1796 cover Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity Leeza Garber, Scott Olson
1797 cover Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems [1 ed.] G. B. Baecher 1
1798 cover Cognitive hack : the new battleground in cybersecurity... the human mind [1 ed.] Bone, James 1
1799 cover Cyber Deception: Techniques, Strategies, and Human Aspects Tiffany Bao, Milind Tambe, Cliff Wang
1800 cover Cyber Security Social Engineering - Hacking Human Firewalls Nishad, Bharat Bhuval
1801 cover Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications [1st ed.] Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger 1
1802 cover Die Kunst des Human Hacking: Social Engineering in der Praxis Christopher Hadnagy
1803 cover Cyber justice : human rights and good governance for the internet Mihr, Anja
1804 cover Cybersecurity Systems for Human Cognition Augmentation [1 ed.] Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.) 1
1805 cover Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factor [2 ed.] Andreas Von Grebmer 2
1806 cover From Encryption to Quantum Computing: The Governance of Information Security and Human Rights Ot van Daalen
1807 cover Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings [1st ed.] Nathan Clarke, Steven Furnell 1
1808 cover Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, ... and Communication Technology, 613) [1st ed. 2021] Steven Furnell (editor), Nathan Clarke (editor) 1
1809 cover Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings Tryfonas, Theo
1810 cover Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings [1 ed.] Theo Tryfonas, Ioannis Askoxylakis (eds.) 1
1811 cover Hacking the human: social engineering techniques and security countermeasures Ian Mann
1812 cover Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, ... and Communication Technology, 658) Nathan Clarke (editor), Steven Furnell (editor)
1813 cover Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings [1 ed.] Theo Tryfonas (eds.) 1
1814 cover Human Aspects of Information Security, Privacy, and Trust: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings [1 ed.] Sourav Bhuyan, Joel S. Greenstein, Kevin A. Juang (auth.), Louis Marinos, Ioannis Askoxylakis (eds.) 1
1815 cover Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings [1 ed.] Theo Tryfonas, Ioannis Askoxylakis (eds.) 1
1816 cover Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings ... and Communication Technology, 674) [1st ed. 2023] Steven Furnell (editor), Nathan Clarke (editor) 1
1817 cover Human Hacking Christopher Hadnagy
1818 cover Human Dimensions of Cybersecurity [1 ed.] Terry Bossomaier, Steven D'Alessandro, Roger Bradbury 1
1819 cover Human Factors Analysis of 23 Cyberattacks Moallem, Abbas
1820 cover Human Hacked: My Life and Lessons as the World’s First Augmented Ethical Hacker [1 ed.] Len Noe 1
1821 cover Hypermedia Seduction for Terrorist Recruiting - Volume 25 NATO Science for Peace and Security Series: Human and Societal Dynamics (Nato Science for Peace and Security) B. Ganor, K. Von Knop, C. Duarte
1822 cover Human-Centered Security Heidi Trost
1823 cover Humans and Cyber Security: How Organisations Can Enhance Resilience Through Human Factors Widdowson, Amanda
1824 cover Human-computer interaction and cybersecurity handbook Moallem, Abbas
1825 cover Internet Freedom Software and Illicit Activity : Supporting Human Rights Without Enabling Criminals [1 ed.] Sasha Romanosky, Martin C. Libicki, Zev Winkelman, Olesya Tkacheva 1
1826 cover Invisible Threats: Financial and Information Technology Crimes and National Security, Volume 10 NATO Security through Science Series: Human and Societal Dynamics (Nato Security Through Science) U. Gori, I. Paparela
1827 cover Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert Ozkaya, Erdal
1828 cover Learn Social Engineering Learn the art of human hacking with an internationally renowned expert Erdal Ozkaya
1829 cover Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for Peace and Security Series - E: Human and Societal Dynamics U. Gori
1830 cover Managing the Human Factor in Information Security: How to win over staff and influence business managers [1 ed.] David Lacey 1
1831 cover Psybersecurity Human Factors of Cyber Defence Oliver Guidetti, Mohiuddin Ahmed, Craig Speelman
1832 cover Research agenda. The human factor in cybercrime and cybersecurity. Eric Rutger Leukfeldt
1833 cover Resistance, liberation technology and human rights in the digital age [1 ed.] Giovanni Ziccardi (auth.) 1
1834 cover Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility Emily B. Laidlaw
1835 cover Security The Human Factor Paul Kearney
1836 cover Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception [1 ed.] Vince Reynolds 1
1837 cover Social Engineering: The Art of Human Hacking Hadnagy, Christopher(Foreword),Wilson, Paul(Foreword)
1838 cover Social Engineering: The Science of Human Hacking Hadnagy, Christopher
1839 cover Stopping Human Hacks Ira Winkler, Tracy Celaya
1840 cover Techniques and applications for advanced information privacy and security: emerging organizational, ethical, and human issues Hamid R. Nemati, Hamid R. Nemati
1841 cover Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy) [1 ed.] Hamid R. Nemati 1
1842 cover Surveillance Law, Data Retention and Human Rights: A Risk to Democracy Matthew White
1843 cover The Android Malware Handbook: Detection and Analysis by Human and Machine Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, Yanhai Xiong
1844 cover The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity Cesar Bravo, Desilda Toska
1845 cover The Human Firewall: Wie eine Kultur der Cyber-Sicherheit geschaffen wird Florian Jörgens
1846 cover The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer [1 ed.] Perry Carpenter, Kai Roer 1
1847 cover Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools [1 ed.] Abbas Moallem 1
1848 cover Unmasking the Social Engineer: The Human Element of Security [1 ed.] Christopher Hadnagy, Paul Kelly F., Paul Ekman 1
1849 cover The art of intrusion: the real stories behind the exploits of hackers, intruders & deceivers Simon, William L., Mitnick, Kevin David
1850 cover The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers [1 ed.] Kevin D. Mitnick, William L. Simon 1
1851 cover The Stories of My Hackers and I Beatrice, Mrs, Walsh, Lin
1852 cover Information Security Analyst Wil Mara
1853 cover Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers [1 ed.] Ping Li, Bing Sun, Chao Li (auth.), Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing (eds.) 1
1854 cover Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door Brian Krebs
1855 cover Exam Ref SC-100 Microsoft Cybersecurity Architect [1 ed.] Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez 1
1856 cover Look Both Ways: Help Protect Your Family on the Internet [1 ed.] Linda Criddle 1
1857 cover Exam Ref MS-101 Microsoft 365 Mobility and Security Brian Svidergol, Bob Clements
1858 cover A Cryptography Primer: Secrets and Promises [draft ed.] Klein P.N.
1859 cover Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century! Occupytheweb
1860 cover Hunting Security Bugs [1 ed.] Tom Gallagher, Lawrence Landauer, Bryan Jeffries 1
1861 cover Analysis and design of networked control systems under attacks Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan
1862 cover Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion Jim Harrison, Yuri Diogenes, Mohit Saxena, Tom Shinder
1863 cover Project Zero Trust: A Story about a Strategy for Aligning Security and the Business [1 ed.] George Finney 1
1864 cover Deploying Secure 802 11 Wireless Networks with Microsoft Windows
1865 cover Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant Bud Ratliff, Jason Ballard
1866 cover Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers [1 ed.] Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo (auth.), Heung Youl Youm, Moti Yung (eds.) 1
1867 cover Microsoft Azure Sentinel Yuri Diogenes, Nicholas Dicola, Jonathan Trull
1868 cover Maintaining Network Separations with Trusted Solaris 8 Software Sun Microsystems, Inc.
1869 cover Hacked: the inside story of America's struggle to secure cyberspace Charlie Mitchell
1870 cover Security Threat Mitigation And Response : Understanding Cisco Security Mars (642-544) Tesch, Dale., Greg Abelar
1871 cover Microsoft Azure Sentinel: Planning and implementing Microsoft s cloud-native SIEM solution Jonathan Trull, Nicholas DiCola, Yuri Diogenes
1872 cover She’s In CTRL: How women can take back tech – to communicate, investigate, problem-solve, broker deals and protect themselves in a digital world Anne Imafidon
1873 cover Surviving a Ransomware Attack with Azure Site Recovery Dave Kawula, Emile Cabot, Cary Sun, Cristal Kawula, John O'Neill Sr.
1874 cover Exam Ref AZ-500 Microsoft Azure Security Technologies Yuri Diogenes , Orin Thomas
1875 cover Computer Security in the 21st Century [1 ed.] D.T. Lee, S. P. Shieh, J. Doug Tygar 1
1876 cover Security monitoring with Cisco security MARS Includes index Halleen, Gary, Kellogg, Greg
1877 cover Cutthroat: high stakes & killer moves on the electronic frontier Stephen Keating
1878 cover Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science, 1683) Luis Bathen (editor), Gokay Saldamli (editor), Xiaoyan Sun (editor), Thomas H. Austin (editor), Alex J. Nelson (editor)
1879 cover The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting (Business Skills) [1 ed.] Mark Morowczynski, Rod Trent, Matthew Zorich 1
1880 cover MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server 2003 Network Roberta Bragg
1881 cover Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science) [1st ed. 2021] Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) 1
1882 cover Secure and Trustworthy Transportation Cyber-Physical Systems [1 ed.] Yunchuan Sun,Houbing Song (eds.) 1
1883 cover MCSA/MCSE Self-paced Training Kit (exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 [1 ed.] Stan Reimer, Orin Thomas 1
1884 cover Cyber Security Defense with Microsoft Defender Kawula, Dave, O'Neill Sr, John, Kawula, Cristal, Cabot, Emile, Sun, Cary
1885 cover Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia Sarah Katz
1886 cover Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century [1 ed.] Demetrius Klitou (auth.) 1
1887 cover Web and Information Security Ferrari E.
1888 cover CISSP Training Kit David R. Miller
1889 cover Information Security and Ethics: Social and Organizational Issues Marian Quigley
1890 cover Internet Policy in China : A Field Study of Internet Cafés Helen Sun
1891 cover Reinventing Cybersecurity [1 ed.] Jasmine Henry, Alison Gianotto, Coleen Shane, Tracy Bannon, Dr. Meg Layton, Breanne Boland, Angela Marafino, Latha Maripuri, Carlota Sage, Carla Sun 1
1892 cover Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski
1893 cover Exam Ref AZ-500 Microsoft Azure Security Technologies Yuri Diogenes, Orin Thomas
1894 cover Breaking and Entering: The Extraordinary Story of a Hacker Called 'Alien' Jeremy Smith, Sue Buswell (editor)
1895 cover The news machine : hacking : the untold story Hanning, James, Mulcaire, Glenn
1896 cover Enumerating Esoteric Attack Surfaces: Recon for Bug Bounty Hunters, Penetration Testers and OSINT Aggressors Jann Moon
1897 cover International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors U. S. Department Of Defense, Strategic Studies Institute, United States Army War College, Department Of Homeland Security, Federal Bureau Of Investigation
1898 cover Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals [2 ed.] Yuri Diogenes, Nicholas DiCola, Kevin McKinnerney, Mark Morowczynski 2
1899 cover Out of the Inner Circle. A Hacker's Guide to Computer Security Bill Landreth, Howard Rheingold
1900 cover Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III [1st ed.] Xingming Sun, Zhaoqing Pan, Elisa Bertino 1
1901 cover What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century Shimon Brathwaite
1902 cover What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century [1 ed.] Shimon Brathwaite 1
1903 cover CISSP Rapid Review Darril Gibson
1904 cover Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II [1 ed.] Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino (eds.) 1
1905 cover Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks [1st ed.] Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun 1
1906 cover How to do Privacy in the 21st Century: The True Story of Hacktivism [1 ed.] Peter Burnett, Valeria Vescina 1
1907 cover MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft® Internet Security and Acceleration Server 2004 Reimer Stan
1908 cover Microsoft Azure Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution (IT Best Practices - Microsoft Press) [2 ed.] Yuri Diogenes, Nicholas DiCola, Tiander Turpijn 2
1909 cover Hacking Cyberspace David J. Gunkel
1910 cover Project Zero Trust : A Story about a Strategy for Aligning Security and the Business Finney, George,Kindervag, John,
1911 cover Microsoft Internet Security and Acceleration (ISA) Server 2000: Administrator's Pocket Consultant [illustrated edition] Jason Ballard, Bud Ratliff
1912 cover The Darkest Web Drugs, death and destroyed lives ... the inside story of the internet’s evil twin Eileen Ormsby
1913 cover The Hacker Crackdown: Law and Disorder on the Electronic Frontier Michael Bruce Sterling
1914 cover Analysis and design of networked control systems under attacks [First edition] Guo, Lei, Sun, Fuchun, Yang, Hongjiu, Yuan, Yuan
1915 cover Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings [1 ed.] Ruilin Li, Bing Sun, Chao Li, Longjiang Qu (auth.), Ron Steinfeld, Philip Hawkes (eds.) 1
1916 cover A British Hacker in America: The story of PMF & 'Operation Cybersnare' - The U.S. Secret Service's first online sting Pmf
1917 cover Improving Web Application Security: Threats and Countermeasures [1 ed.] Microsoft Corporation 1
1918 cover Exam Ref AZ-700 Designing and Implementing Microsoft Azure Networking Solutions [1 ed.] Charles Pluta 1
1919 cover Assessing Network Security Kevin Lam, David LeBlanc, Ben Smith
1920 cover Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II [1st ed.] Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena 1
1921 cover Internet Wars: The Struggle for Power in the 21st Century [1st ed.] Fergus Hanson 1
1922 cover Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World Stefanick, Lorna
1923 cover Economics of Information Security and Privacy III [1 ed.] Sam Ransbotham, Sabyasachi Mitra (auth.), Bruce Schneier (eds.) 1
1924 cover Economics of Information Security (Advances in Information Security) [1 ed.] L. Jean Camp, Stephen Lewis 1
1925 cover Securing Freedom in the Global Commons (Stanford Security Studies) Scott Jasper
1926 cover Cyber Terrorism: Political And Economic Implications Andrew M. Colarik
1927 cover Cybersecurity Investments: Decision Support Under Economic Aspects [1 ed.] Stefan Beissel (auth.) 1
1928 cover Protecting America's Freedom in the Information Age (A Report of the Markle Foundation Task Force) Zoe Baird, James Barksdale
1929 cover Dark Web and Deep Web: Place of anonymity and freedom of expression Smin Oienen
1930 cover The Economics of Information Security and Privacy [1 ed.] Matthias Brecht, Thomas Nowey (auth.), Rainer Böhme (eds.) 1
1931 cover Cyber War and Cyber Peace: Digital Conflict in the Middle East Mike Sexton, Eliza Campbell (editors)
1932 cover Digital Whoness: Identity, Privacy And Freedom In The Cyberworld [1st Edition] Rafael Capurro, Michael Eldred, Daniel Nagel 1
1933 cover OECD guidelines for the security of information systems and networks : towards a culture of security = Lignes directrices de l’OCDE régissant la sécurité des systèmes et réseaux d’information : vers un culture de la sécurité. OECD
1934 cover The real cyber war : the political economy of Internet freedom [1st Edition] Jablonski, Michael, Powers, Shawn M 1
1935 cover The Economics of Computer Hacking Peter T., Christopher J.
1936 cover Digital whoness : identity, privacy and freedom in the cyberworld Capurro, Rafael, Eldred, Michael, Nagel, Daniel
1937 cover Hacking University: Mobile Phone & App Hacking & Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps & Precisely ... (Hacking Freedom and Data Driven Book 5) Isaac D. Cody
1938 cover This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information Andy Greenberg
1939 cover Information Security Across Federal Agencies: Analysis Of Adequacy And Effectiveness Shane Palmer
1940 cover Developing a Cybersecurity Immune System for Industry 4.0 Sergei Petrenko (author)
1941 cover Managing Information Risk and the Economics of Security (Medizinische Informatik Und Satistik) [1 ed.] M. Eric Johnson 1
1942 cover Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 [1 ed.] Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) 1
1943 cover This machine kills secrets: how WikiLeakers, cypherpunks, and hacktivists aim to free the world’s information Andy Greenberg
1944 cover Data Security and Privacy in Massachusetts [2 ed.] Stephen Y. Chow (editor) 2
1945 cover The Privacy Handbook: Proven Countermeasures for Combating Threats to Privacy, Security, and Personal Freedom Michael E. Chesbro
1946 cover Economics of Identity Theft: Avoidance, Causes and Possible Cures [1 ed.] L. Jean Camp 1
1947 cover Encryption Works : How to Protect Your Privacy in the Age of NSA Surveillance Micah Lee
1948 cover Take control of your online privacy Joe Kissell
1949 cover Implementing NAP and NAC security technologies : the complete guide to network access control Daniel Hoffman
1950 cover Mastering Kali Linux for Advanced Penetration Testing [all] Robert W. Beggs
1951 cover Official (Isc)2 Guide to the Issmp Cbk
1952 cover Risk management solutions for Sarbanes-Oxley section 404 IT compliance John S Quarterman
1953 cover Network Intrusion Detection [3rd ed] Stephen Northcutt, Judy Novak 3
1954 cover Nmap Cookbook: The Fat-free Guide to Network Scanning Nicholas Marsh
1955 cover Web Penetration Testing with Kali Linux Joseph Muniz, Aamir Lakhani
1956 cover Network Security Bible [1 ed.] Eric Cole, Ronald L. Krutz, James Conley 1
1957 cover Phishing : cutting the identity theft line Rachael Lininger, Russell Dean Vines
1958 cover Least privilege security for Windows 7, Vista, and XP : secure desktops for regulatory compliance and business agility Russell Smith
1959 cover CEH : official certified ethical hacker review guide Kimberly Graves
1960 cover Digital Crime and Forensic Science in Cyberspace [illustrated edition] et al, Panagiotis Kanellis
1961 cover Firewalls For Dummies [2nd ed] Brian Komar, Ronald Beekelaar, Joern Wettern 2
1962 cover Integrating security and software engineering: advances and future visions [illustrated edition] Haralambos Mouratidis, Haralambos Mouratidis, Paolo Giorgini
1963 cover PCI DSS : a Pocket Guide Alan Calder, Nicki Carter
1964 cover The Perfect Weapon War, Sabotage, and Fear in the Cyber Age Sanger, David E
1965 cover Nmap 6 ;a complete guide to mastering Nmap 6 and its scripting engine, covering practical tasks for penetration testers and system administrators: network exploration and security auditing cookbook Calderon Pale, Paulino
1966 cover Instant Metasploit starter Ranganath, Karthik
1967 cover Snort for Dummies Charlie Scott, Paul Wolfe, Bert Hayes
1968 cover Understanding Cyber Threats and Attacks Ph.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor)
1969 cover Mission-critical security planner : when hackers won't take no for an answer Eric Greenberg
1970 cover Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and L7-filter Gheorghe, Lucian, Dempster, Barrie
1971 cover Handbook of security and networks Chen, Hui,Li, Frank Haizhon,Xiao, Yang
1972 cover Penetration testing protecting networks and systems Henry, Kevin M
1973 cover Internet Firewalls and Network Security [2nd ed] Chris Hare, Karanjit Siyan 2
1974 cover An Introduction to Computer Security: The NIST Handbook Barbara Guttman
1975 cover Practical Core Software Security: A Reference Framework James F Ransome, Mark S Merkow, Anmol
1976 cover Vulnerability Management [1 ed.] Park Foreman 1
1977 cover Hacking for Dummies Kevin Beaver, Stuart McClure
1978 cover Securing SCADA Systems Ronald L. Krutz
1979 cover How To Hack Like a Ghost Sparc Flow
1980 cover Rethinking Cybercrime: Critical Debates Tim Owen, Jessica Marshall
1981 cover Information Security Program Guide: Company Policies, Departmental Procedures, IT Standards & Guidelines Resource, Cyber Security
1982 cover Innovative Security Solutions for Information Technology and Communications: 14th International Conference, SecITC 2021, Virtual Event, November ... Papers (Lecture Notes in Computer Science) Peter Y.A. Ryan (editor), Cristian Toma (editor)
1983 cover Handbook Certified Data Protection Officer: Practical Work Plan Guidance Kadir, Romeo
1984 cover Cybersecurity Fundamentals Rajesh Kumar Goutam
1985 cover Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment [2 ed.] Pascal Ackerman 2
1986 cover Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents Erdal Ozkaya
1987 cover Adversary-Aware Learning Techniques and Trends in Cybersecurity [1st ed. 2021] Prithviraj Dasgupta (editor), Joseph B. Collins (editor), Ranjeev Mittu (editor) 1
1988 cover World Internet Development Report 2019: Blue Book for World Internet Conference, Translated by CCTB Translation Service Chinese Academy of Cyberspace Studies
1989 cover Hack Online Stalkers, Hackers, & Visitors - Get & Trace IPs FOR REAL. ghost4815
1990 cover Cybersecurity in Digital Transformation: Scope and Applications Dietmar P.F. Möller
1991 cover Financial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers (Security and Cryptology) Matthew Bernhard (editor), Andrea Bracciali (editor), Lewis Gudgeon (editor), Thomas Haines (editor), Ariah Klages-Mundt (editor), Shin'ichiro Matsuo (editor), Daniel Perez (editor), Massimiliano Sala (editor), Sam Werner (editor)
1992 cover Sensemaking for Security (Advanced Sciences and Technologies for Security Applications) Anthony J. Masys (editor)
1993 cover Information Security and Cryptology: 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020, Revised Selected Papers (Lecture Notes in Computer Science) Yongdong Wu (editor), Moti Yung (editor)
1994 cover Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196) [1st ed. 2021] Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor) 1
1995 cover Ransomware Revolution: The Rise Of A Prodigious Cyber Threat [85, 1st Edition] Matthew Ryan 1
1996 cover THE ADVANCED PENETRATING TESTING : Step-By-Step Guide To Ethical Hacking and Penetration Testing Made Easy JEFF, DR. PATRICK
1997 cover Secrets of Grey Hat Hacker - The Playbook of a Genius [1, 1 ed.] Genuis stuff 1
1998 cover Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 [1 ed.] Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor) 1
1999 cover THE NEW CYBERSECURITY FOR BEGINNERS AND DUMMIES: Extensive Guide To Getting Started In Cybersecurity JEFF, DR. PATRICK
2000 cover Attribution als Herausforderung für EU-Cybersanktionen : Eine Analyse von WannaCry, NotPetya, Cloud Hopper, Bundestag-Hack, OVCW Annegret Bendiek, Matthias Schulze
2001 cover Backdoor: Bypassing the Gatekeepers in Cybersecurity Femi Reis
2002 cover Privacy, Regulations, and Cybersecurity Chris Moschovitis
2003 cover CEH v11 Certified Ethical Hacker Study Guide [1 ed.] Ric Messier 1
2004 cover The Ultimate Guide on Cybersecurity + Data Science: 2 Books in 1. From Big Data to Knowledge Management + Data Analytics with R and the Blockchain for Your Business Success Adam Walker, Keith Hughes
2005 cover Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II [1 ed.] Elisa Bertino, Haya Shulman, Michael Waidner 1
2006 cover Hackear a Coyote [1 ed.] Alan Mills 1
2007 cover Distributed Denial of Service Attacks Rajeev Singh, Mangey Ram
2008 cover Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings Mirosław Kutyłowski, Jun Zhang, Chao Chen
2009 cover Security Risk Models for Cyber Insurance David Rios Insua, Caroline Baylon, Jose Vila
2010 cover How to Hack Like a Ghost: Breaching the Cloud Sparc Flow
2011 cover Frontiers in Cyber Security: 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers (Communications in Computer and Information Science) Chunjie Cao (editor), Yuqing Zhang (editor), Yuan Hong (editor), Ding Wang (editor)
2012 cover The New Penetrating Testing for Beginners: Essential Guide to Ethical Hacking and Penetration Testing Made Easy Wilfred Dawson
2013 cover Recent Trends in Blockchain for Information Systems Security and Privacy [1 ed.] Ajith Abraham, Amit Kumar Tyagi 1
2014 cover CyberBRICS: Cybersecurity Regulations In The BRICS Countries [1st Edition] Luca Belli 1
2015 cover Cybersecurity Research Analysis Report for Europe and Japan: Cybersecurity and Privacy Dialogue Between Europe and Japan [1st ed.] Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc 1
2016 cover ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability David Brewer
2017 cover Modern-Cryptography-Proof Techniques and Implementations
2018 cover Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare A.J. Jenkinson
2019 cover 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business [1 ed.] Kim Crawley 1
2020 cover Cyberspace in Peace and War [2 ed.] Martin Libicki 2
2021 cover Modern Cryptography for Cybersecurity Professionals Lisa Bock
2022 cover Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents Glen D. Singh
2023 cover Research Anthology on Business Aspects of Cybersecurity Information Reso Management Association
2024 cover Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, ... Selected Papers (Security and Cryptology) Sokratis Katsikas (editor), Costas Lambrinoudakis (editor), Nora Cuppens (editor), John Mylopoulos (editor), Christos Kalloniatis (editor), Weizhi Meng (editor), Steven Furnell (editor), Frank Pallas (editor), Jörg Pohle (editor)
2025 cover Hacking by Samuel, Cyrus Samuel, Cyrus
2026 cover Kali Linux Penetration Testing Bible [1 ed.] Gus Khawaja 1
2027 cover Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity (Information Security and Cryptography) [1st ed. 2021] Yan Lin 1
2028 cover The Complete Guide to Hacking Wilfred Dawson
2029 cover Network Security And Cyber Defense (CNSS) Singh, Gurpej
2030 cover CRISC Exam Complete Preparation NEW (Isaca): Pass your Exam On the First Try (Latest Questions & Detailed Explanation) Daccache, Georgio
2031 cover Fortigate Admin Crash Course. Part 1 Ofer Shmueli
2032 cover Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell
2033 cover EC-Council Certified Ethical Hacker Unknown
2034 cover Cybersecurity and Third-Party Risk: Third Party Threat Hunting [1 ed.] Gregory C. Rasner 1
2035 cover Modern Cryptography for Cyber Security Professionals(2021)[Bock][9781838644352] Lisa Bock
2036 cover Cryptography and Network Security: An Introduction [1 ed.] R. Achary 1
2037 cover Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I Shiho Moriai, Huaxiong Wang
2038 cover Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez
2039 cover China Internet Development Report 2021: Blue Book for World Internet Conference Chinese Academy of Cyberspace Studies
2040 cover Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 2 (Advances in Intelligent Systems and Computing, 1300) Aboul Ella Hassanien (editor), Siddhartha Bhattacharyya (editor), Satyajit Chakrabati (editor), Abhishek Bhattacharya (editor), Soumi Dutta (editor)
2041 cover Hacking: A Beginners Guide to Read How to Hack Websites, Wireless Networks, Manage with Social Engineering, Make a Penetration Test, and Maintain Your Computer Safe Samuel, Cyrus
2042 cover COMPUTER HACKING SYSTEM: A STEP BY STEP GUIDE ON HACKING ENCYCLOPEDIA GREGORY PH.D, LISA H.
2043 cover CompTIA Security+ Review Guide James Michael Stewart
2044 cover How Cybersecurity Really Works Sam Grubb
2045 cover Advanced Smart Computing Technologies in Cybersecurity and Forensics [1 ed.] Keshav Kaushik (editor), Shubham Tayal (editor), Akashdeep Bhardwaj (editor), Manoj Kumar (editor) 1
2046 cover 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
2047 cover Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer [1 ed.] Jean-Philippe Aumasson 1
2048 cover Privacy by Design for the Internet of Things: Building accountability and security Andrew Crabtree (editor), Hamed Haddadi (editor), Richard Mortier (editor)
2049 cover Cyberwars in the Middle East Ahmed Al-Rawi
2050 cover The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments [3 ed.] Douglas Landoll 3
2051 cover TEXTBOOK OF Cryptography and Network Security: For BE/B.TECH/BCA/MCA/ME/M.TECH/Diploma/B.Sc/M.Sc/BBA/MBA/Competitive Exams & Knowledge Seekers NARAYANAMOORTHI, VIKRAMAN
2052 cover Dark Web Investigation [1st Edition] Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson 1
2053 cover The GDPR Challenge: Privacy, Technology, and Compliance in an Age of Accelerating Change [1 ed.] Amie Taal (editor) 1
2054 cover The Official (ISC)2 CISSP CBK Reference [6 ed.] Arthur J. Deane, Aaron Kraus 6
2055 cover Data Science and Security: Proceedings of IDSCS 2021 (Lecture Notes in Networks and Systems, 290) [1st ed. 2021] Samiksha Shukla (editor), Aynur Unal (editor), Joseph Varghese Kureethara (editor), Durgesh Kumar Mishra (editor), Dong Seog Han (editor) 1
2056 cover Adversarial Tradecraft in Cybersecurity(2021)[Borges][9781801076203] Borges
2057 cover Master Hacking, Master The Tools: Understanding Process Of Hacking, Notions of Linux, Linux Mint, Kali Linux, Penetrating Tests And More: Kali Linux Tools List Baltzley, Barton
2058 cover The Art of Attack : Attacker Mindset for Security Professionals Maxie Reynolds
2059 cover Cyberjutsu: Cybersecurity for the Modern Ninja [1 ed.] Ben McCarty 1
2060 cover CYBERSECURITY MANUAL FOR BEGINNERS : Counter present day dangers and utilize best in class devices and methods to secure your association against cybercriminals FORD, ALLAN
2061 cover A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
2062 cover Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings [1st ed. 2021] Mikael Asplund, Simin Nadjm-Tehrani 1
2063 cover Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers [1 ed.] Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li 1
2064 cover How to get a job in cybersecurity earning over six figures : Zero to Cyber Hero Lina Lau
2065 cover Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II Shiho Moriai, Huaxiong Wang
2066 cover Progress in Cryptology – LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, ... 2021, Proceedings (Security and Cryptology) Patrick Longa (editor), Carla Ràfols (editor)
2067 cover CISSP Exam Cram 5th Edition [5 ed.] Michael Gregg 5
2068 cover Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Vickie Li
2069 cover Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing) Akashdeep Bhardwaj (editor), Varun Sapra (editor)
2070 cover Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1 [1] Aboul Ella Hassanien, Siddhartha Bhattacharyya, Satyajit Chakrabati, Abhishek Bhattacharya, Soumi Dutta 1
2071 cover Cyberjutsu McCarty, Ben
2072 cover Network and System Security: 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings (Security and Cryptology) Min Yang (editor), Chao Chen (editor), Yang Liu (editor)
2073 cover Data-Centric Business and Applications: ICT Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity [5, 1 ed.] Tamara Radivilova, Dmytro Ageyev, Natalia Kryvinska 1
2074 cover Auditing Information and Cyber Security Governance: A Controls-Based Approach [1 ed.] Robert E. Davis 1
2075 cover Transforming Cybersecurity Solutions Using Blockchain [1st Edition] Rashmi Agrawal, Neha Gupta 1
2076 cover Cyber Threats in Healthcare: Understanding Risks and Mitigation Nina Godbole
2077 cover Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones Marco Grassi (@marcograss), Xingyu Chen (@0xKira233)
2078 cover Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks [1 ed.] Chris Peiris, Binil Pillai, Abbas Kudrati 1
2079 cover Exam SY0-601: Comptia Security + David Seidl
2080 cover CompTIA Security+ Study Guide: Exam SY0-601 [8 ed.] Mike Chapple, David Seidl 8
2081 cover The Hackers Codex: Modern Web Application Attacks Demystified Wieser, Brandon
2082 cover Nanoelectronic Devices for Hardware and Software Security (Security, Privacy, and Trust in Mobile Communications) [1 ed.] Arun Kumar Singh (editor), Balwinder Raj (editor) 1
2083 cover Building an Effective Security Program for Distributed Energy Resources and Systems [1 ed.] Mariana Hentea 1
2084 cover CISSP: Certified Information Systems Security Professional Deane, Arthur J.,Kraus, Aaron,, Aaron Kraus
2085 cover How Cybersecurity Really Works: A Hands-On Guide for Total Beginners [1 ed.] Sam Grubb 1
2086 cover Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2087 cover The Game Has Changed:: Small Business Security And IT Advice In The Age Of Cybercrime Javaheri, David
2088 cover Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II (Security and Cryptology) Nikita Borisov (editor), Claudia Diaz (editor)
2089 cover Emerging Information Security and Applications: Second International Symposium, EISA 2021, Copenhagen, Denmark, November 12-13, 2021, Revised Selected ... in Computer and Information Science) Weizhi Meng (editor), Sokratis K. Katsikas (editor)
2090 cover Cyber Forensics: Examining Emerging and Hybrid Technologies [1 ed.] Albert J. Marcella (editor) 1
2091 cover The Cybersecurity Self-Help Guide [1 ed.] Arun Soni 1
2092 cover How Cybersecurity Really Works: A Hands-On Guide for Total Beginners - EARLY ACCESS Sam Grubb
2093 cover Emerging Topics in Hardware Security Mark Tehranipoor
2094 cover Digitalisierung, Globalisierung und Risikoprävention: Festschrift für Ulrich Sieber zum 70. Geburtstag. 2 Teilbände [1 ed.] Engelhart, Marc, Kudlich, Hans, Vogel, Benjamin 1
2095 cover The Security Engineer Handbook [1.0 ed.] Mark Widse, Tom Park 10
2096 cover Securing Social Networks in Cyberspace [1 ed.] Al-Sakib Khan Pathan (editor) 1
2097 cover This Is How They Tell Me the World Ends: The Cyberweapons Arms Race Nicole Perlroth
2098 cover Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (Security and Cryptology) Nikita Borisov (editor), Claudia Diaz (editor)
2099 cover Hacking Tools: Introducing To Linux, Linux Mint, Wireless Networks, Penetrating Tests And Kali Linux: Kali Linux Tools Tutorial Palk, Stewart
2100 cover Common Windows, Linux and Web Server Systems Hacking Techniques Dr. Hidaia Mahmood Alassouli
2101 cover THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker WILLIAM PH.D, DR. SANDRA
2102 cover The "Essence" of Network Security: An End-to-End Panorama Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay
2103 cover Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings (Lecture Notes in Computer Science, 12835) [1st ed. 2021] Toru Nakanishi (editor), Ryo Nojima (editor) 1
2104 cover The Nmap cookbook: Beat the Beast Nima Shahmoradi, Nasim Kangari
2105 cover CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide [1 ed.] Joseph Muniz, Steven Chimes, James Risler 1
2106 cover DBIR 2021 data breach investigations report. coll.
2107 cover The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity Christian Espinosa
2108 cover Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems, 467) Sudhanshu Maurya (editor), Sateesh K. Peddoju (editor), Badlishah Ahmad (editor), Ines Chihi (editor)
2109 cover Hacking Codes: The Secret Of Hacking For Beginners: Define Computer Hacking Marrion, Loria
2110 cover Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices [1 ed.] Alex Alexandrou 1
2111 cover Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (Security and Cryptology) Juan A. Garay (editor)
2112 cover Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (Security and Cryptology) Juan A. Garay (editor)
2113 cover Building a European Digital Public Space: Strategies for Taking Back Control From Big Tech Platforms Alexander Baratsits
2114 cover Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 7–10, 2021, Revised Selected Papers Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Joaquin Garcia-Alfaro
2115 cover Optimal Spending on Cybersecurity Measures: Risk Management Tara Kissoon
2116 cover CompTIA Security+: IT-Sicherheit verständlich erklärt -Die umfassende Prüfungsvorbereitung zur CompTIA-Prüfung SYO-601 Mathias Gut, Markus Kammermann
2117 cover Hack into your Friends Computer [1. Auflage] Magelan Cyber Security 1
2118 cover Applied Cryptography and Network Security: 19th International Conference, ACNS 2021. Proceedings, Part I Kazue Sako, Nils Ole Tippenhauer (Eds.)
2119 cover Metodologia OSINT para Investigar en Internet Tercera Edición [3 ed.] Julián Gutiérrez 3
2120 cover Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021 (Lecture Notes in Networks and Systems, 421) Pradeep Kumar Singh (editor), Sławomir T. Wierzchoń (editor), Sudeep Tanwar (editor), Joel J. P. C. Rodrigues (editor), Maria Ganzha (editor)
2121 cover The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks Purackal, Rachel Sebastian
2122 cover Cybersecurity for SCADA Systems [2 ed.] William T. Shaw 2
2123 cover Hands-on Penetration Testing for Web Applications Richa Gupta
2124 cover A Simple Cyber Resilience Guide for Business Crawley, Kim,
2125 cover Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings (Security and Cryptology) Weizhi Meng (editor), Mauro Conti (editor)
2126 cover Intelligent and Connected Vehicle Security Jiajia Liu
2127 cover Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings ... and Telecommunications Engineering) Wenbo Shi (editor), Xiaofeng Chen (editor), Kim-Kwang Raymond Choo (editor)
2128 cover (Isc)2 Cissp Certified Information Systems Security Professional Official Practice Tests Mike Chapple, David Seidl
2129 cover CISSP: 3 in 1- Beginner's Guide to Learn the Realms of Security and Risk Management from A-Z using CISSP Principles+ Simple and Effective Strategies+ Advanced Methods to Learn the CISSP CBK Reference Jones, Daniel
2130 cover Secure Control of Networked Control Systems and Its Applications Dong Yue, Songlin Hu, Zihao Cheng
2131 cover (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests [2 ed.] Mike Chapple, David Seidl 2
2132 cover Cyber Threats and Nuclear Weapons Lin, Herbert,
2133 cover Information and Communications Security: 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I (Lecture Notes in Computer Science) Debin Gao (editor), Qi Li (editor), Xiaohong Guan (editor), Xiaofeng Liao (editor)
2134 cover World Internet Development Report 2021: Blue Book for World Internet Conference Chinese Academy of Cyberspace Studies
2135 cover Integration of WSNs into Internet of Things: A Security Perspective Sudhir Kumar Sharma, Bharat Bhushan, Raghvendra Kumar, Aditya Khamparia, Narayan C. Debnath
2136 cover Risks and Security of Internet and Systems: 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12–13, 2021, Revised Selected Papers (Lecture Notes in Computer Science) Bo Luo (editor), Mohamed Mosbah (editor), Frédéric Cuppens (editor), Lotfi Ben Othmane (editor), Nora Cuppens (editor), Slim Kallel (editor)
2137 cover IT Convergence and Security: Proceedings of ICITCS 2020 [1st ed.] Hyuncheol Kim, Kuinam J. Kim 1
2138 cover Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet Snowden, John
2139 cover The Hitchhiker's Guide to Online Anonymity - Version 1.0.7 - October 2021 [1.0.7 ed.] AnonymousPlanet 107
2140 cover IT And Cyber Security For Beginners 2 Books in 1: Learn How To master IT and Cyber Security Hazel , Riley Zoey.
2141 cover The Hitchhiker’s Guide to Online Anonymity - Version 0.9.4 - May 2021 [Version 0.9.4, Version 0.9.4 ed.] AnonymousPlanet 94
2142 cover Routledge Companion to Global Cyber-Security Strategy [1 ed.] Scott N. Romaniuk (editor), Mary Manjikian (editor) 1
2143 cover Cyber Security For Beginners: Learn How To Be Secure Online Hazel, Riley Zoey.
2144 cover The Hitchhiker’s Guide to Online Anonymity (1.0.1, August 2021) [1.0.1, 1.0.1 ed.] AnonymousPlanet 101
2145 cover The Complete Internet Security Manual. coll.
2146 cover Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 (Lecture Notes in Networks and Systems) Hani Ragab Hassen (editor), Hadj Batatia (editor)
2147 cover Digital Robbery: ATM Hacking And Implications [1st Edition] Shun-Yung Kevin Wang, Ming-Li Hsieh 1
2148 cover Advanced Cybersecurity Technologies [1 ed.] Ralph Moseley 1
2149 cover Critical Infrastructure Protection XV: 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15–16, 2021, Revised Selected Papers [1 ed.] Jason Staggs, Sujeet Shenoi 1
2150 cover Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics) Anand Handa (editor), Rohit Negi (editor), Sandeep K. Shukla (editor)
2151 cover The Quantum Threat Pandya Ph.D., Jayshree
2152 cover Advances in Cybersecurity Management [1st ed. 2021] Kevin Daimi (editor), Cathryn Peoples (editor) 1
2153 cover Silicon Valley Cybersecurity Conference: Second Conference, SVCC 2021, San Jose, CA, USA, December 2–3, 2021, Revised Selected Papers (Communications in Computer and Information Science) Sang-Yoon Chang (editor), Luis Bathen (editor), Fabio Di Troia (editor), Thomas H. Austin (editor), Alex J. Nelson (editor)
2154 cover Information Security and Cryptology – ICISC 2021: 24th International Conference, Seoul, South Korea, December 1–3, 2021, Revised Selected Papers (Lecture Notes in Computer Science) Jong Hwan Park (editor), Seung-Hyun Seo (editor)
2155 cover Study Guide Exam CV0-003 Piper, Ben,
2156 cover National Cyber Summit (NCS) Research Track 2020 [1st ed.] Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, Eric Imsand 1
2157 cover Fortigate Infrastructure Study Guide v7.0 [1] 1
2158 cover Strategic Approaches to Digital Platform Security Assurance Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
2159 cover Breaking & Entering: A Pocket Guide For Friendly Remote Admins Andy Doering
2160 cover Fortinet Fortigate Security Study Guide v7.0 [1] 1
2161 cover HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII ... Applications, incl. Internet/Web, and HCI) Abbas Moallem (editor)
2162 cover Network Ethical Hacking and Penetration Testing. Version 2.0 Albert Samuel
2163 cover Cyberspace and Security: A fundamentally New Approach Victor Sheymov
2164 cover Cybersecurity for Project Managers. A PRACTICAL GUIDE Niharika Srivastav &, Sanjay Saxena
2165 cover CompTIA PenTest+ PT0-002 Cert Guide (Certification Guide) - epub for Kindle [2 ed.] Omar Santos 2
2166 cover Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings Serge Vaudenay, Haya Shulman, Stephan Krenn
2167 cover CompTIA Security+ SY0-601 Exam Cram [6 ed.] Marty M. Weiss 6
2168 cover Assessing and Insuring Cybersecurity Risk Ravi Das
2169 cover QUINTESSENTIAL GUIDE TO CYBERSECURITY For Starters : Step By Step Guide To Get Started SCOTT PH.D, HARRY
2170 cover Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2021 (Lecture Notes in Networks and Systems, 481) Debasis Giri (editor), Jyotsna Kumar Mandal (editor), Kouichi Sakurai (editor), Debashis De (editor)
2171 cover Threat Hunting with Elastic Stack Andrew Pease
2172 cover Data Privacy And Trust In Cloud Computing: Building Trust In The Cloud Through Assurance And Accountability [1st Edition] Theo Lynn, John Mooney, Lisa Van Der Werff, Grace Fox 1
2173 cover Distributed Denial of Service (DDoS) Attacks Amrita Dahiya and Brij B. Gupta
2174 cover Information Security and Cryptology: 17th International Conference, Inscrypt 2021, Virtual Event, August 12–14, 2021, Revised Selected Papers Yu Yu (editor), Moti Yung (editor)
2175 cover Technology Development for Security Practitioners (Security Informatics and Law Enforcement) Babak Akhgar (editor), Dimitrios Kavallieros (editor), Evangelos Sdongos (editor)
2176 cover Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, ... Selected Papers (Security and Cryptology) Joaquin Garcia-Alfaro (editor), Jose Luis Muñoz-Tapia (editor), Guillermo Navarro-Arribas (editor), Miguel Soriano (editor)
2177 cover Start-up Secure: Baking Cybersecurity into Your Company from Founding to Exit Chris Castaldo
2178 cover Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence Hemang Doshi
2179 cover Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected ... in Computer and Information Science) Erol Gelenbe (editor), Marija Jankovic (editor), Dionysios Kehagias (editor), Anna Marton (editor), Andras Vilmos (editor)
2180 cover Resilience in the Digital Age (Information Systems and Applications, incl. Internet/Web, and HCI) Fred S. Roberts (editor), Igor A. Sheremet (editor)
2181 cover CompTIA Pentest+ (Practice Exams) Karamagi, Robert
2182 cover Information Security and Privacy: 26th Australasian Conference, ACISP 2021, Virtual Event, December 1–3, 2021, Proceedings (Security and Cryptology) Joonsang Baek (editor), Sushmita Ruj (editor)
2183 cover Advances in Malware and Data-Driven Network Security Brij B. Gupta
2184 cover Risks and Security of Internet and Systems: 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers (Lecture Notes in Computer Science) Joaquin Garcia-Alfaro (editor), Jean Leneutre (editor), Nora Cuppens (editor), Reda Yaich (editor)
2185 cover CISSP: 4 in 1- Beginner's Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Comprehensive Guide of Advanced Methods Jones, Daniel
2186 cover 500+ DARK WEB LINKS Almas, Rarsa
2187 cover Global Internet Governance: Influences from Malaysia and Singapore [1st ed.] Susan Leong, Terence Lee 1
2188 cover Authentication of Embedded Devices: Technologies, Protocols and Emerging Applications Basel Halak
2189 cover Hacking of Computer Networks. Unknown
2190 cover Advances in Digital Forensics XVII: 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers (IFIP ... and Communication Technology, 612) [1st ed. 2021] Gilbert Peterson (editor), Sujeet Shenoi (editor) 1
2191 cover Cyber Risks and Insurance: the Legal Principles QC, Dean Armstrong, Steward, Thomas, Thakerar, Shyam
2192 cover Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data Lisa Bock
2193 cover Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha
2194 cover Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure Cesar Bravo
2195 cover Cloud Native Security Chris Binnie, Rory McCune
2196 cover CISM (Certified Information Security Manager) ISACA
2197 cover The Complete Internet Security Manual (New July 2021 Update) [10 ed.] Papercut Limited 10
2198 cover Cyberjutsu: Cybersecurity for the Modern Ninja Ben McCarty
2199 cover Quantum Computing in Cybersecurity Romil Rawat, Rajesh Kumar, Chakrawarti Sanjaya, Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, Hitesh Rawat
2200 cover Ethical Hacking: A Hands-on Introduction to Breaking In Daniel Graham
2201 cover Wireless and Mobile Hacking and Sniffing Techniques Hidaia Mahmood Alassouli
2202 cover A Profound Guide On Cyber Security: Getting Protected At Ease As a Professional And a Beginner Amelia Mike
2203 cover Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen
2204 cover ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings (IFIP ... and Communication Technology, 625) Audun Jøsang (editor), Lynn Futcher (editor), Janne Hagen (editor)
2205 cover Mobile Internet Security: 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7–9, 2021, Revised Selected Papers (Communications in Computer and Information Science) Igor Kotenko
2206 cover Personalized Privacy Protection in Big Data Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
2207 cover Information Security and Employee Behaviour: How to Reduce Risk Through Employee Education, Training and Awareness [2 ed.] Angus McIlwraith 2
2208 cover CISSP Official Study Guide [9 ed.] Chapple, Mike 9
2209 cover Cyber-Security Threats, Actors, and Dynamic Mitigation Nicholas Kolokotronis and Stavros Shiaeles
2210 cover Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software Nir Yehoshua, Uriel Kosayev
2211 cover Networking for Beginners: Simple Guide to Study Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber Security Mathew, Jack
2212 cover Maîtriser la SSI pour les systèmes industriels: La Cybersécurité des systèmes industriels ANSSI
2213 cover CISSP Official Practice Tests [3 ed.] Chapple, Mike 3
2214 cover CompTIA PenTest+ Study Guide: Exam PT0-002 [2 ed.] Mike Chapple, David Seidl 2
2215 cover Classical and Physical Security of Symmetric Key Cryptographic Algorithms Anubhab Baksi
2216 cover Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam David Okeyode
2217 cover Real-World Bug Hunting: A Field Guide to Web Hacking [1.0] Yaworski, Peter 10
2218 cover Kali Linux 3 in 1 Beginners Guide Thorpe, Ethan
2219 cover Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists [Second edition] Graeme Browning
2220 cover Encyclopedia Cyberspacia
2221 cover Hacking Web : How to Hacking Web And Make Money Hacking Ethically Yaworski, Peter
2222 cover MCE Microsoft ® Certified Expert Cybersecurity Architect Study Guide. Exam SC- 100 Kathiravan Udayakumar, Puthiyavan Udayakumar
2223 cover Mastering Secure Coding Writing Software That Stands Up to Attacks Larry Jones
2224 cover Ethical Hacking Lewis, Elijah
2225 cover Hacking Android Terry D. Clark
2226 cover Security on the Web [1 ed.] Marvin Zelkowitz 1
2227 cover On the Grid Luke Smith
2228 cover Intelligent Data Security Solutions for e-Health Applications Amit Kumar Singh, Mohamed Elhoseny
2229 cover Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News Clint Watts
2230 cover Introduction to Security, Eighth Edition Robert Fischer Ph.D., Edward Halibozek MBA, David Walters
2231 cover Advances in Smart Grid Power System: Network, Control and Security Anuradha Tomar, Ritu Kandari
2232 cover A Practical Guide to Digital Forensics Investigations, 2nd Edition Darren R. Hayes
2233 cover Cybertorture: A Very Brief Introduction Tolga Theo Yalur
2234 cover CCNP Security Cisco Secure Firewall and Intrusion Prevention System Nazmul Rajib
2235 cover CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition [2 ed.] Troy McMillan 2
2236 cover CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide [3 ed.] Troy McMillan 3
2237 cover CISSP Cert Guide (Certification Guide) [4 ed.] Robin Abernathy, Darren Hayes 4
2238 cover CEH Certified Ethical Hacker Cert Guide (Certification Guide) [4 ed.] Omar Santos, Michael Gregg 4
2239 cover Computer Security Fundamentals [5 ed.] William Chuck Easttom 5
2240 cover Zero Trust in Resilient Cloud and Network Architectures Dhrumil Prajapati, Vinay Saini, Josh Halley, Ariel Leza
2241 cover The Basics of Web Hacking. Tools and Techniques to Attack the Web Josh Pauli (Auth.)
2242 cover CISSP Cert Guide 4th Edition [4 ed.] Robin Abernathy, Darren R. Hayes 4
2243 cover Distributed Control Methods and Cyber Security Issues in Microgrids Wenchao Meng (editor), Xiaoyu Wang (editor), Shichao Liu (editor)
2244 cover Zero Trust Architecture Cindy Green-Ortiz, Brandon Fowler, Jason Frazier, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald
2245 cover Computer Security Fundamentals, 5th Edition William Chuck Easttom
2246 cover Cloud Computing: Concepts, Technology, Security, and Architecture (The Pearson Digital Enterprise Series from Thomas Erl) Thomas Erl, Eric Monroy
2247 cover CompTIA Security+ SY0-701 Cert Guide (Certification Guide) [1 ed.] Lewis Heuermann 1
2248 cover IPSec the new security standart for the internet, intranets and virtual private networks [2nd ed] Doraswamy, Naganand, Harkins, Dan 2
2249 cover Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Certification Guide) [1 ed.] Omar Santos 1
2250 cover CompTIA® Advanced Security Practitioner (CASP+) CAS-004 Cert Guide Troy McMillan
2251 cover Certified Ethical Hacker (Ceh) Exam Cram (Exam Cram (Pearson)) [1 ed.] William Chuck Easttom 1
2252 cover CompTIA PenTest+ PT0-002 Cert Guide [2 ed.] Omar Santos 2
2253 cover Securing Enterprise Networks with Cisco Meraki (for Duc ka) Ryan Chaney, Simerjit Singh
2254 cover International Relations and Security in the Digital Age: International Relations and Security in the Digital Age (Routledge Advances in International Relations and Global Politic) [1 ed.] J. &, Eriksson 1
2255 cover Internet governance: the new frontier of global institutions [1 ed.] John Mathiason 1
2256 cover Borders in Cyberspace: Information Policy and the Global Information Infrastructure Brian Kahin, Charles Nesson
2257 cover Access Controlled. The Shaping of Power, Rights, and Rule in Cyberspace Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 18.01.2013Street date: 28.02.2014
2258 cover Researching Internet Governance: Methods, Frameworks, Futures (Information Policy) Laura Denardis (editor), Derrick Cogburn (editor), Nanette S. Levinson (editor), Francesca Musiani (editor)
2259 cover We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency Olson, Parmy
2260 cover Protocol Politics: The Globalization of Internet Governance (Information Revolution and Global Politics) Laura DeNardis
2261 cover Tor: From The Dark Web To The Future Of Privacy [1 ed.] Ben Collier 1
2262 cover We Are All Targets: How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos Matt Potter
2263 cover IoT: Security and Privacy Paradigm (Internet of Everything (IoE)) [1 ed.] Souvik Pal (editor), Vicente García Díaz (editor), Dac-Nhuong Le (editor) 1
2264 cover We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency Parmy Olson
2265 cover Cybersecurity and Cognitive Science [1 ed.] Ahmed A. Moustafa (editor) 1
2266 cover Information Security Handbook (Internet of Everything (IoE)) [1 ed.] Noor Zaman Jhanjhi (editor), Khalid Hussain (editor), Mamoona Humayun (editor), Azween Bin Abdullah (editor), João Manuel R.S. Tavares (editor) 1
2267 cover Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems Bharat Bhushan, Sudhir Kumar Sharma, Muzafer Saracević, Azedine Boulmakoul
2268 cover Data Protection: Ensuring Data Availability [2 ed.] Preston de Guise 2
2269 cover Cybersecurity Fundamentals: A Real-World Perspective Kutub Thakur, Al-Sakib Khan Pathan
2270 cover Biomedical Defense Principles to Counter DNA Deep Hacking Rocky Termanini
2271 cover Hybrid Encryption Algorithms Over Wireless Communication Channels Mai H. Shahieen
2272 cover Testing and Securing Web Applications [1 ed.] Ravi Das (Author), Greg Johnson (Author) 1
2273 cover Cybersecurity for Everyone [1 ed.] David B. Skillicorn 1
2274 cover Cross-Site Scripting Attacks-Classification, Attack, and Countermeasures [1 ed.] B. B. Gupta (Author), Pooja Chaudhary (Author) 1
2275 cover The Security Hippie Barak Engel
2276 cover Inside the Dark Web Erdal Ozkaya, Rafiqul Islam
2277 cover Big Data Analytics and Computing for Digital Forensic Investigations [1 ed.] Suneeta Satpathy (Editor), Sachi Nandan Mohanty (Editor) 1
2278 cover Fancy Bear Goes Phishing - The Dark History of the Information Age, in Five Extraordinary Hacks [1 ed.] Scott J. Shapiro 1
2279 cover Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology [1 ed.] Wayne Patterson, Cynthia E. Winston-Proctor 1
2280 cover A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals Gupta, B B,Tewari, Aakanksha
2281 cover Security Analytics for the Internet of Everything Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah, Al-Sakib Khan Pathan
2282 cover Power and Authority in Internet Governance [1 ed.] Blayne Haggart, Natasha Tusikov, Jan Aart Scholte (eds.) 1
2283 cover Information Security Handbook Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, João Manuel R.S. Tavares
2284 cover Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation Myriam Dunn Cavelty, Andreas Wenger
2285 cover The Investigator's Guide to Computer Crime Carl J., Ph.D. Franklin
2286 cover A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back [1 ed.] Bruce Schneier 1
2287 cover Cyber Security Practical Engineering Approach Henrique Santos
2288 cover Global Information Warfare: The New Digital Battlefield, Second Edition [2 ed.] Andrew Jones (Author), Gerald L. Kovacich (Author) 2
2289 cover Computer and Information Security Handbook [4 ed.] John R. Vacca (editor) 4
2290 cover The Future of Violence: Robots and Germs, Hackers and Drones—Confronting A New Age of Threat Benjamin Wittes, Gabriella Blum
2291 cover Professional Pen Testing for Web Applications Andres Andreu
2292 cover Inside Network Security Assessment: Guarding Your IT Infrastructure [With CDROM] ProQuest., Gregg, Michael C., Kim, David
2293 cover Maximum Security [3rd ed.] Greg Shipley 3
2294 cover Maximum Wireless Security Cyrus Peikari, Seth Fogie
2295 cover Inside Network Perimeter Security Stephen Northcutt, Karen Frederick, Scott Winters, Lenny Zeltser, Ronald W. Ritc
2296 cover Microsoft ISA Server 2006 Unleashed Michael Noel
2297 cover Hackers Beware. Defending Your Network from the Wiley Hacker [1 ed.] Eric Cole 1
2298 cover Professional Windows Desktop and Server Hardening Roger A. Grimes
2299 cover SECUR Exam Cram 2 Raman Sud, Ken Edelman
2300 cover How Personal & Internet Security Work [1 ed.] Preston Gralla 1
2301 cover Absolute Beginner's Guide to Personal Firewalls [1 ed.] Jerry Lee Ford Jr 1
2302 cover The complete idiot's guide to protecting yourself online Gralla
2303 cover MCSA/MCSE 70-299 Exam Cram 2: Implementing and Administering Security in a Windows 2003 Network Bill Ferguson, Don Poulton, Diane Barrett
2304 cover Practical Firewalls [1st ed.] Terry William Ogletree 1
2305 cover Privacy Defended: Protecting Yourself Online Gary Bahadur, William Chan, Chris Weber
2306 cover TANGLED WEB: Tales of Digital Crime from the Shadows of Cyberspace [1st ed.] Richard Power 1
2307 cover Server+ Certification Exam Cram 2 (Exam SKO-002) Marcraft International
2308 cover CISA Exam Cram [2 ed.] Michael Gregg 2
2309 cover A Practical Guide to Digital Forensics Investigations 2nd Edition [2 ed.] Darren R. Hayes 2
2310 cover Certified ethical hacker exam prep (Exam Prep 2): Includes index Gregg, Michael (Michael C.)
2311 cover Three Tweets to Midnight: Effects of the Global Information Ecosystem on the Risk of Nuclear Conflict Harold A. Trinkunas, Herbert S. Lin, Benjamin Loehrke
2312 cover Attribute-Based Encryption and Access Control (Data-Enabled Engineering) [1 ed.] Dijiang Huang, Qiuxiang Dong, Yan Zhu 1
2313 cover Building A Global Information Assurance Program [1 ed.] Raymond J. Curts, Douglas E. Campbell 1
2314 cover LAN Turtle: A Guide to the Remote Access Toolkit [v22.03 ed.] Darren Kitchen 2203
2315 cover Packet Squirrel Mark II: A Guide to Ethernet Man-in-the-Middle [v23.07 ed.] Darren Kitchen 2307
2316 cover Internet of Things Security-Principles, Applications, Attacks, and Countermeasures [1 ed.] Brij B. Gupta (Author), Megha Quamara (Author) 1
2317 cover USB Rubber Ducky: A Guide to Keystroke Injection Attacks [v22.08-2, 2 ed.] Darren Kitchen 2
2318 cover Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics) [1 ed.] Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla 1
2319 cover Power and Authority in Internet Governance: Return of the State? Blayne Haggart, Natasha Tusikov, Jan Aart Scholte
2320 cover Bash Bunny: A Guide to the HotPlug Attack Platform [v22.03 ed.] Darren Kitchen 2203
2321 cover Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience [1 ed.] Charlette Donalds, Corlane Barclay, Kweku-Muata Osei-Bryson 1
2322 cover A Beginner’s Guide to Internet of Things Security-Attacks, Applications, Authentication, and Fundamentals [1 ed.] B. B. Gupta (Author), Aakanksha Tewari (Author) 1
2323 cover Cybersecurity Fundamentals: A Real-World Perspective [1st Edition] Kutub Thakur, Al-Sakib Khan Pathan 1
2324 cover PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance [5 ed.] Branden R. Williams, James K. Adamson 5
2325 cover Cybersecurity and High-Performance Computing Environments Kuan-Ching Li Nitin Sukhija Elizabeth Bautista Jean-Luc Gaudiot
2326 cover The Hack Is Back: Techniques to Beat Hackers at Their Own Games [1 ed.] Jesse Varsalone, Christopher Haller 1
2327 cover Secure Data Science: Integrating Cyber Security and Data Science B. Thuraisngham, M. Kantarcioglu, L. Khan
2328 cover Teaching Cybersecurity. A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
2329 cover Unleashing the Art of Digital Forensics [1 ed.] Keshav Kaushik, Rohit Tanwar, Susheela Dahiya, Komal Kumar Bhatia, Yulei Wu 1
2330 cover Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program Alan Tang
2331 cover Understanding Cyber-Warfare Politics, Policy And Strategy [2 ed.] Christopher Whyte, Brian Mazanec 2
2332 cover A Comprehensive Guide to Information Security Management and Audit Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala
2333 cover 5G Cyber Risks and Mitigation Sabhyata Soni
2334 cover Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis Shivi Garg, Niyati Baliyan
2335 cover Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting Rafay Baloch
2336 cover Advanced Techniques and Applications of Cybersecurity and Forensics Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary
2337 cover Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity Techniques Alex Khang, Shashi Kant Gupta, Sita Rani, Dimitrios A. Karras
2338 cover Dark World; A Book on the Deep Dark Web Atif Ali &, Muhammad Qasim
2339 cover Dark World: A Book on the Deep Dark Web Atif Ali and Muhammad Qasim
2340 cover Intelligent Approaches to Cyber Security Narendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli
2341 cover Cyber Resilience in Critical Infrastructure Sinan Kufeoglu, Abdullah Talip Akgun
2342 cover Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges Shalli Rani
2343 cover Quantum Computing: A Journey into the Next Frontier of Information and Communication Security Hammoudeh, Mohammad, Alessa, Abdullah T., Sherbeeni, Amro M., Firth, Clinton M., Alessa, Abdullah S.
2344 cover The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security Lee Parrish
2345 cover Cloud Security Concepts, Applications and Practices [1 ed.] Edited ByJamuna S Murthy, Siddesh G, M,, Srinivasa K, G, 1
2346 cover Ransomware Evolution Mohiuddin Ahmed
2347 cover Networks Attack Detection on 5G Networks using Data Mining Techniques Sagar Dhanraj Pande, Aditya Khamparia
2348 cover A Reference Manual for Data Privacy Laws and Cyber Frameworks (Cyber Shorts) [1 ed.] Ravindra Das 1
2349 cover Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics Arif, Muhammad, Arfan Jaffar, M., Geman, Oana, Abbasi, Waseem
2350 cover Protégete del doxing. Cómo prevenir y solucionar la exposición de tus datos personales en Internet Juanjo Ramos
2351 cover Offensive and Defensive Cyber Security Strategies;Fundamentals, Theory and Practices Mariya Ouaissa, Mariyam Ouaissa
2352 cover Optimal Spending on Cybersecurity Measures [First Edition] Tara Kissoon
2353 cover ManusCrypt; Designed for Mankind—Anthropocentric Information Security Prashant A Upadhyaya
2354 cover Cybercrime And Cybersecurity [1 ed.] Paul A. Watters 1
2355 cover Protecting Location Privacy in the Era of Big Data: A Technical Perspective Yan, Yan, Mahmood, Adnan, Sheng, Quan Z.
2356 cover Philosophy Of Cybersecurity [1 ed.] Lukasz Olejnik, Artur Kurasiński 1
2357 cover Navigating the Cyber Maze: Insights and Humor on the Digital Frontier Muhlert, Matthias
2358 cover Cyber Investigations of Smart Devices Bhardwaj, Akashdeep
2359 cover Digital Resilience, Cybersecurity and Supply Chains Tarnveer Singh
2360 cover ¡Que no te espíen! Las herramientas y aplicaciones imprescindibles para proteger tu privacidad en la red Juanjo Ramos
2361 cover How to Leak Documents and Surf the Web Anonymously: Becoming Anonymous Nathan Bowie
2362 cover Mastering Cybersecurity: A Practical Guide for Professionals [1] Akashdeep Bhardwaj 1
2363 cover Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-pacific Francis C. Domingo
2364 cover Cyber Security and Operations Management for Industry 4.0 Ahmed A Elngar, N Thillaiarasu, Mohamed Elhoseny, K Martin Sagayam
2365 cover Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
2366 cover Internet of Things Security and Privacy: Practical and Management Perspectives [1 ed.] Ali Ismail Awad (editor), Atif Ahmad (editor), Kim-Kwang Raymond Choo (editor), Saqib Hakak (editor) 1
2367 cover Advances in Cyber Security and Intelligent Analytics Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas
2368 cover Ransomware and Cybercrime [1 ed.] Andrew Jenkinson 1
2369 cover Strategic Cyber Security Management [1 ed.] Peter Trim, Yang-Im Lee 1
2370 cover Online Harms and Cybertrauma: Legal and Harmful Issues with Children and Young People Catherine Knibbs
2371 cover Cybersecurity for eHealth: A Simplified Guide to Practical Cybersecurity for Non-technical Stakeholders & Practitioners of Healthcare [1 ed.] Emmanuel C. Ogu 1
2372 cover Why CISOs Fail (Internal Audit and IT Audit) [2 ed.] Barak Engel 2
2373 cover Zero Trust Journey Across the Digital Estate [1 ed.] Abbas Kudrati, Binil A. Pillai 1
2374 cover Phishing for Nazis: Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web Lev Topor
2375 cover Practical Security for Agile and DevOps [1 ed.] Mark S. Merkow 1
2376 cover A Comprehensive Guide to Information Security Management and Audit [1 ed.] Rajkumar Banoth, Gugulothu Narsimha, Aruna Kranthi Godishala 1
2377 cover Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence [1 ed.] Rong Su 1
2378 cover Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems) [1 ed.] Bharat Bhushan (editor), Sudhir Kumar Sharma (editor), Parma Nand (editor), Achyut Shankar (editor) 1
2379 cover 6G Communication Network: Architecture, Security and Applications [1 ed.] Ajay Kumar Vyas (editor), Narendra Khatri (editor), Sunil Kumar Jha (editor) 1
2380 cover The Business of Cyber: Why You Should Question What Your Security Team Are Telling You [1 ed.] Peter Fagan 1
2381 cover Internet of Things Vulnerabilities and Recovery Strategies [1 ed.] Fahim Masoodi (editor), Alwi Bamhdi (editor), Majid Ahmad Charoo (editor), Zubair Masoodi (editor), Arif Lattoo (editor), Gousiya Hussain (editor) 1
2382 cover PKI Implementation and Infrastructures Julian Ashbourn
2383 cover Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities Murugan, Thangavel, Singh, W. Jai
2384 cover Radical Reporting: Writing Better Audit, Risk, Compliance, and Information Security Reports (Security, Audit and Leadership Series) [2 ed.] Sara I. James 2
2385 cover Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives [1 ed.] Randhir Kumar (editor), Prabhat Kumar (editor), Sobin C C (editor) 1
2386 cover Optimal Spending on Cybersecurity Measures: Digital Privacy and Data Protection [1 ed.] Tara Kissoon 1
2387 cover Great Power Cyber Competition (Routledge Advances in Defence Studies) [1 ed.] David V. Gioe (editor), Margaret W. Smith (editor) 1
2388 cover Big Data and Blockchain Technology for Secure IoT Applications Selvarajan, Shitharth, Mohammad, Gouse Baig, Bharath Reddy, Sadda, Balachandran Praveen Kumar
2389 cover Digital (Dis)Information Operations: Fooling the Five Eyes [1 ed.] Melissa-Ellen Dowling 1
2390 cover Surviving the Wild Wild Web [First Edition] Marton Gergely, Ian Grey, Heba Saleous
2391 cover Introduction to Cybersecurity in the Internet of Things [1 ed.] Keke Gai, Jing Yu, Liehuang Zhu 1
2392 cover Cyber CISO Marksmanship: Hitting the Mark in Cybersecurity Leadership Dunham, Ken, Johnson, James, McComb, Joseph, Elrod, Jason
2393 cover The Zero Trust Framework and Privileged Access Management (PAM) [1 ed.] Ravindra Das 1
2394 cover The CISO Playbook (Security, Audit and Leadership Series) [1 ed.] Andres Andreu 1
2395 cover Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape [1 ed.] Akashdeep Bhardwaj 1
2396 cover Cyber Operations and International Law François Delerue
2397 cover Cloud Native Data Security with OAuth (for Raymond Rhine) Gary Archer, Judith Kahrer, and Michał Trojanowski
2398 cover The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Stuttard, Dafydd,Pinto, Marcus
2399 cover The web application hacker’s handbook: finding and exploiting security flaws [2 ed.] Dafydd Stuttard, Marcus Pinto 2
2400 cover RTFM: Red Team Field Manual v2 [2 ed.] Ben Clark, Nick Downer 2
2401 cover Cyber Operations And International Law [1st Edition] François Delerue 1
2402 cover Data Security Blueprints Federico Castanedo
2403 cover Hacking Connected Cars; Tactics, Techniques, and Procedures [1 ed.] Alissa Knight 1
2404 cover Web Application Defender's Cookbook: Battling Hackers and Protecting Users [1 ed.] Ryan C. Barnett, Jeremiah Grossman 1
2405 cover Using Social Media for Global Security [1 ed.] Ravi Gupta, Hugh Brooks 1
2406 cover Government Cloud Procurement: Contracts, data protection, and the quest for compliance Kevin McGillivray
2407 cover Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today’s Crypto Roger A. Grimes
2408 cover Web Commerce Security: Design and Development [1 ed.] Hadi Nahari and Ronald L. Krutz 1
2409 cover Security Engineering: A Guide to Building Dependable Distributed Systems [3 ed.] Ross Anderson 3
2410 cover A Guide to Building Dependable Distributed Systems Anderson, Ross
2411 cover Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership Jennifer Jin and Marcus J. Carey
2412 cover Security 2020: Reduce Security Risks This Decade Doug Howard, Kevin Prince(auth.)
2413 cover CompTIA CySA+ Practice Tests: Exam CS0-002 [2 ed.] Mike Chapple, David Seidl 2
2414 cover CompTIA CySA+ Study Guide Exam CS0-002 [2 ed.] Mike Chapple, David Seidl 2
2415 cover Darknet: Geopolitics and Uses [1 ed.] Laurent Gayard 1
2416 cover The Metrics Manifesto: Confronting Security with Data [1 ed.] Richard Seiersen 1
2417 cover Hands on Hacking [1 ed.] Matthew Hickey, Jennifer Arcuri 1
2418 cover Cloud Security For Dummies (For Dummies (Computer/Tech)) [1 ed.] Ted Coombs 1
2419 cover Penetration Testing For Dummies (For Dummies (Computer/Tech)) [1 ed.] Robert Shimonski 1
2420 cover CISSP For Dummies Lawrence C. Miller, Peter H. Gregory
2421 cover Cyber Security and Network Security [1 ed.] Sabyasachi Pramanik (editor), Debabrata Samanta (editor), M. Vinay (editor), Abhijit Guha (editor) 1
2422 cover Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework [1 ed.] Cynthia Brumfield 1
2423 cover Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation [3 ed.] Ted G. Lewis 3
2424 cover Cryptography apocalypse: preparing for the day when quantum computing breaks today's crypto Grimes, Roger A
2425 cover The Metrics Manifesto : Confronting Security with Data Seiersen, Richard,Hubbard, Douglas W.,
2426 cover Cybersecurity For Dummies Steinberg, Joseph
2427 cover Hands On Hacking [1st Edition] Matthew Hickey, Jennifer Arcuri 1
2428 cover CompTIA Pentest+ Certification For Dummies (For Dummies (Computer/Tech)) [2 ed.] Glen E. Clarke 2
2429 cover Practical Industrial Cybersecurity : ICS, Industry 4.0, and IIoT Charles J. Brooks, Philip A. Craig Jr.
2430 cover You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions [1 ed.] Ira Winkler, Dr. Tracy Celaya Brown 1
2431 cover CompTIA PenTest+ Certification For Dummies [1 ed.] Glen E. Clarke 1
2432 cover Security Awareness For Dummies Ira Wrinkler
2433 cover (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide [3 ed.] Mike Chapple, David Seidl 3
2434 cover Wireless Communication for Cybersecurity S. Sountharrajan, R. Maheswar Geetanjali, Rathee, M. Akila
2435 cover CompTIA CySA+ study guide : exam CS0-002 [Second ed.] David Seidl, Mike Chapple
2436 cover The Pentester Blueprint : Starting a Career as an Ethical Hacker Phillip L. Wylie, Kim Crawley
2437 cover Alice and Bob Learn Application Security Tanya Janca
2438 cover The CISO Evolution: Business Knowledge for Cybersecurity Executives Matthew K. Sharp, Kyriakos P. Lambros
2439 cover Cyber Operations: A Case Study Approach [1 ed.] Jerry M. Couretas 1
2440 cover Cyber Security and Digital Forensics: Challenges and Future Trends Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le
2441 cover CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004 [4 ed.] Nadean H. Tanner, Jeff T. Parker 4
2442 cover Cybersecurity Law [3 ed.] Jeff Kosseff 3
2443 cover Digital Forensics and Internet of Things – Impact and Challenges [1 ed.] Anita Gehlot (editor), Rajesh Singh (editor), Jaskaran Singh (editor), Neeta Raj Sharma (editor) 1
2444 cover The CISO Evolution: Business Knowledge for Cybersecurity Executives Matthew K. Sharp, Kyriakos Lambros
2445 cover Cybersecurity and Local Government [1 ed.] Donald F. Norris, Laura K. Mateczun, Richard F. Forno 1
2446 cover Securing Delay-Tolerant Networks with BPSec Edward J. Birrane III, Sarah Heiner, Ken McKeever
2447 cover Cyber-War: The Anatomy of the global Security Threat Julian Richards (auth.)
2448 cover Cybersecurity for dummies. [2 ed.] Joseph Steinberg 2
2449 cover (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide [3 ed.] Mike Wills 3
2450 cover Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT Charles J. Brooks, Philip A. Craig Jr.
2451 cover Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise [1 ed.] Jennifer Minella 1
2452 cover Executive's Guide to Cyber Risk: Securing the Future Today [1 ed.] Siegfried Moyo 1
2453 cover Cybersecurity For Dummies (For Dummies (Computer/Tech)) [2 ed.] Joseph Steinberg 2
2454 cover The Official (ISC)2 SSCP CBK Reference [6 ed.] MIKE WILLS 6
2455 cover Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise Jennifer (JJ) Minella
2456 cover CISA Certified Information Systems Auditor Study Guide : Covers 2024–2029 Exam Objectives Peter H. Gregory, Mike Chapple
2457 cover Wireless Communication in Cyber Security [1 ed.] S. Sountharrajan (editor), R. Maheswar (editor), Geetanjali Rathee (editor), M. Akila (editor) 1
2458 cover How to Measure Anything in Cybersecurity Risk [2 ed.] Douglas W. Hubbard, Richard Seiersen 2
2459 cover How to Measure Anything in Cybersecurity Risk [Second Edition] Douglas W. Hubbard, RICHARD SEIERSEN
2460 cover If It's Smart, It's Vulnerable Mikko Hypponen
2461 cover The Active Defender: Immersion in the Offensive Security Mindset Catherine J. Ullman
2462 cover The Official (ISC)2 CCSP CBK Reference [4 ed.] Aaron Kraus 4
2463 cover Cybercrime and Cybersecurity in the Global South Nir Kshetri (auth.)
2464 cover Internet Governance and the Global South: Demand for a New Framework Abu Bhuiyan (auth.)
2465 cover Dodging Spam Filters: Strategies for Maximizing Email Deliverability Williams , Roger
2466 cover Evolution of the Cyber Domain: The Implications for National and Global Security Eneken Tikk-Ringas
2467 cover The Personal Digital Resilience Handbook: An essential guide to safe, secure and robust use of everyday technology Wild, David
2468 cover Cryptography and Network Security: Principles and Practice, Global Edition [8 ed.] William Stallings 8
2469 cover Securing Amazon Web Services Jay Schulman
2470 cover Cryptography and Network Security: Principles and Practice, Global Edition [7 ed.] William Stallings 7
2471 cover Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
2472 cover Cybersecurity All-in-One For Dummies [1 ed.] Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs 1
2473 cover Cybersecurity All-In-One for Dummies Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2474 cover The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
2475 cover CompTIA CySA+ Study Guide: Exam CS0-003 [3 ed.] Mike Chapple, David Seidl 3
2476 cover Open-Source Security Operations Center (SOC) : A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar
2477 cover Reinforcement Learning for Cyber Operations Abdul Rahman
2478 cover Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem [1 ed.] Chris Hughes, Nikki Robinson 1
2479 cover Cyber Guardians: Empowering Board Members for Effective Cybersecurity [1 ed.] Bart R. McDonough 1
2480 cover The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet [1 ed.] David Senecal 1
2481 cover Digital Twins and Cybersecurity: Safeguarding the Future of Connected Systems Palanichamy Naveen
2482 cover A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice Jason Edwards
2483 cover Alice & Bob Learn Secure Coding Janca Janca
2484 cover Securing Microsoft Azure OpenAI Karl Ots
2485 cover The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry [1 ed.] Alon Arvatz 1
2486 cover Pen Testing from Contract to Report [1 ed.] Alfred Basta, Nadine Basta, Waqar Anwar 1
2487 cover CompTIA CySA+ Study Guide, 3rd Edition [3 ed.] Mike Chapple, David Seidl 3
2488 cover CompTIA CySA+ Practice Tests : Exam CS0-003 [Third Edition] Mike Chapple, David Seidl
2489 cover The DevSecOps Playbook: Deliver Continuous Security at Speed [1 ed.] Sean D. Mack 1
2490 cover Cybersecurity First Principles: A Reboot of Strategy and Tactics Rick Howard
2491 cover Cybersecurity First Principles: A Reboot of Strategy and Tactics [1 ed.] Rick Howard 1
2492 cover Stepping Through Cybersecurity Risk Management : A Systems Thinking Approach Jennifer L. Bayuk
2493 cover The DevSecOps Playbook : Deliver Continuous Security at Speed Sean D. Mack
2494 cover Cyber Guardians : Empowering Board Members for Effective Cybersecurity Bart R. McDonough
2495 cover Secrets Management For Dummies, Akeyless Special Edition Brett McLaughlin
2496 cover Zero Trust and Third-Party Risk: Reduce the Blast Radius [Team-IRA] [1 ed.] Gregory C. Rasner 1
2497 cover Zero Trust and Third-Party Risk : Reduce the Blast Radius Gregory C. Rasner
2498 cover CCST Cisco Certified Support Technician Study Guide : Cybersecurity Exam [First Edition] Lammle, Todd,Buhagiar, Jon,Robb, Donald,Montgomery, Todd,, Jon Buhagiar, Donald Robb, Todd Montgomery
2499 cover CompTIA Security+ Study Guide with over 500 Practice Test Questions : Exam SY0-701 [Ninth Edition] Mike Chapple, David Seidl
2500 cover CCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online, 2nd Edition [Second Edition, with Online Practice] Arthur J. Deane
2501 cover The Code of Honor: Embracing Ethics in Cybersecurity [1 ed.] Paul J. Maurer, Ed Skoudis 1
2502 cover The Techno-Legal Dynamics of Cyber Crimes in Industry 5.0 [1 ed.] Gagandeep Kaur (editor), Tanupriya Choudhury (editor), S. Balamurugan (editor) 1
2503 cover Alice and Bob Learn Secure Coding [1 ed.] Tanya Janca 1
2504 cover Emerging Threats and Countermeasures in Cybersecurity Gulshan Shrivastava
2505 cover The Cybersecurity Guide to Governance, Risk, and Compliance [1 ed.] Jason Edwards, Griffin Weaver 1
2506 cover ISC2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) [10 ed.] Mike Chapple, James Michael Stewart, Darril Gibson 10
2507 cover ISC2® CISSP® Certified Information Systems Security Professional Official Study Guide [10 ed.] Mike Chapple, James Michael Stewart, Darril Gibson 10
2508 cover ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests [4 ed.] Mike Chapple, David Seidl 4
2509 cover Securing the Digital Frontier : Threats and Advanced Techniques in Security and Forensics Kavita Sharma, Vishnu Sharma, Parma Nand, Anil Kumar Sagar, Gulshan Shrivastava
2510 cover The Cybersecurity Control Playbook : From Fundamentals to Advanced Strategies Edwards, Jason,
2511 cover Your Face Belongs to Us: The Secretive Startup Dismantling Your Privacy Kashmir Hill
2512 cover CompTIA PenTest+ Study Guide, 3rd Edition [3 ed.] Mike Chapple, Rob Shimonski, and David Seidl 3
2513 cover IAPP CIPP/US Certified Information Privacy Professional Study Guide - 2nd Edition [2 ed.] Mike Chapple, Joe Shelley 2
2514 cover CompTIA PenTest+ Study Guide : Exam PT0-003 [Third Edition] Chapple, Mike,Shimonski, Robert,Seidl, David,, Robert Shimonski, David Seidl
2515 cover Securing the AWS Cloud : A Guide for Learning to Secure AWS Infrastructure [First Edition] Brandon Carroll
2516 cover A Beginner’s Guide to Web Application Penetration Testing Ali Abdollahi
2517 cover Cybersecurity For Dummies [3 ed.] Joseph Steinberg 3
2518 cover Taming the Hacking Storm : A Framework for Defeating Hackers and Malware [First Edition] Roger A. Grimes
2519 cover Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls [2 ed.] Christopher J Hodson 2