Computer Security in 2016
The Way of the White Hat: Cyber Security Through Penetration Testing
by
Sanchez, Dennis Paul Nino S.
Bring Your Own Device - Ein Praxisratgeber: Hmd Best Paper Award 2014
by
Walter, Thorsten
Security Controls Evaluation, Testing, and Assessment Handbook
by
Johnson, Leighton
Quantum Computational Number Theory
by
Yan, Song Y.
Cybersecurity 101: What You Absolutely Must Know! - Volume 1: Learn How Not to be Pwned, Thwart Spear Phishing and Zero Day Exploits, Clo
by
Scott, James
Cybersecurity 101: What You Absolutely Must Know! - Volume 2: Learn JavaScript Threat Basics, USB Attacks, Easy Steps to Strong Cybersecu
by
Scott, James
Learning iOS Penetration Testing
by
Yermalkar, Swaroop
Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare
by
Ferrari, John H.
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-Based Inter-Model Connections
by
Domingo-Ferrer, Josep, Sánchez, David, Soria-Comas, Jordi
Absolute Security: Theory and Principles of Socially Secure Communication
by
Radley, Alan Stuart
Cryptography & Hacking
by
Tech, Solis
Cryptography & Malware
by
Tech, Solis
Circuit Engineering & Cryptography
by
Tech, Solis
Cryptography & CompTIA A+
by
Tech, Solis
Circuit Engineering & Malware
by
Tech, Solis
Hacking & Quality Assurance
by
Tech, Solis
Hacking & Raspberry Pi 2
by
Tech, Solis
Hacking & Comptia A+
by
Tech, Solis
Hacking & Malware
by
Tech, Solis
Cryptography & Raspberry Pi 2
by
Tech, Solis
Cryptography & Human-Computer Interaction
by
Tech, Solis
Cryptography & Robotics
by
Tech, Solis
Securing an IT Organization through Governance, Risk Management, and Audit
by
Rainey, James L., III, Sigler, Ken E.
Cryptography & Open Source
by
Tech, Solis
Cryptography & CompTIA A+
by
Tech, Solis
Malware: Malware Detection & Threats Made Easy!
by
Tech, Solis
Social Engineering: Advanced Topics in Computer Security
by
Pechar, Virgil
Scareware: Advanced Topics in Computer Security
by
Halgas, Zachary
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
by
Dykstra, Josiah
The Psychology of Information Security
by
Zinatullin, Leron
Small Business Cyber Security: Your Customers Can Trust You...Right?
by
Gilkeson, Tom, Anderson, Adam
Digitale Fernseh- Und Hörfunktechnik in Theorie Und PRAXIS: Mpeg-Quellcodierung Und Multiplexbildung, Analoge Und Digitale Hörfunk- Und Fernsehstandar
by
Fischer, Walter
IOS Forensics Cookbook
by
Birani, Bhanu, Birani, Mayank
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program
by
Kovacich, Gerald L.
Malware Diffusion Models for Modern Complex Networks: Theory and Applications
by
Karyotis, Vasileios, Khouzani, M. H. R.
Cryptography: Cryptography Theory & Practice Made Easy!
by
Tech, Solis
Sharing Big Data Safely: Managing Data Security
by
Dunning, Ted, Friedman, Ellen
Computer Access Control: Federated Identity
by
Urlanza, Marcellus
Hacking: Hacking For Beginners and Basic Security: How To Hack
by
Hatcher, Jacob
Malware & Raspberry Pi 2
by
Tech, Solis
Malware & Quality Assurance
by
Tech, Solis
Malware & Open Source
by
Tech, Solis
Circuit Engineering & Cryptography & Hacking
by
Tech, Solis
Malware & Robotics
by
Tech, Solis
Apoc@lypse: O Fim do Antivirus
by
Winter, Rogerio, Park, Kil, Amatte, Fernando
My Personal Computer Database
by
Nelson, Sandra
Complete Password Manager
by
Blank Books, Lazaros'
MPLS in the Sdn Era: Interoperable Scenarios to Make Networks Scale to New Services
by
Monge, Antonio, Szarkowicz, Krzysztof
D/DoS: Denial of Service Attacks
by
Aquilina, Antonio
Cryptographic Attacks: Computer Security Exploits
by
Krzewinski, Basil
scam.con
by
Law, Tom
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
by
Rojas, Ernesto F., Zeigler, Ann D.
Injection Exploits: Computer Security Exploits
by
Barill, Rueben
Industrial Espionage and Technical Surveillance Counter Measurers
by
Androulidakis, I. I., Kioupakis
Robotics + Human-Computer Interaction + Open Source
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Raspberry Pi 2
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Cryptography
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Hacking
by
Fraser, Kenneth
Circuit Engineering + Cryptography + Raspberry Pi 2
by
Tech, Solis
Hacking + Malware + Comptia A+
by
Tech, Solis
Android Application Pentesting Handbook
by
Huntley, Samuel
Hacking + Malware + Quality Assurance
by
Tech, Solis
Hacking + Malware + Raspberry Pi 2
by
Tech, Solis
Malware + Robotics + Human-Computer Interaction
by
Tech, Solis
Malware + Robotics + Cryptography
by
Tech, Solis
Quality Assurance + Cryptography + Raspberry Pi 2
by
Tech, Solis
Introduction to Secure Outsourcing Computation
by
Chen, Xiaofeng
Robotics + Human-Computer Interaction + Malware
by
Fraser, Kenneth
Robotics + Human-Computer Interaction + Quality Assurance
by
Fraser, Kenneth
Online Health and Safety: From Cyberbullying to Internet Addiction
by
Schell, Bernadette H.
Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century
by
Marion, Nancy E., Hill, Joshua B.
Mastering Kali Linux Wireless Pentesting
by
Sak, Brian, Reddy, Raghu
Bitcoin Essentials
by
Szmigielski, Albert
Cryptography and Network Security: Principles and Practice
by
Stallings, William
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters
by
Weston, J. D. Stephen W., Calhoun, Frederick S.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process
by
Sachowski, Jason
Security of Block Ciphers: From Algorithm Design to Hardware Implementation
by
Sasaki, Yu, Li, Yang, Sakiyama, Kazuo
Kali Linux Web Penetration Testing Cookbook
by
Najera-Gutierrez, Gilberto
Learning Network Forensics
by
Datt, Samir
The Car Hacker's Handbook: A Guide for the Penetration Tester
by
Smith, Craig
Federal Cybersecurity Research and Development Strategic Plan: 2016
by
National Science and Technology Council
Boolean Functions and Their Applications in Cryptography
by
Wu, Chuan-Kun, Feng, Dengguo
Information Security Auditor: Careers in Information Security
by
Goucher, Wendy
A Decade of Lattice Cryptography
by
Peikert, Chris
Access Control: Understanding Information Sensitivity
by
Greening, Marcus R.
Cybersecurity Investments: Decision Support Under Economic Aspects
by
Beissel, Stefan
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
by
Chapman, Chris
Wirtschaftsspionage: Phänomenologie - Erklärungsansätze - Handlungsoptionen
by
Fleischer, Dirk
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
by
Bair, John, Shavers, Brett
Beobachtungsmöglichkeiten Im Domain Name System: Angriffe Auf Die Privatsphäre Und Techniken Zum Selbstdatenschutz
by
Herrmann, Dominik
Cisa Certified Information Systems Auditor Study Guide
by
Cannon, David L.
Hacking: Basic Hacking Fundamental Secrets
by
Dunlop, Steven
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
by
Smith, James
Making Passwords Secure: Fixing the Weakest Link in Cybersecurity
by
Bonnett, Dovell
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
by
Carvey, Harlan
Is the OPM Data Breach the Tip of the Iceberg?
by
Subcommittee on Oversight &. Subcommittee
Mastering Wireshark
by
Mishra, Charit
Tradecraft Primer: A Framework for Aspiring Interrogators
by
Topalian, Paul Charles
They Will Do Anything: Identity Theft and Internet Fraud
by
Staley, Wayne L.
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
by
Cardwell, Kevin, Allen, Terry Lee
Selling Information Security to the Board, second edtion
by
Calder, Alan
Mobile Phone Security and Forensics: A Practical Approach
by
Androulidakis, Iosif I.
The Complete Guide to Cybersecurity Risks and Controls
by
Shoemaker, Dan, Sigler, Ken E., Kohnke, Anne
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control
by
Cerrato, Paul
Fundamentals of Information Risk Management Auditing
by
Wright, Christopher
Hacking
by
Spivak, Walter
Social Media Investigation for Law Enforcement
by
Brunty, Joshua, Helenek, Katherine
Decision to Attack: Military and Intelligence Cyber Decision-Making
by
Brantly, Aaron Franklin
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?
by
Subcommittee on Crime and Terrorism of T.
Password Log
by
Log, My Password
Oracle Database 12c Security cookbook
by
Veselica, Maja, Pavlovic, Zoran
Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python
by
Miller, Preston, Bryce, Chapin
Information Security: Policy, Processes, and Practices
by
Goodman, Seymour, Straub, Detmar W., Baskerville, Richard
Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century
by
Robot, University, Hacking
Einführung in Die Kryptographie
by
Buchmann, Johannes
Software Quality Assurance: Integrating Testing, Security, and Audit
by
Mahfuz, Abu Sayed
SUSE Linux Enterprise Server 12 - Security Guide
by
Contributors, Sec Guide
SUSE Linux Enterprise Desktop 12 - Security Guide
by
Contributors, Sec Guide
Moving Target Defense for Distributed Systems
by
Shetty, Sachin, Song, Min, Yuchi, Xuebiao
Hacked!: A warning for small business
by
Lee, Mike, Hitchen, Brian
Pond of Scams
by
Ayoade, Tolu
Hacking SCADA/Industrial Control Systems: The Pentest Guide
by
Atkins, Christopher
Practical Linux Security Cookbook
by
Kalsi, Tajinder
Burners & Black Markets - How to Be Invisible
by
Henderson, Lance
Physical-Layer Security for Cooperative Relay Networks
by
Zhu, Jia, Zou, Yulong
OS X Incident Response: Scripting and Analysis
by
Bradley, Jaron
Voip and Pbx Security and Forensics: A Practical Approach
by
Androulidakis, Iosif I.
Computer Security for The Every Day User: Every day computer security
by
Magara, Michael E.
IBM i Security Administration and Compliance
by
Woodbury, Carol
Linux Server Security: Hack and Defend
by
Binnie, Chris
Threat Forecasting: Leveraging Big Data for Predictive Analysis
by
Pirc, John, Desanto, David, Davison, Iain
Nine Steps to Success: An ISO 27001 Implementation Overview
by
Clader, Alan