Computer Security in 2018
Practical Network Scanning
by
Singh, Ajay
CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs: Exam: 312-50
by
Specialist, Ip
Physical-Layer Security for Cooperative Relay Networks
by
Zhu, Jia, Zou, Yulong
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
by
Petrenko, Sergei
Mastering Metasploit - Third Edition
by
Jaswal, Nipun
Reconfigurable Cryptographic Processor
by
Wei, Shaojun, Liu, Leibo, Wang, Bo
Cyber Wars: Hacks That Shocked the Business World
by
Arthur, Charles
Security in Network Coding
by
Zhang, Peng, Lin, Chuang
Mastering Wireshark 2
by
Crouthamel, Andrew
Python Penetration Testing Essentials
by
Raj, Mohit
Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches
by
Al-Shaer, Ehab, Rahman, Mohammad Ashiqur
Sicherheitsgerichtete Echtzeitsysteme
by
Konakovsky, Rudolf M., Halang, Wolfgang a.
Online Hacker Survival Guide: Achieving Online Invisibility for Asset and Reputation Protection
by
Johnson, Naven
Advanced Monitoring in P2P Botnets: A Dual Perspective
by
Karuppayah, Shankar
Cryptology Transmitted Message Protection: From Deterministic Chaos Up to Optical Vortices
by
Izmailov, Igor, Poizner, Boris, Romanov, Ilia
Some Tutorials In Computer Hacking
by
Alassouli, Hidaia Mahmood
Forgotten Passwords Here: Internet passwords, addresses and usernames, humorous cover with A-Z index
by
Johnson, Kay D.
Glossary of Cyber Warfare, Cyber Crime and Cyber Security
by
Wilson, Richard L., Remenyi, Dan
Please be the Right Password: Internet passwords, addresses and usernames, humorous cover with A-Z index
by
Johnson, Kay D.
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace
by
Fang, Binxing
Student Data Privacy: Building a School Compliance Program
by
Attai, Linnette
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
by
Furneaux, Nick
On Privacy-Preserving Protocols for Smart Metering Systems: Security and Privacy in Smart Grids
by
Borges de Oliveira, Fábio
Vehicular Cyber Physical Systems: Adaptive Connectivity and Security
by
Bajracharya, Chandra, Rawat, Danda B.
CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
by
Anandh, Vijay, Singh, Glen D., Vinod, Michael
Student Data Privacy: Building a School Compliance Program
by
Attai, Linnette
Digital Watermarking: Techniques and Trends
by
Vorakulpipat, Chalee, Rosales, Hamurabi Gamboa, Nematollahi, Mohammad Ali
Group-Target Tracking
by
Dong, Zheng-Hong, Geng, Wen-Dong, Wang, Yuan-Qin
Social Network Analysis in Predictive Policing: Concepts, Models and Methods
by
Tayebi, Mohammad A., Glässer, Uwe
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
by
Haber, Morey J., Hibbert, Brad
Valuing Data: An Open Framework
by
Ray, Dewey E.
Smart Innovations in Communication and Computational Sciences: Proceedings of Icsiccs 2017, Volume 1
by
NIST Special Publication 800-37 (rev 1): Guide for Applying the Risk Management Framework to Federal Information Systems
by
National Institute of Standards and Tech
Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence
by
Choo, Kim-Kwang Raymond, Quick, Darren
The pros and cons of modern web application security flaws and possible solutions
by
Hossain, Shahriat, Mahmud, Kh Ashique
Hands-on Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
by
Gaur, Nitin, Desrosiers, Luc, Novotny, Petr
Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking
by
Smith, Hein, Morrison, Hilary
Practical Web Penetration Testing
by
Khawaja, Gus
Subjective Logic: A Formalism for Reasoning Under Uncertainty
by
Jøsang, Audun
Secure Data Deletion
by
Reardon, Joel
Wireshark 2 Quick Start Guide
by
Mishra, Charit
Blockchain: 3 Books - The Complete Edition on Bitcoin, Blockchain, Cryptocurrency and How It All Works Together In Bitcoin Mining,
by
Sebastian, Lee
Learning Python Web Penetration Testing
by
Martorella, Christian
Mastering Machine Learning for Penetration Testing
by
Chebbi, Chiheb
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs: Exam SY0-501
by
Specialist, Ip
Smart Grids: Security and Privacy Issues
by
Boroojeni, Kianoosh G., Amini, M. Hadi, Iyengar, S. S.
Etude Approfondie sur l'Usage des Protocoles SSH et Open SSH dans un Man
by
Kalonji, Roland Nathan
Guidelines for the Use of PIV Credentials in Facility Access: NiST SP 800-116
by
National Institute of Standards and Tech
Hands-On Cryptography with Python
by
Bowne, Samuel
Hands-On Cybersecurity with Blockchain
by
Gupta, Rajneesh
Extremist Propaganda in Social Media: A Threat to Homeland Security
by
Erbschloe, Michael
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
by
K. a., Monnappa
Mastering Your Introduction to Cyber Security
by
Redmond, Michael C.
Galois Fields, Linear Feedback Shift Registers and Their Applications
by
Jetzek, Ulrich
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
by
Hassan, Nihad A., Hijazi, Rami
Mastering Your Introduction to Cyber Security
by
Redmond, Michael C.
Recommendation for Key Establishment Using Symmetric Block Ciphers: NiST SP 800-71
by
National Institute of Standards and Tech
Python Scapy Dot11: Python Programming for Wi-Fi pentesters
by
Hansen, Yago
The Robust Urban Transportation Network Design Problem
by
Naimi, Alireza
Defending Iot Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
by
Hosmer, Chet
What is the Dark Web?: The truth about the hidden part of the internet
by
Rodgers, Evan J.
Kryptographie: Grundlagen, Algorithmen, Protokolle
by
Wätjen, Dietmar
Introduction to Security Reduction
by
Guo, Fuchun, Susilo, Willy, Mu, Yi
Identity and Access Management for Electric Utilities NIST SP 1800-2a + 2b
by
National Institute of Standards and Tech
Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography: NiST SP 800-56B Rev 2
by
National Institute of Standards and Tech
Homeland Security and Critical Infrastructure Protection
by
Baggett, Ryan K., Simpkins, Brian K.
Smart Innovations in Communication and Computational Sciences: Proceedings of Icsiccs 2017, Volume 2
by
Situational Privacy and Self-Disclosure: Communication Processes in Online Environments
by
Masur, Philipp K.
Hands-On Incident Response and Digital Forensics
by
Sheward, Mike
Feistel Ciphers: Security Proofs and Cryptanalysis
by
Nachef, Valerie, Patarin, Jacques, Volte, Emmanuel
CyberSafe: How To Protect Your Online Life - A Simple Guide For Individuals and SME's
by
Acheampong, Patrick
Advanced Penetration Testing: Hacking AWS
by
Knowell, Richard
Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain
by
Tsirigotis, Anthimos Alexandros
It-Risikomanagement Von Cloud-Services in Kritischen Infrastrukturen: Hmd Best Paper Award 2017
by
Petrick, Christopher, Teuteberg, Frank, Adelmeyer, Michael
Threshold Schemes for Cryptographic Primitives: NiSTIR 8214
by
National Institute of Standards and Tech
Das Peter Hase Passwortbuch / Passwort Logbuch: Passwort, Passwortbuch, Passwort Logbuch, Account, Login, Zugang, Password keeper and Password reminde
by
Potter, Elizabeth M., Potter, Beatrix
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by
Saydjari, O. Sami
Practical Industrial Internet of Things Security
by
Bhattacharjee, Sravani
Reactor Core Monitoring: Background, Theory and Practical Applications
by
Makai, Mihály, Végh, János
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
by
Hsu, Tony
The Peter Rabbit Passwordbook / Password Logbook: Account, Login, Password keeper and Password reminder book, login data, access data, Password file,
by
Potter, Beatrix, Potter, Elizabeth M.
Learn PfSense - Fundamentals of PfSense 2.4
by
Zientara, David
Hands-On Spring Security 5 for Reactive Applications
by
John, Tomcy
Network Security with pfSense
by
Aggarwal, Manuj
Hands-On Penetration Testing on Windows
by
Bramwell, Phil
The Manga Guide to Cryptography
by
Sato, Shinichi, Mitani, Masaaki, Hinoki, Idero
Social Engineering: The Science of Human Hacking
by
Hadnagy, Christopher
Security and Privacy in Smart Grid
by
Abdallah, Asmaa, Shen, Xuemin
Let's Learn Palo Alto NGFW: A Case Study of Checkpoint, Juniper, Cisco, Hacking and Knowing Thyself
by
John Francis, Joe Antony Sebastin
Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security
by
Cybersecurity in Germany
by
Schallbruch, Martin, Skierka, Isabel
Cybersecurity Best Practices: Lösungen Zur Erhöhung Der Cyberresilienz Für Unternehmen Und Behörden
by
Information Technology Control and Audit, Fifth Edition
by
Otero, Angel R.
Advances in User Authentication
by
Roy, Arunava, Nag, Abhijit, Dasgupta, Dipankar
Blockchain Quick Reference
by
Chopra, Samanyu, Valencourt, Paul, Hill, Brenn
Fundamentals of Secure System Modelling
by
Matulevičius, Raimundas
Hackers Exposed: Discover the secret world of cybercrime
by
Barbosa de Azevedo, Fernando Uilherme
Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools
by
Bhattacharyya, Dhruba K., Kalita, Jugal K., Bhuyan, Monowar H.
Information Technology - New Generations: 14th International Conference on Information Technology
by
Datenschutz - Konzepte, Algorithmen Und Anwendung: Werkzeuge Zum Datenschutz Im Alltag
by
Von Rimscha, Markus
GDPR and Cyber Security for Business Information Systems
by
Buchanan, William J., Gobeo, Antoni, Fowler, Connor
Agile Security Development Life Cycle (ASDLC): Integrating Security into the System Development Life Cycle
by
Russo, Mark a.
Framing Privacy in Digital Collections with Ethical Decision Making
by
Dressler, Virginia
Quantum Computing for High School Students
by
Billig, Yuly
Cryptography: Theory and Practice
by
Stinson, Douglas Robert, Paterson, Maura
Quantum Computing for High School Students
by
Billig, Yuly