Computer Security in 2019
Information Technology - New Generations: 15th International Conference on Information Technology
by
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
by
Reiber, Lee
Hands-On IoT Solutions with Blockchain
by
Moura, Enio, Santos, Maximiliano
Protect Your Online Identity Like Your Virginity
by
Abhishek Singh Rajpurohit
Auditando Tus Sistemas de Información e Infraestructura de TI: Programas de Auditoría Práctica / Listas de verificación para Auditores Internos
by
Ohia, Nwabueze
Situational Privacy and Self-Disclosure: Communication Processes in Online Environments
by
Masur, Philipp K.
Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace
by
Fang, Binxing
Fire Doesn't Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks
by
Boyle, Kip
How to Talk to Your Kids About Pornography
by
Alexander, Dina, Educate and Empower Kids
Passwort Logbuch: ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren für Schließfach, Testament, Anwalt...
by
Sültz, Renate, Sültz, Uwe H.
Sacmat '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
by
Sacmat
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
by
Graber, Diana
Emerging Technologies in Data Mining and Information Security: Proceedings of Iemis 2018, Volume 1
by
Passwort Manager - Logbuch - Safe - Internet & Passwort Organizer: ...inkl. Austrennseiten/Nachlassseiten zum Aufbewahren für Schließfach, Testament,
by
Wardenga, R. G.
Password Keeper: Save Passwords - Wi-Fi Log-Ins - Software Licenses
by
Simple Start Guides
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
by
Petrenko, Sergei
Multi-Photon Quantum Secure Communication
by
El Rifai, Mayssaa, Chan, Kam Wai Clifford, Verma, Pramode K.
Mastering Ethereum: Building Smart Contracts and DApps
by
Antonopoulos, Andreas, Wood, Gavin
Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
by
Evans, Lester
Securing Office 365: Masterminding MDM and Compliance in the Cloud
by
Katzer, Matthew
Foundations of Blockchain
by
Raj, Koshik
Computer Vision - Eccv 2018 Workshops: Munich, Germany, September 8-14, 2018, Proceedings, Part II
by
Implementing Azure: Putting Modern DevOps to Use
by
Klein, Markus, Michalski, Oliver, Klaffenbach, Florian
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
by
Augenbaum, Scott
Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection
by
Salmani, Hassan
Introduction to Security Reduction
by
Mu, Yi, Susilo, Willy, Guo, Fuchun
Python Network Programming
by
Kathiravelu, Pradeeban, Chou, Eric, Ratan, Abhishek
Mastering Kali Linux for Advanced Penetration Testing - Third Edition: Secure your network with Kali Linux 2019.1 - the ultimate white hat hackers' to
by
Velu, Vijay Kumar, Beggs, Robert
Blockchain for Business 2019
by
Lipovyanov, Peter
Hands-On Cybersecurity for Finance
by
Aslaner, Milad, Ozkaya, Erdal
Hands-On Penetration Testing with Python
by
Khan, Furqan
Learning Python for Forensics -Second Edition
by
Miller, Preston, Bryce, Chapin
Practical Security Automation
by
Hsu, Tony
Hash Crack: Password Cracking Manual
by
Picolet, Joshua
Secure Networked Inference with Unreliable Data Sources
by
Vempaty, Aditya, Kailkhura, Bhavya, Varshney, Pramod K.
Building Digital Experience Platforms: A Guide to Developing Next-Generation Enterprise Applications
by
Sethii, Sourabhh, Shivakumar, Shailesh Kumar
Reinforcement Learning for Cyber-Physical Systems: With Cybersecurity Case Studies
by
Qiu, Meikang, Li, Chong
Training Law Enforcement Officers
by
Giovengo, Rick D.
Protecting Your Assets: A Cybersecurity Guide for Small Businesses
by
Schaefer, John a.
Secure Cloud Transformation: The CIO's Journey
by
Stiennon, Richard
Happy 37th Birthday Shithead: Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Happy 51st Birthday Shithead: Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-003
by
Parker, Jeff T., Gregg, Michael
Hands-On Blockchain for Python Developers
by
Kok, Arjuna Sky
Applied Cryptography in .Net and Azure Key Vault: A Practical Guide to Encryption in .Net and .Net Core
by
Haunts, Stephen
PCI DSS, Breve Guía para el Cumplimiento
by
Ferrini Fonseca, Dante
Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, W
by
Bradley, Peter
The Identity Trade: Selling Privacy and Reputation Online
by
Draper, Nora A.
Adversarial Machine Learning
by
Joseph, Anthony D., Nelson, Blaine, Rubinstein, Benjamin I. P.
It-Sicherheit Und Datenschutz Im Gesundheitswesen: Leitfaden Für Ärzte, Apotheker, Informatiker Und Geschäftsführer in Klinik Und Praxis
by
Darms, Martin, Haßfeld, Stefan, Fedtke, Stephen
Security and Data Storage Aspect in Cloud Computing
by
Sharma, Subhash C., Peddoju, Sateesh K., Deshpande, Prachi S.
The California Consumer Privacy Act (CCPA) & NIST 800-171: The 2019 Guide for Business Owners SECOND EDITION
by
Russo Cissp-Issap Ciso, Mark a.
Data Security in Cloud Computing, Volume I
by
D'Agostino, Giulio
Data Security in Cloud Computing, Volume II
by
D'Agostino, Giulio
Conversations in Cyberspace
by
D'Agostino, Giulio
Mastering Identity and Access Management with Microsoft Azure - Second Edition: Empower users by managing and protecting identities and data, 2nd Edit
by
Nickel, Jochen
Digital Forensics Basics: A Practical Guide Using Windows OS
by
Hassan, Nihad A.
Datenschutzrechtliche Aspekte Und Der Einsatz Biometrischer Systeme in Unternehmen: Eine Exemplarische Betrachtung Von Systemen Auf Der Grundlage Des
by
Dotzler, Florian
Hands-On Application Penetration Testing with Burp Suite
by
Shah, Dhruv, Walikar, Riyaz, Lozano, Carlos a.
Hands-On Penetration Testing with Kali NetHunter
by
Oriyano, Sean-Philip, Singh, Glen D.
Adaptive Middleware for the Internet of Things: The GAMBAS Approach
by
Handte, Marcus, Schiele, Gregor, Marrón, Pedro José
Trustworthy Email: NIST Special Publication 800-177
by
National Institute of Standards and Tech
Internet Password Vault: Store all your websites, usernames and passwords, as well as a wealth of other computer-related information in one con
by
Magraw, Alley
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics
by
Yan, Wei Qi
The Truth Machine: The Blockchain and the Future of Everything
by
Vigna, Paul, Casey, Michael J.
Auditing Vostri Sistemi Informativi e dell'Infrastruttura IT: Programmi di Audit Pratici / Liste di Controllo per i Revisori Interni
by
Ohia, Nwabueze
EU Personal Data Protection in Policy and Practice
by
Custers, Bart, Sears, Alan M., Dechesne, Francien
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
by
Oakley, Jacob G.
Im Spannungsfeld zwischen informationeller Selbstbestimmung und öffentlicher Sicherheit: Die Quellen-Telekommunikationsüberwachung und Online-Durchsuc
by
Müller, Julian
Happy 21st Birthday: Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better Than a Birthday (Large Print Edition)
by
Designs, Level Up, Douglas, Karlon
Digital Defense: A Cybersecurity Primer
by
Pelton, Joseph, Singh, Indu B.
The Global Cyber-Vulnerability Report
by
Dumitras, Tudor, Subrahmanian, V. S., Ovelgonne, Michael
2016 Annual Report of Top Cyber Security Incidents
by
Hyslip, Thomas
Architecture for Blockchain Applications
by
Staples, Mark, Xu, Xiwei, Weber, Ingo
Ransomware life cycle and how to combat it
by
Ismail, Haitham
Drone de seguridad para pymes
by
Rodríguez Hernández, Ramón Alexis
E-Citizens: Toward a New Model of (Inter)Active Citizenry
by
Ronchi, Alfredo M.
Auditing Uw Windows-Infrastructuur, Intranet En Internetbeveiliging: Een Praktisch Auditprogramma Voor It Assurance-Professionals
by
Ohia, Nwabueze
Auditing van uw BetaalkaartBrocessen, Systemen en Applicaties: Een Stap voor Stap PCIDSS-conform Auditprogramma: Een Praktische Gids voor Betaalkaartm
by
Ohia, Nwabueze
Spot-On Encryption Suite: Democratization of Multiple & Exponential Encryption: - Handbook and User Manual as practical software guide with intr
by
Edwards, Scott, Project, Spot-On Sf Net
NIST 800-171 rev. 1: Post-Secondary Education Cyber-Guidebook
by
Russo Cissp-Issap Ceh, Mark a.
A Socio-Legal Study of Hacking: Breaking and Remaking Law and Technology
by
Dizon, Michael Anthony C.
Blockchain Development with Hyperledger
by
Desrosiers, Luc, Gaur, Nitin, Baset, Salman a.
Securing Network Infrastructure
by
Jetty, Sairam, Rahalkar, Sagar
Listening in: Cybersecurity in an Insecure Age
by
Landau, Susan
Practical Security: Simple Practices for Defending Your Systems
by
Zabicki, Roman
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration tes
by
Sharma, Himanshu
Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime
by
Iorliam, Aamo
Powershell and Python Together: Targeting Digital Investigations
by
Hosmer, Chet
Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools
by
Jaswal, Nipun
A Pragmatic Introduction to Secure Multi-Party Computation
by
Evans, David, Kolesnikov, Vladimir, Rosulek, Mike
Current Trends in Cyber Security
by
Kent and Du Quenoy, Neil And Irina
The Cyber Path: The Infrastructure Supporting the Internet Data Flow
by
Giannelli, Lou
Securing the Cloud: Security Strategies for the Ubiquitous Data Center
by
Franklin Jr, Curtis, Chee, Brian
Cissp: A Comprehensive Beginners Guide on the Information Systems Security
by
Schmidt, Walker
Big Data Privacy Preservation for Cyber-Physical Systems
by
Errapotu, Sai Mounika, Pan, Miao, Wang, Jingyi
Principi Della Sicurezza Informatica: Become an Ethical Hacker
by
Compare, Giuseppe
Fully Homomorphic Encryption in Real World Applications
by
Chatterjee, Ayantika, Aung, Khin Mi Mi
Report of The Attorney General's Cyber Digital Task Force: 2018
by
Department of Justice
Deviance in Social Media and Social Cyber Forensics: Uncovering Hidden Relations Using Open Source Information (Osinf)
by
Al-Khateeb, Samer, Agarwal, Nitin
Domain Specific High-Level Synthesis for Cryptographic Workloads
by
Chattopadhyay, Anupam, Khalid, Ayesha, Paul, Goutam
Electronic Crime Scene Investigation: A Guide for First Responders
by
Department of Justice
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
by
Swain, Gandharba
Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications
by
Haas, Roland E., Möller, Dietmar P. F.
Concurrency Control and Recovery in Oltp Systems: High Scalability and Availability
by
Guo, Jinwei, Zhou, Aoying, Cai, Peng
Anonymize Yourself: The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation
by
Drake, Derek, Instafo
Scrm 2.0: 21st Century Supply Chain Risk Management Solutions
by
Russo Cissp-Issap Itilv3, Mark a.
Core Data Analysis: Summarization, Correlation, and Visualization
by
Mirkin, Boris
Strategic Security: Forward Thinking for Successful Executives
by
Perois, Jean