Computer Security in 2023
The Security & Privacy Acceptance Framework (SPAF)
by
Das, Sauvik, Faklaris, Cori, Hong, Jason I.
Criptología Digital (Digital Cryptology)
by
Thomas, Rachael L.
Criptología Digital (Digital Cryptology)
by
Thomas, Rachael L.
Mobile Health Applications: Rechtliche Rahmenbedingungen Von Gesundheits-Apps
by
Reitebuch, Lukas
Geprüfte Schutz- Und Sicherheitskraft (Ihk): Lehrbuch Für Prüfung Und PRAXIS
by
Schwarz, Robert
Sachkunde Im Bewachungsgewerbe (Ihk): Lehrbuch Für Prüfung Und PRAXIS
by
Schwarz, Robert
Algorithmic Bias: Verzerrungen Durch Algorithmen Verstehen Und Verhindern: Ein Leitfaden Für Entscheider Und Data Scientists
by
Bär, Tobias
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity
by
Montasari, Reza
Datenschutz: Einführung in Technischen Datenschutz, Datenschutzrecht Und Angewandte Kryptographie
by
Ziebarth, Wolfgang, Petrlic, Ronald, Sorge, Christoph
Cybersecurity - Data Protection and Strategies: First Edition
by
Palmer, Wesley
Cybersecurity - Data Protection and Strategies: First Edition
by
Palmer, Wesley
Space Rogue: How the Hackers Known as L0pht Changed the World
by
Thomas, Cris
Space Rogue: How the Hackers Known as L0pht Changed the World
by
Thomas, Cris
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment
by
Miller, Richie
Securing Delay-Tolerant Networks with Bpsec
by
Heiner, Sarah, McKeever, Ken, Birrane, Edward J.
Cybersecurity Design Principles: Building Secure Resilient Architecture
by
Miller, Richie
CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance
by
Miller, Richie
Searchable Encryption: From Concepts to Systems
by
Ren, Kui, Wang, Cong
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance
by
Miller, Richie
Cissp: Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans
by
Miller, Richie
Archives and Records: Privacy, Personality Rights, and Access
by
Čtvrtník, Mikulás
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies
by
Natwick, Dwayne
Archives and Records: Privacy, Personality Rights, and Access
by
Čtvrtník, Mikulás
Preference-Based Spatial Co-Location Pattern Mining
by
Zhou, Lihua, Wang, Lizhen, Fang, Yuan
Wireless Penetration Testing: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and IOS Application Security, and Break Wep
by
El Fiky, Ahmed Hashem
Connecting the Internet of Things: Iot Connectivity Standards and Solutions
by
Kumar, Anil, Hussain, Jafer, Chun, Anthony
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
by
Simpson, William R., Institute for Defense Analyses, Foltz, Kevin E.
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends
by
Habibi Lashkari, Arash, Sharafaldin, Iman, Kaur, Gurdip
Securing Kubernetes Secrets
by
Block, Andrew, Bueno, Alex
Asymmetric Cryptography: Primitives and Protocols
by
Pointcheval, David
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
by
Ali, Ikram, Chen, Yong, Faisal, Mohammad
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
by
Cambric, Shinesa, Ratemo, Michael
Cybersecurity Jobs: Resume Marketing
by
Brown, Bruce
Cybersecurity Jobs & Career Paths
by
Brown, Bruce
Analysis of the BEM Code of Professional Guidelines
by
Hezam, Bandar
Cybersecurity Essentials Made Easy: A No-Nonsense Guide to Cyber Security For Beginners
by
Paula, Daniel
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus
by
Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks
by
Zhu, Haojin, Shen, Meng, Yan
Digitale Kompetenz: Grundlagen Der Künstlichen Intelligenz, Blockchain-Technologie, Quanten-Computing Und Deren Anwendungen Für Die Digita
by
Lang, Volker
The Compliance Formula
by
Cybersecurity Experts, Leading
Information Technology Law in Australia
by
Cho, George
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
by
Hardt, Robert, Pandit, Parth
Secure, Resilient, and Agile Software Development
by
Merkow, Mark
Cryptoeconomics: Igniting a New Era of Blockchain
by
Xu, Wei, Gong, Jian
Learn AAVE DeFi Protocol: 100+ Coding Q&A
by
Cakal, Yasin Hasan
Cryptology: Classical and Modern
by
Klima, Richard E., Sigmon, Neil P., Klima, Richard
Combinatorics and Number Theory of Counting Sequences
by
Mezo, Istvan
Secrets of a Cyber Security Architect
by
Schoenfield, Brook S. E.
Acquiring Card Payments
by
Dubinsky, Ilya
Cryptography: Theory and Practice
by
Stinson, Douglas Robert, Paterson, Maura
Introduction to Coding Theory
by
Bierbrauer, Jurgen
CBAP(R) Certification and BABOK(R) Study Guide
by
Jonasson, Hans
Windows 11 Datenschutzfibel: Alle Datenschutzeinstellungen finden und optimal einstellen
by
Gieseke, Wolfram
Compliance Made Easy
by
Cybersecurity Experts, Leading
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls That Derail Us
by
Dykstra, Josiah, Spafford, Eugene, Metcalf, Leigh
Así Es Como Me Dicen Que Acabará El Mundo
by
Perlroth, Nicole
Quantum Computers: A Complete Guide to Explain in Easy Way(Mathematical Principle and Transition to the Classical Discrete)
by
Price, Carlos
Application Security Program Handbook
by
Fisher, Derek
Accelerated Linux Core Dump Analysis: Training Course Transcript with GDB and WinDbg Practice Exercises, Third Edition
by
Software Diagnostics Services, Vostokov
Machine Learning for Cyber Agents: Attack and Defence
by
Abaimov, Stanislav, Martellini, Maurizio
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts
by
Lab, Nan00t's
Social Engineering and Digital Defense Survival Guide for the Everyday Person: Tools & Tactics to Protect Your Privacy and Identity from Cybercriminal
by
Danielson, Henry, Baker, James J.
Netzwerk- Und Datensicherheit: Eine Praktische Einführung
by
Kappes, Martin
Cyber Security: How to Protect Your Business
by
Himilsbach, Sven
Handbuch Unternehmenssicherheit: Umfassendes Sicherheits-, Kontinuitäts- Und Risikomanagement Mit System
by
Müller, Klaus-Rainer
Triangle Mesh Watermarking and Steganography
by
Chen, Kejiang, Ma, Zehua, Zhou, Hang
Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers)
by
Lee, Michael
Basics on Public Key Infrastructure (PKI)
by
Scholtens, A.
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
by
Nearchou, Nearchos
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies
by
Parker, Carey
Access Control Models and Architectures for Iot and Cyber Physical Systems
by
Bhatt, Smriti, Alshehri, Asma Hassan, Gupta, Maanak
Iapp Cipm Certified Information Privacy Manager Study Guide
by
Chapple, Mike, Shelley, Joe
Threats: What Every Engineer Should Learn from Star Wars
by
Shostack, Adam
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
by
Schneier, Bruce
Security as Code: Devsecops Patterns with AWS
by
Chu, Virginia, Das, Bk
Cybersecurity All-In-One for Dummies
by
Beaver, Kevin, Steinberg, Joseph, Winkler, Ira
The 10 Most Famous Hacks in History (Hardcover Edition)
by
Kathy, Black Hat
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks
by
Jenkinson, Andrew
Digital Blood on Their Hands: The Ukraine Cyberwar Attacks
by
Jenkinson, Andrew
Linux Essentials for Hackers & Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands
by
Advocate Team, Linux
Software Security: Concepts & Practices
by
Ahmad Khan, Suhel, Kumar, Rajeev, Ahmad Khan, Raees
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
by
Windley, Phillip
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Chen, Guihai, Li, Zhenhua, Dai, Yafei
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
by
Shoemaker, Tamara, Shoemaker, Daniel, Sigler, Ken
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
by
Shoemaker, Tamara, Shoemaker, Daniel, Sigler, Ken
Blockchain for Everyone: A Guide for Absolute Newbies
by
Herrmann, Noah
Metaverse Investing: The Ultimate Guide
by
Herrmann, Noah
Crypto Investing Guide: The Ultimate Safe and Secure Guide
by
Herrmann, Noah
Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization
by
Sehgal, Kunal, Thymianis, Nikolaos
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
by
Strout, Benjamin
A Proactive Network Surveillance Framework
by
Singh, Maninder
IT-Sicherheit
by
Eckert, Claudia
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by
Perlroth, Nicole
Sicheres Homeoffice: Herausforderungen nachhaltiger Sicherheit
by
Penner, Marco, Karunakumar, Saghana, Keuntje, Jörg-Michael
Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media: Introducing the Racist and Violent Extremist Flock Tool
by
Tapia, Daniel, Warren, Kristin, Burns, Jacqueline Gardner
Rust for Network Programming and Automation: Learn to Design and Automate Networks, Performance Optimization, and Packet Analysis with low-level Rust
by
Anderson, Brian
Fundamentals of Physical Memory Analysis: Anniversary Edition
by
Vostokov, Dmitry, Software Diagnostics Services
Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program
by
Brown, Jason
Information Retrieval and Natural Language Processing: A Graph Theory Approach
by
Ghotkar, Archana S., Sonawane, Sheetal S., Mahalle, Parikshit N.
Secure Multimodal Biometric Authentication System Involving Ear, Fingerprint and Voice Recognition in Cloud Computing
by
Parimala, R.
Parent Handbook for Online Safety: Practical Ideas, Activities, & Information for Your Family
by
Miller, Dana L. C.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
by
Schneier, Bruce
(Isc)2 Cissp Certified Information Systems Security Professional Official Study Guide 9th Edition: 9th Edition
by
Gibson, Darril, Chapple, Mike, Stewart, James Michael
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
by
Tevault, Donald a.
Personal Security Data in an Increasingly Digital World
by
Aldada, Suhaib, Cara, Julia, Mardon, Austin
Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level
by
Huijbregts, Paul, Anich, Joe, Graves, Justen
Cybersecurity for Main Street: Cyber Fit in 21 Days
by
Westerheim, Ann
Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence
by
Liu, Bo, Sreevallabh Chivukula, Aneesh, Yang, Xinghao
Blockchain for Real World Applications
by
Garg, Rishabh
Behavior-based Authentication to Protect System Services From Malicious Attacks
by
Muthumanickam, K.
Behavioral Game Theory Analysis of Cybersecurity With Deception and Ids
by
Aggarwal, Palvi
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
by
Torres, Nestor N., Almoailu, Ahmed, Soper, Ryan
Security and Privacy in Federated Learning
by
Yu, Shui, Cui, Lei
Mastering C++ Network Automation: Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking
by
Barbara, Justin
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter
by
Taylor, Ian
Hardening Windows 11
by
Nomer Cissp, Russell D.
The Phantom CISO: Time to step out of the shadow
by
Zahid, Hisham, Khan, Mishaal
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness
by
Lapointe, Lise
The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness
by
Lapointe, Lise
Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons
by
Wilson, Bradley, Goughnour, Thomas, McKernan, Megan
PKI Implementation and Infrastructures
by
Ashbourn, Julian
PKI Implementation and Infrastructures
by
Ashbourn, Julian
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
by
Claypoole, Ted, Payton, Theresa
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
by
Sandbu, Marius
The Book on Testing: For a World that Runs on Software
by
Rodov, Alex
Privacy and Data Protection in Law Israel
by
Birnhack, Michael, Rachum-Twaig, Omri
Information Technology Law in India
by
Fatima, Talat
Privacy and Data Protection Law in Brazil
by
Pinheiro, Patricia Peck
Threats: What Every Engineer Should Learn from Star Wars
by
Shostack, Adam