Computer Security in 2024
Python Programming for Cybersecurity: A Comprehensive Handbook for Beginners
by
Bytebazzar Publications
Comptia Security+ Guide to Network Security Fundamentals
by
Ciampa, Mark
Cybersecurity Incident Management Masters Guide: Volume 3 - The Incident Commander
by
Clark, Colby A.
IT Risk Management: Introduction to the main concepts and processes of IT Risk Management
by
Zuccari, Fabrizio
The Cybersecurity Spiral of Failure (and How to Break Out of It): Why large firms still struggle with cybersecurity and how to engineer real change dy
by
Gaillard, Jean-Christophe
Malware Reverse Engineering: Cracking The Code
by
Botwright, Rob
Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security
by
Botwright, Rob
Scaling Up: How Data Curation Can Help Address Key Issues in Qualitative Data Reuse and Big Social Research
by
Mannheimer, Sara
Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in Us and UK National Cybersecurity
by
Montasari, Reza
Cybersecurity for Modern Smart Grid Against Emerging Threats
by
Chen, Yao, Roomi, Muhammad M., Mashima, Daisuke
Das Ddr-Chiffriergerät T-310: Kryptographie Und Geschichte
by
Stephan, Winfried, Killmann, Wolfgang
OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng
by
Botwright, Rob
Ccsp for Dummies: Book + 2 Practice Tests + 100 Flashcards Online
by
Deane, Arthur J.
Defense In Depth: Network Security And Cyber Resilience
by
Botwright, Rob
Ultimate Splunk for Cybersecurity
by
Sinha, Jit
Searchable Encryption: From Concepts to Systems
by
Wang, Cong, Ren, Kui
Social Media Monetization Handbook: Leveraging Your Online Presence to Turn Likes and Followers into Income
by
Robson, Carl
Mastering Active Directory Attacks: Exploitation and Defense
by
Álvarez, Gabriel
Kali Linux CLI Boss: Novice To Command Line Maestro
by
Botwright, Rob
Artificial Intelligence Ethics and International Law -: Practical Approaches to AI Governance
by
Abhivardhan
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Ethisches Hacken: Ein umfassendes Einsteigerbuch Leitfaden zum Erlernen der effektiven Strategien des ethischen Hackings
by
Lewis, Elijah
Becoming a Computational Thinker: Success in the Digital Age
by
Wang, Paul S.
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Bapst, Brandon, Allen, Brian, Hicks, Terry
Azure Security
by
Magusic, Bojan
Continuous Biometric Authentication Systems: An Overview
by
Smith-Creasey, Max
Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends
by
Sharafaldin, Iman, Kaur, Gurdip, Habibi Lashkari, Arash
Comptia Security+ Practice Tests: Exam Sy0-701
by
Seidl, David
Comptia Security+ Certification Kit: Exam Sy0-701
by
Chapple, Mike, Seidl, David
Cryptocoding Based on Quasigroups
by
Popovska-Mitrovikj, Aleksandra, Bakeva, Verica, Mechkaroska, Daniela
PCI DSS Bootcamp The A-Z Information Security Guide
by
Publications, Book Wave
Pentesting 101: Cracking Gadgets And Hacking Software
by
Botwright, Rob
Identifying and Mitigating the Security Risks of Generative AI
by
Barrett, Clark, Boyd, Brad, Bursztein, Elie
Information Security Planning: A Practical Approach
by
Lincke, Susan
Lock Picking Techniques: Mastering the Art of Lock Picking Essentials for Beginners: Techniques, Tools, Advanced Locksmithing Skills, High-Secu
by
C. Holland, Paul
Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus
by
Martínez-Guerra, Rafael, Montesinos-García, Juan Javier, Flores-Flores, Juan Pablo
Security in Smart Home Networks
by
Shen, Meng, Yan, Zhu, Haojin
Oracle Linux Cookbook: Embrace Oracle Linux and master Linux Server management
by
Benner, Erik, Thomsen, Erik B., Spindel, Jonathan
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
by
Taylor, Andrew
Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses
by
Montasari, Reza
Guide to Computer Network Security
by
Kizza, Joseph Migga
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark
by
Botwright, Rob
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment
by
Arenson, Avyaan
Rust for Blockchain Developers: A Comprehensive Guide to Build Decentralized Apps with Rust Programming
by
Krum, Jose
Secure Horizons An Introduction to Cybersecurity: Safeguarding the Digital Realm: A Comprehensive Guide to Cybersecurity
by
Pansuriya P., Harsh Hasmukbhai, Pansuriya, Pansuriya
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing
by
Aronowitz, Zusman
Click and Connect: The Power of Digital Relationship Building
by
Sreekumar, V. T.
Cyber Wise: An Insight into the World of Cyber Security
by
Allure, R.
Der Ultimative Leitfaden Zur Automatisierung Mit Zapier: Verwandeln Sie Ihren Arbeitsalltag, maximieren Sie die Produktivität und nutzen Sie die Zukun
by
Ramirez, Edward R.
Advanced Golang Networking: Build High-Availability, Fault-Tolerant Networks with GO Programming
by
Krum, Jose
Infinite Possibilities: A Guide to Manifesting Your Dreams
by
Sreekumar, V. T.
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
by
Chaput, Bob
Unveiling the Core: A Comprehensive Guide to Operating System Design and Implementation: Unveiling the Core: A Comprehensive Journey into
by
Pansuriya P., Harsh Hasmukbhai
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment
by
Hershkowitz, Yaakov
Blockchain: Das Potenzial von Blockchain erkunden: Industrien und darüber hinaus revolutionieren
by
Lehmann, Maximilian
Weaponizing Cyberspace: Inside Russia's Hostile Activities
by
Sambaluk, Nicholas Michael
Dora: A guide to the EU digital operational resilience act
by
Pattison, Andrew
Samsung Galaxy A15 Manual for Beginners and Advanced Users: A Simplified User Guide with Tips & Tricks on How to Master the new Samsung Galaxy A15
by
William, Jason
The Software Developer's Guide to Linux: A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
by
Sturm, Christian, Cohen, David
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
by
Schmitz, Roland, Duplys, Paul
Conquiste sua vaga em segurança da informação
by
Sobiecki, Fabio
Mastering Cybersecurity Ethics: Mastering Cybersecurity and Ethical Hacking: Defense and Offense in the Digital World
by
Conrad, Julian
Multilevel Modeling of Secure Systems in Qop-ML
by
Księżopolski, Bogdan
Touchless Fingerprint Biometrics
by
Labati, Ruggero Donida, Piuri, Vincenzo, Scotti, Fabio
Azure Penetration Testing: Advanced Strategies For Cloud Security
by
Botwright, Rob
Ultimate Cyberwarfare for Evasive Cyber Tactics
by
Tan, Chang
Kubernetes Secrets Handbook: Design, implement, and maintain production-grade Kubernetes Secrets management solutions
by
XI, Chen, Adams, Rom, Gkatziouras, Emmanouil
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
by
Nomani, Qamar
Triangle Mesh Watermarking and Steganography
by
Ma, Zehua, Zhou, Hang, Chen, Kejiang
Cybersecurity Fundamentals Explained
by
MacKay, Brian
Safe Path: A Comprehensive Guide to Security Guidance and Counseling
by
Omale, Alhassan Yakubu
Zero Trust Security Demystified: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient N
by
Knowings, L. D.
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection
by
Knowings, L. D.
Cybersecurity for Everyone
by
Franklin, Edward
Kali Linux, Ethical Hacking And Pen Testing For Beginners
by
Bharat Nishad
NFT Masterclass: Exploring the Digital Future in Art, Investments, and Creativity.
by
Digitalis, Lex
Red Team, Blue Team: A White Hacking Reference
by
Kathy, Black Hat
X86 Software Reverse-Engineering, Cracking, and Counter-Measures
by
Domas, Stephanie, Domas, Christopher
Social Sector - Check What Awaits You
by
Gorsky, Patrick
CompTIA Cloud+ (Plus) Certification Practice Questions, Answers and Master the Exam
by
Mills, Jake T.
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era
by
Cohan, Ofek
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns
by
Damrosch, Tuvya
Cybersecurity for Everyone (Hardcover Edition)
by
Franklin, Edward
Under Pressure: Empowering Cyber Security Incident Responders
by
Phair, Nigel
Crypto Fundamentals: Unlocking the world of cryptocurrencies: essential concepts and strategies
by
Stone, Aiden
Defending APIs: Uncover advanced defense techniques to craft secure application programming interfaces
by
Domoney, Colin
NIST Cloud Security: Cyber Threats, Policies, And Best Practices
by
Botwright, Rob
AI Powered Data Privacy & Data Protection For Small Businesses
by
Arefin, Sabira
Privacy Computing: Theory and Technology
by
Li, Fenghua, Li, Hui, Niu, Ben
AI and the Battlefield: Friend or Foe?
by
Woldemariam, Abebe-Bard Ai
Batch Verification of Digital Signatures in IoT
by
Kittur, Apurva S.
Content Distribution for Mobile Internet: A Cloud-Based Approach
by
Dai, Yafei, Chen, Guihai, Li, Zhenhua
black hat hacking android; using kali linux
by
Pawar, Veer
Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange
by
Alrich, Tom
Dawn of Distrust: Technological Threads Weaving a Trustless Society
by
Maxwell J Aromano
Ethical Hacking and Network Analysis with Wireshark: Exploration of Network Packets for Detecting Exploits and Malware
by
Sharma, Manish
Survival in a Silicon Dawn: Navigating a Hostile A.I. World Takeover
by
Intelligence, Artificial
Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation
by
Botwright, Rob
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Allen, Brian, Hicks, Terry Allan, Bapst, Brandon
Advanced Techniques of Artificial Intelligence in It Security Systems
by
Korytkowski, Marcin
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
by
Hicks, Terry Allan, Bapst, Brandon, Allen, Brian
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware
by
Tobias, Marc Weber
Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions
by
Stankovic, Milena, Stankovic, Radomir S., Moraga, Claudio
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
by
Grimes, Roger A.
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals
by
Ramakrishnan, Ganesh, Haqanee, Mansoor
Boost Your Business with Instagram: Expert Techniques to Increase Leads, Sales and Revenue with an Optimized Instagram Presence
by
Robson, Carl
Trustworthy AI: From Theory to Practice
by
Kuzlu, Murat, Catak, Ferhat Ozgur
The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age
by
Wilder, Zane
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You
by
Fagan, Peter
The Business of Cyber: Why You Should Question What Your Security Team Are Telling You
by
Fagan, Peter
AI-Based Fraud Detection: Safeguarding Your Business Against Cyber Threats
by
Johnson, Trevor
Cybersecurity for Beginners: A Сomprehensive Guide on Protecting Against Digital Threats in the Modern World
by
Peterson, Liam
In Zero Trust We Trust
by
Naduvath, Avinash
Digital Dreams Have Become Nightmares: What We Must Do
by
Baecker, Ronald M.
Digital Dreams Have Become Nightmares: What We Must Do
by
Baecker, Ronald M.
Secure Coding Practices: Fortifying Applications Against Cyber Threats
by
Kathy, Black Hat
Txting 2 Talking: Disconnect to Reconnect
by
Hotte, Kathryn
Security Without Obscurity: A Guide to PKI Operations
by
Stapleton, Jeff, Epstein, W. Clay
Security Without Obscurity: A Guide to PKI Operations
by
Epstein, W. Clay, Stapleton, Jeff
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls
by
Hodson, Christopher J.
Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls
by
Hodson, Christopher J.
PCI DSS Version 4.0: A guide to the payment card industry data security standard
by
Hancock, Stephen
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
by
Hoffman, Andrew
Pen Testing from Contract to Report
by
Anwar, Waqar, Basta, Alfred, Basta, Nadine
Acquiring Publicly Available Information Analytic Tools in a Proprietary Marketplace: Acquisition Recommendations for Army Cyber Command
by
Marcellino, William, Schwille, Michael, Warren, Kristin