Title: Cybersecurity Law, Author: Jeff Kosseff
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S
Title: Security Technologies for Law Enforcement Agencies, Author: Kazim Duraklar
Title: Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide, Author: David Basin
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms, Author: Amit Kumar Tyagi
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Title: Philosophy.exe: The Techno-Philosophical Toolkit for Modern Minds, Author: Matthias Muhlert
Title: Mastering Deepfake Technology: Strategies for Ethical Management and Security, Author: Sanjay Taneja
Title: Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare, Author: Prateek Singhal
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 4), Author: Al Marcella
Title: Human Factor Security and Safety: A Behavioral Computing Approach, Author: Cheng Wang
Title: Advancements in Cybersecurity: Next-Generation Systems and Applications, Author: Agbotiname Lucky Imoize
Title: Cyber Security, Forensics and National Security, Author: Vinay Aseri
Title: Systematic Security: A CISO's Playbook, Author: Timur Qader
Title: Biometric Technology and Authentication: Biocryptography and Cloud-Based Architecture, Author: Ravi Das
Title: Everyday Cryptography 3e: Fundamental Principles and Applications, Author: Keith Martin

Pagination Links