Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Cybersecurity Law, Author: Jeff Kosseff
Title: The Wires of War: Technology and the Global Struggle for Power, Author: Jacob Helberg
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Cybersecurity for SAP, Author: Gaurav Singh
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: Ransom War: How Cyber Crime Became a Threat to National Security, Author: Max Smeets
Title: See Yourself in Cyber: Security Careers Beyond Hacking, Author: Ed Adams
Title: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice, Author: Jason Edwards
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) / Edition 1, Author: Dawn Cappelli
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: Web3: Blockchain, the New Economy, and the Self-Sovereign Internet, Author: Ken Huang
Title: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Author: Arvind Narayanan
Title: The Design of Rijndael: AES - The Advanced Encryption Standard, Author: Joan Daemen
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Boolean Functions for Cryptography and Coding Theory, Author: Claude Carlet
Title: Embedded Cryptography 2, Author: Emmanuel Prouff
Title: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, Author: Nicole Perlroth
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke

Pagination Links