Title: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice, Author: Jason Edwards
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware, Author: Marc Weber Tobias
Title: Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption, Author: Craig Jarvis
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Quantum Information Theory, Author: Mark M. Wilde
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Security Yearbook 2025: A History and Directory of the IT Security Industry, Author: Richard Stiennon
Title: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) / Edition 1, Author: Dawn Cappelli
Title: Cybersecurity for SAP, Author: Gaurav Singh
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Cybersecurity in Context: Technology, Policy, and Law, Author: Chris Jay Hoofnagle
Title: Enterprise Security Architecture: A Business-Driven Approach, Author: Nicholas Sherwood
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Author: Brij B. Gupta

Pagination Links