Title: Unleashing the Power of Blockchain and IoT for Water Informatics, Author: Sur Singh Rawat
Title: The Joy of Cryptography: An Undergraduate Course in Provable Security, Author: Mike Rosulek
Title: The Cybernetic Society: How Humans and Machines Will Shape the Future Together, Author: Amir Husain
Title: The Cyber Shield, Author: Siddhi Singh
Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Explore Series
Title: The Beginner's Guide to Microsoft Defender, Author: Steven Mcananey
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers, Author: Eric O'Neill
Title: Social Engineering The Art & Defense of Human Hacking, Author: VICTOR P HENDERSON
Title: Seguridad en equipos informáticos. IFCT0510, Author: José Francisco Giménez Albacete
Title: Seguridad en equipos informáticos. IFCT0109, Author: José Francisco Giménez Albacete
Title: Security-System Engineering: Ein Ansatz zu den Grundlagen der Informationssicherheit, Author: Bernhard Barz
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S
Title: Secure APIs: Design, build, and implement, Author: José Haro Peralta
Title: Quantum Unmanned Aerial Vehicle: Achieving Cybersecurity and AI Strategies, Author: Hemant Kumar Saini
Title: Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare, Author: Prateek Singhal
Title: Privileged Access Management: Strategies for Zero Trust in the Enterprise, Author: Gregory C. Rasner
Title: Philosophy.exe: The Techno-Philosophical Toolkit for Modern Minds, Author: Matthias Muhlert
Explore Series
Title: Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision, Author: Nikolay Matveev

Pagination Links