Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Foundations and Practice of Security: 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part II, Author: Kamel Adi
Title: 6G Cyber Security Resilience: Trends and Challenges, Author: H. L. Gururaj
Title: From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 4), Author: Al Marcella
Title: Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare, Author: Prateek Singhal
Title: Privacy and Identity Management. Generating Futures: 19th IFIP WG 9.6/11.7 and IFIP WG 11.6 International Summer School, Privacy and Identity 2024, Madrid, Spain, September 10-13, 2024, Revised Selected Papers, Author: Felix Bieker
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III, Author: Marc Fischlin
Title: Computers and Their Applications: 40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings, Author: Ajay Bandi
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S
Title: Mobile Penetration Testing: A Hands-On Approach, Author: Sabyasachi Paul
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part II, Author: Marc Fischlin
Title: Metaverse Platform Implementation: AI, Security, and Applications, Author: Fei Hu
Title: Unleashing the Power of Blockchain and IoT for Water Informatics, Author: Sur Singh Rawat
Title: Mastering Deepfake Technology: Strategies for Ethical Management and Security, Author: Sanjay Taneja
Title: Quantum Unmanned Aerial Vehicle: Achieving Cybersecurity and AI Strategies, Author: Hemant Kumar Saini
Title: Human Factor Security and Safety: A Behavioral Computing Approach, Author: Cheng Wang

Pagination Links