Title: Foreign Information Manipulation and Interference: Case Studies From the ATHENA Project, Author: David Wright
Title: Human Factor Security and Safety: A Behavioral Computing Approach, Author: Cheng Wang
Title: Quantum Unmanned Aerial Vehicle: Achieving Cybersecurity and AI Strategies, Author: Hemant Kumar Saini
Title: Unleashing the Power of Blockchain and IoT for Water Informatics, Author: Sur Singh Rawat
Title: Everyday Cryptography 3e: Fundamental Principles and Applications, Author: Keith Martin
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 4), Author: Al Marcella
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Title: Cyber Security, Forensics and National Security, Author: Vinay Aseri
Title: Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms, Author: Amit Kumar Tyagi
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S
Title: Philosophy.exe: The Techno-Philosophical Toolkit for Modern Minds, Author: Matthias Muhlert
Title: Systematic Security: A CISO's Playbook, Author: Timur Qader
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Mastering Deepfake Technology: Strategies for Ethical Management and Security, Author: Sanjay Taneja
Title: Mastering Deepfake Technology: Strategies for Ethical Management and Security, Author: Sanjay Taneja
Title: Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2), Author: Akashdeep Bhardwaj

Pagination Links