Title: Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, Author: Christopher J Hodson
Title: The Joy of Cryptography: An Undergraduate Course in Provable Security, Author: Mike Rosulek
Title: Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud, Author: Sander Berkouwer
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition, Author: James M. Adcock
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Computer Security: Art and Science, Author: Matt Bishop
Title: Software Security: Concepts & Practices, Author: Suhel Ahmad Khan
Title: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, Author: Cynthia Brumfield
Title: Information Systems Security and Privacy: Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers, Author: Olivier Camp
Title: Crime Prevention: Theory and Practice, Second Edition, Author: Stephen Schneider
Title: Mobile Security and Privacy: Advances, Challenges and Future Research Directions, Author: Man Ho Au
Title: Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III, Author: Matthew Robshaw
Title: Information Security and Cryptology - ICISC 2019: 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, Author: Jae Hong Seo
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, Revised Selected Papers, Part II, Author: Jeremy Clark
Title: Cyber Security Policy Guidebook, Author: Jennifer L. Bayuk
Title: Police Reform in China, Author: Kam C. Wong
Explore Series
Title: Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Author: Claude Carlet
Title: Smart Card Research and Advanced Applications: 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, Author: Aurélien Francillon

Pagination Links