Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Managing Cybersecurity Risk: Cases Studies and Solutions, Author: Jonathan Reuvid
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Critical Information Infrastructures Security: 15th International Conference, CRITIS 2020, Bristol, UK, September 2-3, 2020, Proceedings, Author: Awais Rashid
Title: Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings, Author: Clemente Galdi
Title: Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings, Author: Tsuyoshi Takagi
Title: Cryptography: Algorithms, Protocols, and Standards for Computer Security, Author: Zoubir Z. Mammeri
Title: Cisco Security Professional's Guide to Secure Intrusion Detection Systems, Author: Syngress
Title: Security Issues and Privacy Concerns in Industry 4.0 Applications, Author: Shibin David
Title: Cyber Threat Intelligence, Author: Ali Dehghantanha
Title: Network Science and Cybersecurity, Author: Robinson E. Pino
Title: Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16-18, 2021, Revised Selected Papers, Author: Indhumathi Raman
Title: Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part II, Author: Ruben Niederhagen
Title: CD and DVD Forensics, Author: Paul Crowley
Title: Transnational Organized Crime and Gangs: Intervention, Prevention, and Suppression of Cybersecurity, Author: Robert M. Brzenchek
Title: Cyber Security: Law and Guidance, Author: Helen Wong MBE
Title: Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II, Author: Ioannis Askoxylakis
Title: Cyber Insecurity: Navigating the Perils of the Next Information Age, Author: Richard Harrison
Title: Integrity and Internal Control in Information Systems V: IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11-12, 2002, Bonn, Germany, Author: Michael Gertz
Title: Advances in Cryptology - CRYPTO 2024: 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part X, Author: Leonid Reyzin

Pagination Links