Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: Federated Cyber Intelligence: Federated Learning for Cybersecurity, Author: Hamed Tabrizchi
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales
Title: AI-Enabled Threat Intelligence and Cyber Risk Assessment, Author: Edlira Martiri
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Philosophy.exe: The Techno-Philosophical Toolkit for Modern Minds, Author: Matthias Muhlert
Explore Series
Title: Everyday Cryptography: Fundamental Principles and Applications, Author: Keith M. Martin
Title: Systematic Security: A CISO's Playbook, Author: Timur Qader
Title: CompTIA Security+ (SY0-701) Certification Companion: Hands-on Preparation and Practice Guide, Author: Kodi A. Cochran
Title: Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II, Author: Sanjay Goel
Title: From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 4), Author: Al Marcella
Title: Cyber Insecurity: Examining the Past, Defining the Future, Author: Vladas Leonas
Title: Security Technologies for Law Enforcement Agencies, Author: Kazim Duraklar
Title: Computational Intelligence, Cyber Security and Computational Models. Emerging Trends in Computational Models, Intelligence and Security Systems: 6th International Conference, ICC3 2023, Coimbatore, India, December 14-16, 2023, Revised Selected Papers, Author: Shina Sheen
Title: Biometric Technology and Authentication: Biocryptography and Cloud-Based Architecture, Author: Ravi Das
Title: Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings, Author: Sihem Mesnager
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Explore Series
Title: Mobile Penetration Testing: A Hands-On Approach, Author: Sabyasachi Paul
Title: Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare, Author: Prateek Singhal

Pagination Links