Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Managing Cybersecurity Risk: Cases Studies and Solutions, Author: Jonathan Reuvid
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Security and Privacy in Communication Networks: 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part II, Author: Songqing Chen
Title: Foundations and Practice of Security: 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers, Author: Abdelmalek Benzekri
Title: Information Theoretic Security: 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers, Author: Anderson C.A. Nascimento
Title: Threat Level Red: Cybersecurity Research Programs of the U.S. Government, Author: Michael Erbschloe
Title: Progress in Cryptology - LATINCRYPT 2017: 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers, Author: Tanja Lange
Title: Network and System Security: 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings, Author: Miroslaw Kutylowski
Title: Public-Key Cryptography - PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III, Author: Qiang Tang
Title: Automated Security Management, Author: Ehab Al-Shaer
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Computer Security - ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I, Author: Elisa Bertino
Title: Cyber Dragon: Inside China's Information Warfare and Cyber Operations: Inside China's Information Warfare and Cyber Operations, Author: Dean Cheng
Title: Progress in Cryptology - LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings, Author: Peter Schwabe
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Building Secure Software: How to Avoid Security Problems the Right Way, Author: John Viega
Title: Information Security and Cryptology - ICISC 2019: 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers, Author: Jae Hong Seo
Title: Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings, Author: Jianying Zhou
Title: Myths and Realities of Cyber Warfare: Conflict in the Digital Realm, Author: Nicholas Michael Sambaluk

Pagination Links