Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: Edge Intelligence and Analytics for Internet of Things, Author: Govind P. Gupta
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni
Title: Defense in Depth: Modern Cybersecurity Strategies and Evolving Threats, Author: Hewa Majeed Zangana
Title: Defense in Depth: Modern Cybersecurity Strategies and Evolving Threats, Author: Hewa Majeed Zangana
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part II, Author: Saed Alrabaee
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part I, Author: Saed Alrabaee
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part II, Author: Saed Alrabaee
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part I, Author: Saed Alrabaee
Title: Cyber Defense: Best Practices for Digital Safety, Author: Jason Edwards
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part IV, Author: Saed Alrabaee
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part IV, Author: Saed Alrabaee
Title: Intelligent Continuous Security: AI-Enabled Transformation for Seamless Protection, Author: Marc Hornbeek
Title: Edge Intelligence and Analytics for Internet of Things, Author: Govind P. Gupta
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan
Title: Cyber Defense: Best Practices for Digital Safety, Author: Jason Edwards
Title: Intelligent Continuous Security: AI-Enabled Transformation for Seamless Protection, Author: Marc Hornbeek
Title: Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams, Author: Drinor Selmanaj
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan

Pagination Links