CISSP (ISC)2 Certified Information Systems Security Professional ...
James M. Stewart & Mike Chapple & Darril Gibson
5G LTE Narrowband Internet of Things (NB-IoT)
Hossam Fattah
Building the Infrastructure for Cloud Security
Raghuram Yeluri & Enrique Castro-Leon
Linux Essentials for Cybersecurity
William Rothwell & Denise Kinsey
Cyber Security
Wei Lu & Qiaoyan Wen & Yuqing Zhang & Bo Lang & Weiping Wen & Hanbing Yan & Chao Li & Li Ding & Ruiguang Li & Yu Zhou
Advances in Cyber Security
Nibras Abdullah & Selvakumar Manickam & Mohammed Anbar
Microsoft Word - Cyber security ACT manual draft V3 .docx
Unknown
Beginning Ethical Hacking with Kali Linux
Sanjib Sinha
Big Data Security
Shibakali Gupta & Indradip Banerjee & Siddhartha Bhattacharyya
biometric 2024
Data Privacy and Trust in Cloud Computing
Theo Lynn & John G. Mooney & Lisa van der Werff & Grace Fox
Cloud Computing Security
Dinesh G. Harkut
Combatting Cybercrime and Cyberterrorism
Babak Akhgar & Ben Brewster
Computer Forensics
Marie-Helen Maras
Cybersecurity Threats with New Perspectives
Muhammad Sarfraz
Cyber Security Politics
Myriam Dunn Cavelty & Andreas Wenger
Cyber Peace
Scott J. Shackelford & Frederick Douzet & Christopher Ankersen
Cyber Security and Critical Infrastructures
Leandros Maglaras & Helge Janicke & Mohamed Amine Ferrag
Cybersecurity Issues in Smart Grids and Future Power Systems
Arshad Arshad
Cyberspace and Cybersecurity
George Kostopoulos
Cyberspace, Cybersecurity, and Cybercrime
Janine Kremling & Amanda M. Sharp Parker
Digital Forensics Basics
Nihad A. Hassan
Essentials of computing systems
João M. Fernandes
Everyday Cybersecurity: A practical approach to understanding ...
Christopher Cox
Guide to Computer Forensics and Investigations
Bill Nelson & Amelia Phillips & Christopher Steuart
Guide to Vulnerability Analysis for Computer Networks and Systems
Simon Parkinson & Andrew Crampton & Richard Hill
Hacking : The Ultimate Hacking for Beginners : How to Hack : ...
Hacklog Volume 1 Anonymity (English Version): It Security & ...
Stefano Novelli
HACK-X-CRYPT
UJJWAL SAHAY
Handbook of Big Data and IoT Security
Ali Dehghantanha & Kim-Kwang Raymond Choo
Industrial Wireless Sensor Networks
Seong-eun Yoo & Taehong Kim
Information Hiding: Steganography and Watermarking-Attacks and ...
Neil F. Johnson & Zoran Duric & Sushil Jajodia
Internet-of-Things (IoT) Systems
Dimitrios Serpanos & Marilyn Wolf
Introduction to Mobile Network Engineering: GSM, 3G-WCDMA, LTE ...
Alexander Kukushkin
Introduction to Cyber Security
Essentials of computing systems - 2ª edição
Introductory Computer Forensics
Xiaodong Lin
Malware
Eduard Babulak
Modelling, Dimensioning and Optimization of 5G Communication ...
Ioannis D. Moscholios & Mariusz Głąbowski & Panagiotis Sarigiannidis
Practical Programming
Paul Gries & Jennifer Campbell & Jason Montojo
Security and Privacy in Networks and Multimedia 2024
Security and Privacy in Cyber-Physical Systems
Houbing Song & Glenn A. Fink & Sabina Jeschke
Hacking
Christopher Lombardi
Steganography Techniques for Digital Images
Abid Yahya
The Dark Web: Breakthroughs in Research and Practice
Management Association, Information Resources
The NICE Cyber Security Framework
Izzat Alsmadi
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY
Lance Henderson
Weaving the Dark Web
Robert W. Gehl
Artificial Intelligence
Stuart Russell & Peter Norvig