Abassi, Ryma
Artificial Intelligence and Security Challenges in Emerging Networks |
Engineering Science Reference, 2019 |
Adarsh Anand, Mangey Ram
Systems Performance Modeling |
De Gruyter, 2021 |
Ahuja, Vandana, Rathore, Shubhangini
Multidisciplinary Perspectives on Human Capital and Information Technology Professionals |
Information Science Reference, 2018 |
Ajay Singh Chauhan
Practical Network Scanning : Capture Network Vulnerabilities Using Standard Tools Such As Nmap and Nessus |
Packt Publishing, 2018 |
Balamurugan Easwaran, Kamal Kant Hiran, Sangeetha Krishnan, Ruchi Doshi
Real-Time Applications of Machine Learning in Cyber-Physical Systems |
Engineering Science Reference, 2022 |
Banday, Mohammad Tariq
Cryptographic Security Solutions for the Internet of Things |
Information Science Reference, 2019 |
Biswa Mohan Sahoo, Suman Avdhesh Yadav
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks |
Information Science Reference, 2022 |
Brij B. Gupta
Advances in Malware and Data-Driven Network Security |
Information Science Reference, 2022 |
Brij B. Gupta, Srivathsan Srinivasagopalan
Handbook of Research on Intrusion Detection Systems |
Information Science Reference, 2020 |
Butta Singh, Barjinder Singh Saini, Dilbag Singh, Anukul Pandey
Medical Data Security for Bioengineers |
Medical Information Science Reference, 2019 |
Chiheb Chebbi
Mastering Machine Learning for Penetration Testing : Develop an Extensive Skill Set to Break Self-learning Systems Using Python |
Packt Publishing, 2018 |
David Ward, Paul Wooderson
Automotive Cybersecurity : An Introduction to ISO/SAE 21434 |
SAE International, 2021 |
Devjani Sen, Rukhsana Ahmed
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps |
Information Science Reference, 2021 |
Donald A. Tevault
Mastering Linux Security and Hardening : Secure Your Linux Server and Protect It From Intruders, Malware Attacks, and Other External Threats |
Packt Publishing, 2018 |
Dr. Erdal Ozkaya, Milad Aslaner
Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services From Security Breaches |
Packt Publishing, 2019 |
Felderer, Michael, Scandariato, Riccardo
Exploring Security in Software Architecture and Design |
Information Science Reference, 2019 |
Gabriel Hallevy
Cyber Law in Israel |
Kluwer Law International, 2022 |
Ganapathi, Padmavathi, IGI Global, Shanmugapriya, D.
Handbook of Research on Machine and Deep Learning Applications for Cyber Security |
Information Science Reference, 2020 |
Geetha, S., Phamila, Asnath Victy
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems |
Information Science Reference, 2019 |
Gupta, Brij
Modern Principles, Practices, and Algorithms for Cloud Security |
Information Science Reference, 2020 |
Harshita Patel, Ghanshyam Singh Thakur
Blockchain Applications in IoT Security |
Information Science Reference, 2021 |
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
Large-Scale Data Streaming, Processing, and Blockchain Security |
Information Science Reference, 2021 |
Hussam Khrais
Python for Offensive PenTest : A Practical Guide to Ethical Hacking and Penetration Testing Using Python |
Packt Publishing, 2018 |
Information Resources Management Association
Cryptography : Breakthroughs in Research and Practice |
Information Science Reference, 2020 |
Information Resources Management Association
Cyber Security and Threats : Concepts, Methodologies, Tools, and Applications |
Information Science Reference, 2018 |
Information Resources Management Association
Research Anthology on Business Aspects of Cybersecurity |
Information Science Reference, 2021 |
Information Resources Management Association
Research Anthology on Securing Mobile Technologies and Applications |
Information Science Reference, 2021 |
Jean Nestor M. Dahj
Mastering Cyber Intelligence : Gain Comprehensive Knowledge and Skills to Conduct Threat Intelligence for Effective System Defense |
Packt Publishing, 2022 |
Jena Om Prakash, H.L. Gururaj, M.R. Pooja, S.P. Pavan Kumar
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics |
Information Science Reference, 2022 |
Jonathan Lusthaus
Industry of Anonymity : Inside the Business of Cybercrime |
Harvard University Press, 2018 |
José Manuel Ortega
Mastering Python for Networking and Security : Leverage Python Scripts and Libraries to Overcome Networking and Security Issues |
Packt Publishing, 2018 |
Joshi, R. C., IGI Global, Gupta, Brij
Security, Privacy, and Forensics Issues in Big Data |
Information Science Reference, 2020 |
Khosrow-Pour, Mehdi, IGI Global
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics |
Information Science Reference, 2019 |
Luisa Dall'Acqua, Irene Maria Gironacci
Transdisciplinary Perspectives on Risk Management and Cyber Intelligence |
Information Science Reference, 2021 |
Maria Tzanou
Personal Data Protection and Legal Developments in the European Union |
Information Science Reference, 2019 |
Masao Yanaga
Information Technology Law in Japan |
Kluwer Law International, 2022 |
Matevž Pustišek, Nataša Živić, Andrej Kos
Blockchain : Technology and Applications for Industry 4.0, Smart Energy, and Smart Cities |
De Gruyter, 2021 |
McAlaney, John, Frumkin, Lara Anne, Benson, Vladlena
Psychological and Behavioral Examinations in Cyber Security |
Information Science Reference, 2018 |
Mohit Dua, Ankit Kumar Jain
Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security |
Engineering Science Reference, 2020 |
Nabie Y. Conteh
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention |
Information Science Reference, 2021 |
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
Limitations and Future Applications of Quantum Cryptography |
Information Science Reference, 2021 |
Nir Yehoshua, Uriel Kosayev
Antivirus Bypass Techniques : Learn Practical Techniques and Tactics to Combat, Bypass, and Evade Antivirus Software |
Packt Publishing, 2021 |
Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
Quantum Cryptography and the Future of Cyber Security |
Information Science Reference, 2020 |
Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, Shaharyar Asaf Khan
Handbook of Research on Cyber Law, Data Protection, and Privacy |
Information Science Reference, 2022 |
Noor Zaman, Imdad Ali Shah, Samina Rajper
Cybersecurity Measures for E-Government Frameworks |
Information Science Reference, 2022 |
Oncioiu, Ionica, IGI Global
Network Security and Its Impact on Business Strategy |
Business Science Reference, 2019 |
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
Applied Approach to Privacy and Security for the Internet of Things |
Information Science Reference, 2020 |
Prashant Priyam
Cloud Security Automation : Get to Grips with Automating Your Cloud Security on AWS and OpenStack |
Packt Publishing, 2018 |
Pretschner, Alexander, Müller, Peter, Stöckle, Patrick
Engineering Secure and Dependable Software Systems |
IOS Press, 2019 |
Priyanka Ahlawat, Mayank Dave
Security and Privacy Issues in Sensor Networks and IoT |
Information Science Reference, 2020 |
Rajneesh Gupta
Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-based Identity, 2FA, and DNS Security Using Blockchain |
Packt Publishing, 2018 |
Regner Sabillon
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM |
Information Science Reference, 2021 |
Romil Rawat, Shrikant Telang, P. William, Upinder Kaur, Om Kumar C.U
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence |
Information Science Reference, 2022 |
Ryma Abassi, Aida Ben Chehida Douss
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic |
Information Science Reference, 2022 |
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
Multidisciplinary Approach to Modern Digital Steganography |
Information Science Reference, 2021 |
Sagar Rahalkar
Network Vulnerability Assessment : Identify Security Loopholes in Your Network’s Infrastructure |
Packt Publishing, 2018 |
Sarfraz, Muhammad, IGI Global
Developments in Information Security and Cybernetic Wars |
Information Science Reference, 2019 |
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
Big Data Security |
De Gruyter, 2019 |
Soma Halder, Sinan Ozdemir
Hands-On Machine Learning for Cybersecurity : Safeguard Your System by Making Your Machines Intelligent Using the Python Ecosystem |
Packt Publishing, 2018 |
Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
Cross-Industry Applications of Cyber Security Frameworks |
Information Science Reference, 2022 |
Tajinder Kalsi
Practical Linux Security Cookbook : Secure Your Linux Environment From Modern-day Attacks with Practical Recipes, 2nd Edition |
Packt Publishing, 2018 |
Tim Rains
Cybersecurity Threats, Malware Trends, and Strategies : Learn to Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks |
Packt Publishing, 2020 |
Tomcy John
Hands-On Spring Security 5 for Reactive Applications : Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux |
Packt Publishing, 2018 |
Victor Lobo, Anacleto Correia
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity |
Information Science Reference, 2022 |
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
Modern Theories and Practices for Cyber Ethics and Security Compliance |
Information Science Reference, 2020 |
Woodrow Hartzog
Privacy’s Blueprint : The Battle to Control the Design of New Technologies |
Harvard University Press, 2018 |