Abassi, Ryma
Artificial Intelligence and Security Challenges in Emerging Networks
|
Engineering Science Reference, 2019 |
Adarsh Anand, Mangey Ram
Systems Performance Modeling
|
De Gruyter, 2021 |
Ahuja, Vandana, Rathore, Shubhangini
Multidisciplinary Perspectives on Human Capital and Information Technology Professionals
|
Information Science Reference, 2018 |
Ajay Singh Chauhan
Practical Network Scanning : Capture Network Vulnerabilities Using Standard Tools Such As Nmap and Nessus
|
Packt Publishing, 2018 |
Balamurugan Easwaran, Kamal Kant Hiran, Sangeetha Krishnan, Ruchi Doshi
Real-Time Applications of Machine Learning in Cyber-Physical Systems
|
Engineering Science Reference, 2022 |
Banday, Mohammad Tariq
Cryptographic Security Solutions for the Internet of Things
|
Information Science Reference, 2019 |
Biswa Mohan Sahoo, Suman Avdhesh Yadav
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks
|
Information Science Reference, 2022 |
Brij B. Gupta
Advances in Malware and Data-Driven Network Security
|
Information Science Reference, 2022 |
Brij B. Gupta, Srivathsan Srinivasagopalan
Handbook of Research on Intrusion Detection Systems
|
Information Science Reference, 2020 |
Butta Singh, Barjinder Singh Saini, Dilbag Singh, Anukul Pandey
Medical Data Security for Bioengineers
|
Medical Information Science Reference, 2019 |
Chiheb Chebbi
Mastering Machine Learning for Penetration Testing : Develop an Extensive Skill Set to Break Self-learning Systems Using Python
|
Packt Publishing, 2018 |
David Ward, Paul Wooderson
Automotive Cybersecurity : An Introduction to ISO/SAE 21434
|
SAE International, 2021 |
Devjani Sen, Rukhsana Ahmed
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps
|
Information Science Reference, 2021 |
Donald A. Tevault
Mastering Linux Security and Hardening : Secure Your Linux Server and Protect It From Intruders, Malware Attacks, and Other External Threats
|
Packt Publishing, 2018 |
Dr. Erdal Ozkaya, Milad Aslaner
Hands-On Cybersecurity for Finance : Identify Vulnerabilities and Secure Your Financial Services From Security Breaches
|
Packt Publishing, 2019 |
Felderer, Michael, Scandariato, Riccardo
Exploring Security in Software Architecture and Design
|
Information Science Reference, 2019 |
Gabriel Hallevy
Cyber Law in Israel
|
Kluwer Law International, 2022 |
Ganapathi, Padmavathi, IGI Global, Shanmugapriya, D.
Handbook of Research on Machine and Deep Learning Applications for Cyber Security
|
Information Science Reference, 2020 |
Geetha, S., Phamila, Asnath Victy
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
|
Information Science Reference, 2019 |
Gupta, Brij
Modern Principles, Practices, and Algorithms for Cloud Security
|
Information Science Reference, 2020 |
Harshita Patel, Ghanshyam Singh Thakur
Blockchain Applications in IoT Security
|
Information Science Reference, 2021 |
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
Large-Scale Data Streaming, Processing, and Blockchain Security
|
Information Science Reference, 2021 |
Hussam Khrais
Python for Offensive PenTest : A Practical Guide to Ethical Hacking and Penetration Testing Using Python
|
Packt Publishing, 2018 |
Information Resources Management Association
Cryptography : Breakthroughs in Research and Practice
|
Information Science Reference, 2020 |
Information Resources Management Association
Cyber Security and Threats : Concepts, Methodologies, Tools, and Applications
|
Information Science Reference, 2018 |
Information Resources Management Association
Research Anthology on Business Aspects of Cybersecurity
|
Information Science Reference, 2021 |
Information Resources Management Association
Research Anthology on Securing Mobile Technologies and Applications
|
Information Science Reference, 2021 |
Jean Nestor M. Dahj
Mastering Cyber Intelligence : Gain Comprehensive Knowledge and Skills to Conduct Threat Intelligence for Effective System Defense
|
Packt Publishing, 2022 |
Jena Om Prakash, H.L. Gururaj, M.R. Pooja, S.P. Pavan Kumar
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
|
Information Science Reference, 2022 |
Jonathan Lusthaus
Industry of Anonymity : Inside the Business of Cybercrime
|
Harvard University Press, 2018 |
José Manuel Ortega
Mastering Python for Networking and Security : Leverage Python Scripts and Libraries to Overcome Networking and Security Issues
|
Packt Publishing, 2018 |
Joshi, R. C., IGI Global, Gupta, Brij
Security, Privacy, and Forensics Issues in Big Data
|
Information Science Reference, 2020 |
Khosrow-Pour, Mehdi, IGI Global
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
|
Information Science Reference, 2019 |
Luisa Dall'Acqua, Irene Maria Gironacci
Transdisciplinary Perspectives on Risk Management and Cyber Intelligence
|
Information Science Reference, 2021 |
Maria Tzanou
Personal Data Protection and Legal Developments in the European Union
|
Information Science Reference, 2019 |
Masao Yanaga
Information Technology Law in Japan
|
Kluwer Law International, 2022 |
Matevž Pustišek, Nataša Živić, Andrej Kos
Blockchain : Technology and Applications for Industry 4.0, Smart Energy, and Smart Cities
|
De Gruyter, 2021 |
McAlaney, John, Frumkin, Lara Anne, Benson, Vladlena
Psychological and Behavioral Examinations in Cyber Security
|
Information Science Reference, 2018 |
Mohit Dua, Ankit Kumar Jain
Handbook of Research on Machine Learning Techniques for Pattern Recognition and Information Security
|
Engineering Science Reference, 2020 |
Nabie Y. Conteh
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention
|
Information Science Reference, 2021 |
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
Limitations and Future Applications of Quantum Cryptography
|
Information Science Reference, 2021 |
Nir Yehoshua, Uriel Kosayev
Antivirus Bypass Techniques : Learn Practical Techniques and Tactics to Combat, Bypass, and Evade Antivirus Software
|
Packt Publishing, 2021 |
Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
Quantum Cryptography and the Future of Cyber Security
|
Information Science Reference, 2020 |
Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, Shaharyar Asaf Khan
Handbook of Research on Cyber Law, Data Protection, and Privacy
|
Information Science Reference, 2022 |
Noor Zaman, Imdad Ali Shah, Samina Rajper
Cybersecurity Measures for E-Government Frameworks
|
Information Science Reference, 2022 |
Oncioiu, Ionica, IGI Global
Network Security and Its Impact on Business Strategy
|
Business Science Reference, 2019 |
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
Applied Approach to Privacy and Security for the Internet of Things
|
Information Science Reference, 2020 |
Prashant Priyam
Cloud Security Automation : Get to Grips with Automating Your Cloud Security on AWS and OpenStack
|
Packt Publishing, 2018 |
Pretschner, Alexander, Müller, Peter, Stöckle, Patrick
Engineering Secure and Dependable Software Systems
|
IOS Press, 2019 |
Priyanka Ahlawat, Mayank Dave
Security and Privacy Issues in Sensor Networks and IoT
|
Information Science Reference, 2020 |
Rajneesh Gupta
Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-based Identity, 2FA, and DNS Security Using Blockchain
|
Packt Publishing, 2018 |
Regner Sabillon
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
|
Information Science Reference, 2021 |
Romil Rawat, Shrikant Telang, P. William, Upinder Kaur, Om Kumar C.U
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence
|
Information Science Reference, 2022 |
Ryma Abassi, Aida Ben Chehida Douss
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic
|
Information Science Reference, 2022 |
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
Multidisciplinary Approach to Modern Digital Steganography
|
Information Science Reference, 2021 |
Sagar Rahalkar
Network Vulnerability Assessment : Identify Security Loopholes in Your Network’s Infrastructure
|
Packt Publishing, 2018 |
Sarfraz, Muhammad, IGI Global
Developments in Information Security and Cybernetic Wars
|
Information Science Reference, 2019 |
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
Big Data Security
|
De Gruyter, 2019 |
Soma Halder, Sinan Ozdemir
Hands-On Machine Learning for Cybersecurity : Safeguard Your System by Making Your Machines Intelligent Using the Python Ecosystem
|
Packt Publishing, 2018 |
Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
Cross-Industry Applications of Cyber Security Frameworks
|
Information Science Reference, 2022 |
Tajinder Kalsi
Practical Linux Security Cookbook : Secure Your Linux Environment From Modern-day Attacks with Practical Recipes, 2nd Edition
|
Packt Publishing, 2018 |
Tim Rains
Cybersecurity Threats, Malware Trends, and Strategies : Learn to Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks
|
Packt Publishing, 2020 |
Tomcy John
Hands-On Spring Security 5 for Reactive Applications : Learn Effective Ways to Secure Your Applications with Spring and Spring WebFlux
|
Packt Publishing, 2018 |
Victor Lobo, Anacleto Correia
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity
|
Information Science Reference, 2022 |
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
Modern Theories and Practices for Cyber Ethics and Security Compliance
|
Information Science Reference, 2020 |
Woodrow Hartzog
Privacy’s Blueprint : The Battle to Control the Design of New Technologies
|
Harvard University Press, 2018 |