A.M. Viswa Bharathy, Basim Alhadidi
Challenges and Risks Involved in Deploying 6G and NextGen Networks
|
Information Science Reference, 2022 |
Adrian Pruteanu
Becoming the Hacker : The Playbook for Getting Inside the Mind of the Attacker
|
Packt Publishing, 2019 |
Biswa Mohan Sahoo, Suman Avdhesh Yadav
Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks
|
Information Science Reference, 2022 |
Brij B. Gupta
Advances in Malware and Data-Driven Network Security
|
Information Science Reference, 2022 |
Frank R. Spellman
Information Technology Protection and Homeland Security
|
Bernan Press, 2019 |
Gerard Johansen
Digital Forensics and Incident Response : Incident Response Techniques and Procedures to Respond to Modern Cyber Threats, 2nd Edition
|
Packt Publishing, 2020 |
Himanshu Sharma
Kali Linux - An Ethical Hacker's Cookbook : Practical Recipes That Combine Strategies, Attacks, and Tools for Advanced Penetration Testing
|
Packt Publishing, 2019 |
Hussam Khrais
Python for Offensive PenTest : A Practical Guide to Ethical Hacking and Penetration Testing Using Python
|
Packt Publishing, 2018 |
Information Resources Management Association
Research Anthology on Business Aspects of Cybersecurity
|
Information Science Reference, 2021 |
Jena Om Prakash, H.L. Gururaj, M.R. Pooja, S.P. Pavan Kumar
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
|
Information Science Reference, 2022 |
José Manuel Ortega
Mastering Python for Networking and Security : Leverage Python Scripts and Libraries to Overcome Networking and Security Issues
|
Packt Publishing, 2018 |
Nabie Y. Conteh
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention
|
Information Science Reference, 2021 |
Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, Shaharyar Asaf Khan
Handbook of Research on Cyber Law, Data Protection, and Privacy
|
Information Science Reference, 2022 |
Noor Zaman, Imdad Ali Shah, Samina Rajper
Cybersecurity Measures for E-Government Frameworks
|
Information Science Reference, 2022 |
Prashant Priyam
Cloud Security Automation : Get to Grips with Automating Your Cloud Security on AWS and OpenStack
|
Packt Publishing, 2018 |
Rajneesh Gupta
Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-based Identity, 2FA, and DNS Security Using Blockchain
|
Packt Publishing, 2018 |
Ryma Abassi, Aida Ben Chehida Douss
Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic
|
Information Science Reference, 2022 |
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
Multidisciplinary Approach to Modern Digital Steganography
|
Information Science Reference, 2021 |
Scott Donaldson, Chris Williams, Stanley Siegel
Understanding Security Issues
|
De|G Press, 2019 |
Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
Cross-Industry Applications of Cyber Security Frameworks
|
Information Science Reference, 2022 |
Tajinder Kalsi
Practical Linux Security Cookbook : Secure Your Linux Environment From Modern-day Attacks with Practical Recipes, 2nd Edition
|
Packt Publishing, 2018 |
Tim Rains
Cybersecurity Threats, Malware Trends, and Strategies : Learn to Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks
|
Packt Publishing, 2020 |
Tony Hsiang-Chih Hsu
Practical Security Automation and Testing : Tools and Techniques for Automated Security Scanning and Testing in DevSecOps
|
Packt Publishing, 2019 |