Explore all books in Computers / Security / General category
Blockchain Security from the Bottom Up
Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
Howard E. Poston, III
Computers / Security / General
Information Security
Principles and Practice
Mark Stamp
Computers / Security / General
Introduction to Network Security
Theory and Practice
Jie Wang , Zachary A. Kissel
Computers / Security / General
Security Management, Integrity, and Internal Control in Information Systems
IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Bhavani Thuraisingham , Paul Dowland , Steve Furnell , X. Sean Wang
Computers / Security / General
Computer Crimes and Digital Investigations
Ian Walden
Computers / Security / General
CompTIA CySA+ Practice Tests
Exam CS0-002
David Seidl , Mike Chapple
Computers / Security / General
Privacy Enhancing Technologies
6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
George Danezis , Philippe Golle
Computers / Security / General
The Basics of Cyber Safety
Computer and Mobile Device Safety Made Easy
John Sammons , Michael Cross
Computers / Security / General
Ansible For Security by Examples
100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure
Luca Berton
Computers / Security / General
Critical Research on Scalability and Security Issues in Virtual Cloud Environments
Aljawarneh, Shadi , Malhotra, Manisha
Computers / Security / General
Information Security Policies, Procedures, and Standards
Guidelines for Effective Information Security Management
Thomas R. Peltier
Computers / Security / General
Cybercrime in the Greater China Region
Regulatory Responses and Crime Prevention Across the Taiwan Strait
Lennon Yao-Chung Chang
Computers / Security / General
Advances in Cryptology – EUROCRYPT 2020
39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II
Anne Canteaut , Yuval Ishai
Computers / Security / General
The Security Culture Playbook
An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
Kai Roer , Perry Carpenter
Computers / Security / General
Handbook of Research on Network Forensics and Analysis Techniques
Bala, Suman , Dey, Nilanjan , Gupta, B. B. , Kumar, Prabhat , Shrivastava, Gulshan
Computers / Security / General