ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / General category

Blockchain Security from the Bottom Up

Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts

Howard E. Poston, III

Computers / Security / General

🥺 Not rated yet

Information Security

Principles and Practice

Mark Stamp

Computers / Security / General

🥺 Not rated yet

Introduction to Network Security

Theory and Practice

Jie Wang , Zachary A. Kissel

Computers / Security / General

🥺 Not rated yet

Security Management, Integrity, and Internal Control in Information Systems

IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Bhavani Thuraisingham , Paul Dowland , Steve Furnell , X. Sean Wang

Computers / Security / General

🥺 Not rated yet

Computer Crimes and Digital Investigations

Ian Walden

Computers / Security / General

🥺 Not rated yet

CompTIA CySA+ Practice Tests

Exam CS0-002

David Seidl , Mike Chapple

Computers / Security / General

🥺 Not rated yet

Privacy Enhancing Technologies

6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

George Danezis , Philippe Golle

Computers / Security / General

🥺 Not rated yet

The Basics of Cyber Safety

Computer and Mobile Device Safety Made Easy

John Sammons , Michael Cross

Computers / Security / General

🥺 Not rated yet

Ansible For Security by Examples

100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure

Luca Berton

Computers / Security / General

🥺 Not rated yet

Critical Research on Scalability and Security Issues in Virtual Cloud Environments

Aljawarneh, Shadi , Malhotra, Manisha

Computers / Security / General

🥺 Not rated yet

Information Security Policies, Procedures, and Standards

Guidelines for Effective Information Security Management

Thomas R. Peltier

Computers / Security / General

🥺 Not rated yet

Cybercrime in the Greater China Region

Regulatory Responses and Crime Prevention Across the Taiwan Strait

Lennon Yao-Chung Chang

Computers / Security / General

🥺 Not rated yet

Advances in Cryptology – EUROCRYPT 2020

39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II

Anne Canteaut , Yuval Ishai

Computers / Security / General

🥺 Not rated yet

The Security Culture Playbook

An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

Kai Roer , Perry Carpenter

Computers / Security / General

🥺 Not rated yet

Handbook of Research on Network Forensics and Analysis Techniques

Bala, Suman , Dey, Nilanjan , Gupta, B. B. , Kumar, Prabhat , Shrivastava, Gulshan

Computers / Security / General

🥺 Not rated yet