Explore all books in Computers / Security / General category
Decrypted Secrets
Methods and Maxims of Cryptology
Friedrich L. Bauer
Computers / Security / General
Transactions on Computational Science XXIX
C.J. Kenneth Tan , Marina L. Gavrilova
Computers / Security / General
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices
Technologies and Practices
Akrivopoulou, Christina , Psygkas, Athanasios
Computers / Security / General
Foundations of Information Security
A Straightforward Introduction
Jason Andress
Computers / Security / General
Blockchain Security from the Bottom Up
Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts
Howard E. Poston, III
Computers / Security / General
Information Security
Principles and Practice
Mark Stamp
Computers / Security / General
Introduction to Network Security
Theory and Practice
Jie Wang , Zachary A. Kissel
Computers / Security / General
Security Management, Integrity, and Internal Control in Information Systems
IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
Bhavani Thuraisingham , Paul Dowland , Steve Furnell , X. Sean Wang
Computers / Security / General
Computer Crimes and Digital Investigations
Ian Walden
Computers / Security / General
CompTIA CySA+ Practice Tests
Exam CS0-002
David Seidl , Mike Chapple
Computers / Security / General
Privacy Enhancing Technologies
6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers
George Danezis , Philippe Golle
Computers / Security / General
The Basics of Cyber Safety
Computer and Mobile Device Safety Made Easy
John Sammons , Michael Cross
Computers / Security / General
Ansible For Security by Examples
100+ Automation Examples to Automate Security and Verify Compliance for IT Modern Infrastructure
Luca Berton
Computers / Security / General
Critical Research on Scalability and Security Issues in Virtual Cloud Environments
Aljawarneh, Shadi , Malhotra, Manisha
Computers / Security / General
Information Security Policies, Procedures, and Standards
Guidelines for Effective Information Security Management
Thomas R. Peltier
Computers / Security / General