| 1 | Intelligent Approaches to Cyber Security | Narendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli | 2024 | CRC Press | |
| 2 | Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117) | Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor) | 2024 | Springer | |
| 3 | Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers (Communications in Computer and Information Science) | Haomiao Yang (editor), Rongxing Lu (editor) | 2024 | Springer | |
| 4 | Cyber Security and Business Analysis: An essential guide to secure and robust systems | Bindu Channaveerappa | 2024 | BCS, The Chartered Institute for IT | |
| 5 | Cyber Security and Business Analysis: An essential guide to secure and robust systems | Bindu Channaveerappa | 2024 | BCS, The Chartered Institute for IT | |
| 6 | Collaborative Approaches for Cyber Security in Cyber-Physical Systems | Theo Dimitrakos, Javier Lopez, Fabio Martinelli | 2023 | Springer | |
| 7 | Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022 Matsue, Japan, August 10–12, 2022 Revised Selected Papers | Chunhua Su, Kouichi Sakurai | 2023 | Springer | |
| 8 | Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings | Abderrahmane Nitaj, Karim Zkik | 2023 | Springer | |
| 9 | Machine Learning for Cyber Security | | 2023 | Springer International Publishing | |
| 10 | Machine Learning for Cyber Security | | 2023 | Springer International Publishing | |
| 11 | Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
| 12 | Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part II | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
| 13 | Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part I | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
| 14 | Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
| 15 | Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
| 16 | Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part I | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
| 17 | Cyber Security Applications for Industry 4.0 | R Sujatha, G Prakash, Noor Zaman Jhanjhi | 2023 | CRC Press | |
| 18 | International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) | Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta | 2023 | Springer | |
| 19 | The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2023 | Springer | |
| 20 | Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 | Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman | 2023 | Springer | |
| 21 | Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 | Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman | 2023 | Springer | |
| 22 | Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics) | Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla | 2023 | River Publishers | |
| 23 | The NICE Cyber Security Framework. Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2023 | Springer | |
| 24 | Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography | Om Pal; Vinod Kumar; Rijwan Khan; Bashir Alam; Mansaf Alam | 2023 | | |
| 25 | Artificial Intelligence and Cyber Security in Industry 4.0 | Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi | 2023 | Springer | |
| 26 | Artificial Intelligence and Cyber Security in Industry 4.0 | Velliangiri Sarveshwaran; Joy Iong-Zong Chen; Danilo Pelusi | 2023 | Springer Nature | |
| 27 | Collaborative Approaches for Cyber Security in Cyber-Physical Systems | Theo Dimitrakos; Javier Lopez; Fabio Martinelli | 2023 | Springer Nature | |
| 28 | The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2023 | Springer Nature | |
| 29 | Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings | Abderrahmane Nitaj; Karim Zkik | 2023 | Springer Nature | |
| 30 | Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers | Chunhua Su; Kouichi Sakurai | 2023 | Springer Nature | |
| 31 | Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications) | Hamid Jahankhani (editor), Ayman El Hajjar (editor) | 2023 | Springer | |
| 32 | Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications) | Hamid Jahankhani (editor), Ayman El Hajjar (editor) | 2023 | Springer | |
| 33 | Intelligent Approaches to Cyber Security | Narendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas | 2023 | CRC Press | |
| 34 | Confident Cyber Security: The Essential Insights and How to Protect from Threats | Jessica Barker | 2023 | Kogan Page | |
| 35 | Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11) | Dr Jessica Barker | 2023 | Kogan Page | |
| 36 | Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11) | Dr Jessica Barker | 2023 | Kogan Page | |
| 37 | Wireless Communication in Cyber Security | S. Sountharrajan (editor), R. Maheswar (editor), Geetanjali Rathee (editor), M. Akila (editor) | 2023 | Wiley-Scrivener | |
| 38 | Cyber Security for Next-Generation Computing Technologies | Inam Ullah Khan | 2023 | CRC Press | |
| 39 | Cyber Security and Social Media Applications (Lecture Notes in Social Networks) | Sibel Tar?yan Özyer (editor), Buket Kaya (editor) | 2023 | Springer | |
| 40 | Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers | Antonio Skarmeta (editor), Daniele Canavese (editor), Antonio Lioy (editor), Sara Matheu (editor) | 2023 | Springer | |
| 41 | Digital Transformation, Cyber Security and Resilience: Second International Conference, DIGILIENCE 2020, Varna, Bulgaria, September 30 – October 2, 2020, Revised Selected Papers | Todor Tagarev (editor), Nikolai Stoianov (editor) | 2023 | Springer | |
| 42 | Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things) | Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor) | 2023 | Springer | |
| 43 | Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science) | Moti Yung (editor), Chao Chen (editor), Weizhi Meng (editor) | 2023 | Springer | |
| 44 | Cyber Security and Digital Forensics: Challenges and Future Trends | Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le | 2022 | Wiley-Scrivener | |
| 45 | Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation | Myriam Dunn Cavelty, Andreas Wenger | 2022 | Routledge | |
| 46 | Secure Data Science: Integrating Cyber Security and Data Science | B. Thuraisngham, M. Kantarcioglu, L. Khan | 2022 | | |
| 47 | Cyber Security and Network Security | Sabyasachi Pramanik (editor), Debabrata Samanta (editor), M. Vinay (editor), Abhijit Guha (editor) | 2022 | Wiley-Scrivener | |
| 48 | Cyber Security Practical Engineering Approach | Henrique Santos | 2022 | | |
| 49 | Cyber Security (2022) [Lehto Neittaanmaki] [9783030912925] | Lehto Neittaanmaki | 2022 | | |
| 50 | Cyber Security : Critical Infrastructure Protection | Martti Lehto; Pekka Neittaanmäki | 2022 | Springer International Publishing | |
| 51 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
| 52 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
| 53 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
| 54 | Holistic Approach to Quantum Cryptography in Cyber Security | Shashi Bhushan; Manoj Kumar; Pramod Kumar; Renjith V Ravi; Anuj Kumar Singh | 2022 | CRC Press | |
| 55 | Strategic Cyber Security Management | Peter Trim, Yang-Im Lee | 2022 | Routledge | |
| 56 | Strategic Cyber Security Management | Peter Trim, Yang-Im Lee | 2022 | Routledge | |
| 57 | Cyber Security Threats and Challenges Facing Human Life | Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) | 2022 | Chapman and Hall/CRC | |
| 58 | Strategic Cyber Security Management | Peter Trim, Yang-Im Lee | 2022 | Routledge | |
| 59 | Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301) | Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor) | 2022 | Springer | |
| 60 | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) | Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) | 2022 | Chapman and Hall/CRC | |
| 61 | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) | Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) | 2022 | Chapman and Hall/CRC | |
| 62 | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) | Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) | 2022 | Chapman and Hall/CRC | |
| 63 | Cyber Security and Critical Infrastructures | Leandros Maglaras; Helge Janicke; Mohamed Amine Ferrag (eds.) | 2022 | MDPI | |
| 64 | Cyber Security for Beginners: A Comprehensive and Essential Guide for Every Novice to Understand and Master Cybersecurity | Liam Smith | 2022 | Independently published | |
| 65 | Cyber Security Applications for Industry 4.0 | R. Sujatha, G. Prakash, Noor Zaman Jhanjhi | 2022 | CRC Press/Chapman & Hall | |
| 66 | Cyber Security Applications for Industry 4.0 (Chapman & Hall/CRC Cyber-Physical Systems) | R Sujatha (editor), G Prakash (editor), Noor Zaman Jhanjhi (editor) | 2022 | Chapman and Hall/CRC | |
| 67 | Advances in Nature-Inspired Cyber Security and Resilience | Shishir Kumar Shandilya, Neal Wagner, V.B. Gupta, Atulya K. Nagar | 2022 | Springer | |
| 68 | Cyber Security for Microgrids | Subham Sahoo, Frede Blaabjerg, Tomislav Dragicevi? | 2022 | The Institution of Engineering and Technology | |
| 69 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco, Bob Maley | 2022 | CRC Press | |
| 70 | Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers | Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan | 2022 | Springer | |
| 71 | Cross-industry Applications of Cyber Security Frameworks | Sukanta Baral, Richa Goel, Mashiur Rahman, Jahangir Sultan, Sarkar Jahan | 2022 | Information Science Reference | |
| 72 | Cross-Industry Applications of Cyber Security Frameworks | Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman | 2022 | IGI Global | |
| 73 | Cross-Industry Applications of Cyber Security Frameworks | Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman | 2022 | IGI Global | |
| 74 | Cyber Security and Operations Management for Industry 4.0 | Ahmed A Elngar; N Thillaiarasu; Mohamed Elhoseny; K Martin Sagayam | 2022 | CRC Press | |
| 75 | Advances in Cyber Security and Intelligent Analytics | Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas | 2022 | CRC Press | |
| 76 | Machine Learning for Cyber Security | Preeti Malik, Lata Nautiyal, Mangey Ram | 2022 | De Gruyter | |
| 77 | Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings | Emmanuel Ahene, Fagen Li | 2022 | Springer | |
| 78 | Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers | Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li | 2022 | Springer | |
| 79 | Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 | Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez | 2022 | Springer | |
| 80 | Relax: A Guide To True Cyber Security | J. Kenneth Fanger | 2022 | James Kenneth Fanger | |
| 81 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco, Bob Maley | 2022 | CRC Press | |
| 82 | Methods, Implementation, and Application of Cyber Security Intelligence and Analytics | Jena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar | 2022 | Information Science Reference | |
| 83 | Cyber Security Meets National Security: International Perspectives on Digital Era Threats | Neil Kent, Irina du Quenoy | 2022 | Academica Press | |
| 84 | Machine Learning for Cyber Security | Preeti Malik (editor); Lata Nautiyal (editor); Mangey Ram (editor) | 2022 | De Gruyter | |
| 85 | Cyber Security and Digital Forensics: Challenges and Future Trends | Sabyasachi Pramanik | 2022 | Wiley-Scrivener | |
| 86 | Holistic Approach to Quantum Cryptography in Cyber Security | Shashi Bhushan | 2022 | CRC Press | |
| 87 | Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) | Shaun Kimmons | 2022 | Felix Walter | |
| 88 | A Straightforward Guide to Cyber Security For Small to Medium Size Business: How to Ensure Your Business is Prepared to Combat a Cyber Attack | David Marsh | 2022 | Straightforward Publishing | |
| 89 | Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers | Wei Lu; Yuqing Zhang; Weiping Wen; Hanbing Yan; Chao Li | 2022 | Springer Singapore Pte. Limited | |
| 90 | Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings | Shlomi Dolev; Jonathan Katz; Amnon Meisels | 2022 | Springer Nature | |
| 91 | Advances in Nature-Inspired Cyber Security and Resilience | Shishir Kumar Shandilya; Neal Wagner; V.B. Gupta; Atulya K. Nagar | 2022 | Springer Nature | |
| 92 | The Art of Cyber Security: A practical guide to winning the war on cyber crime | IT Governance Publishing (editor) | 2022 | It Governance Publishing | |
| 93 | Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007) | Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor) | 2022 | Springer | |
| 94 | Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631) | Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor) | 2022 | Springer | |
| 95 | Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123) | Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor) | 2022 | Springer | |
| 96 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
| 97 | Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks) | Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li | 2022 | Springer | |
| 98 | Science of Cyber Security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers (Lecture Notes in Computer Science, 13580) | Chunhua Su (editor), Kouichi Sakurai (editor), Feng Liu (editor) | 2022 | Springer | |
| 99 | Frontiers in Cyber Security: 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers (Communications in Computer and Information Science) | Chunjie Cao (editor), Yuqing Zhang (editor), Yuan Hong (editor), Ding Wang (editor) | 2022 | Springer | |
| 100 | Cyber Security: The Complete Guide to Cyber Threats and Protection 2nd Edition | David Sutton | 2022 | BCS Learning and Development Ltd | |
| 101 | Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers | Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha | 2021 | Springer | |
| 102 | Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security | Marshall Copeland, Matthew Jacobs | 2021 | Apress | |
| 103 | A Profound Guide On Cyber Security: Getting Protected At Ease As a Professional And a Beginner | Amelia Mike | 2021 | | |
| 104 | The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks | Purackal, Rachel Sebastian | 2021 | | |
| 105 | Modern Cryptography for Cyber Security Professionals(2021)[Bock][9781838644352] | Lisa Bock | 2021 | Packt Publishing Pvt Ltd | |
| 106 | Cyber Security Meets Machine Learning | Xiaofeng Chen, Willy Susilo, Elisa Bertino | 2021 | Springer | |
| 107 | Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings | Shlomi Dolev; Oded Margalit; Benny Pinkas; Alexander Schwarzmann | 2021 | Springer | |
| 108 | Cyber Security For Beginners: Learn How To Be Secure Online | Hazel, Riley Zoey. | 2021 | | |
| 109 | IT And Cyber Security For Beginners 2 Books in 1: Learn How To master IT and Cyber Security | Hazel , Riley Zoey. | 2021 | | |
| 110 | Auditing Information and Cyber Security Governance: A Controls-Based Approach | Robert E. Davis | 2021 | CRC Press | |
| 111 | Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 | Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor) | 2021 | World Scientific Publishing Co Pte Ltd | |
| 112 | Game Theory and Machine Learning for Cyber Security | Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) | 2021 | Wiley-IEEE Press | |
| 113 | Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 | Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor) | 2021 | Springer | |
| 114 | Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) | Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop | 2021 | Springer | |
| 115 | Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science) | Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) | 2021 | Springer | |
| 116 | Cyber Security Defense with Microsoft Defender | Kawula, Dave; O'Neill Sr, John; Kawula, Cristal; Cabot, Emile; Sun, Cary | 2021 | | |
| 117 | Networking for Beginners: Simple Guide to Study Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber Security | Mathew, Jack | 2021 | | |
| 118 | Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities | Sanjay Misra (editor), Amit Kumar Tyagi (editor) | 2021 | Springer | |
| 119 | Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities | Sanjay Misra (editor), Amit Kumar Tyagi (editor) | 2021 | Springer | |
| 120 | Strategies for e-Service, e-Governance, and Cyber Security: Challenges and Solutions for Efficiency and Sustainability | Bhaswati Sahoo, Ranbindra Narayana Behera, Sasmita Rani Samanta, Prasant Kumar Pattnaik | 2021 | Apple Academic Press | |
| 121 | The Cyber Security Body of Knowledge 1.1.0 | Cybok | 2021 | Cybok.org | |
| 122 | Game Theory and Machine Learning for Cyber Security | Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) | 2021 | Wiley-IEEE Press | |
| 123 | Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks) | Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra | 2021 | Springer | |
| 124 | Cyber Security, Artificial Intelligence, Data Protection & the Law | Robert Walters, Marko Novak | 2021 | Springer | |
| 125 | Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies) | Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor) | 2021 | Springer | |
| 126 | Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Communications in Computer and Information Science) | Wei Lu (editor), Qiaoyan Wen (editor), Yuqing Zhang (editor), Bo Lang (editor), Weiping Wen (editor), Hanbing Yan (editor), Chao Li (editor), Li Ding (editor), Ruiguang Li (editor) | 2021 | Springer | |
| 127 | Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) | Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop | 2021 | Springer | |
| 128 | Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks) | Kwangjo Kim, Harry Chandra Tanuwidjaja | 2021 | Springer | |
| 129 | Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Security and Cryptology) | Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) | 2021 | Springer | |
| 130 | Cyber Security Intelligence and Analytics | Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh | 2020 | Springer International Publishing | |
| 131 | Cyber Security: The Lifeline Of Information And Communication Technology | Ramjee Prasad, Vandana Rohokale | 2020 | Springer | |
| 132 | Machine Learning Approaches In Cyber Security Analytics | Tony Thomas, Athira P Vijayaraghavan, Sabu Emmanuel | 2020 | Springer | |
| 133 | Handbook Of Computer Networks And Cyber Security: Principles And Paradigms | Brij Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta | 2020 | Springer | |
| 134 | Secrets of a Cyber Security Architect | Brook S. E. Schoenfield | 2020 | CRC Press | |
| 135 | Distributed Control Methods and Cyber Security Issues in Microgrids | Wenchao Meng (editor), Xiaoyu Wang (editor), Shichao Liu (editor) | 2020 | Academic Press | |
| 136 | Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147) | Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) | 2020 | Springer | |
| 137 | Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) | Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) | 2020 | Information Science Reference | |
| 138 | Security And Law: Legal And Ethical Aspects Of Public Security, Cyber Security And Critical Infrastructure Security | Anton Vedder , Jessica Schroers , Charlotte Ducuing , Peggy Valcke | 2020 | Intersentia | |
| 139 | The Pocket Guide to Cyber Security | H, James; D, Usha | 2020 | Usha D & James H | |
| 140 | Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats | Kiser, Quinn | 2020 | | |
| 141 | Cyber Security Handbook: Protect Yourself Against Cyber Crime | Greenwood, W. Muse | 2020 | | |
| 142 | Cyber Security | Jocelyn O. Padallan | 2020 | Arcler Press | |
| 143 | First Line of Defense: The Beginners Book of Cyber Security | Nelson, Christopher | 2020 | | |
| 144 | The Cyber Security Network Guide | Fiedelholtz | 2020 | Springer | |
| 145 | Machine Learning Approaches in Cyber Security Analytics | Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel | 2020 | Springer | |
| 146 | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM | Regner Sabillon | 2020 | | |
| 147 | Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020): 149 (Lecture Notes in Networks and Systems) | Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar | 2020 | Springer Singapore | |
| 148 | Quantum Cryptography and the Future of Cyber Security | Nirbhay Kumar Chaubey, Bhavesh B. Prajapati | 2020 | Information Science Reference | |
| 149 | Automotive Cyber Security: Introduction, Challenges, and Standardization | Shiho Kim, Rakesh Shrestha | 2020 | Springer Singapore;Springer | |
| 150 | Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers | Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar | 2020 | Springer Singapore;Springer | |
| 151 | Frontiers in Cyber Security: Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings | Guangquan Xu, Kaitai Liang, Chunhua Su | 2020 | Springer Singapore;Springer | |
| 152 | Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I | Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang | 2020 | Springer International Publishing;Springer | |
| 153 | Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II | Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang | 2020 | Springer International Publishing;Springer | |
| 154 | Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III | Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang | 2020 | Springer International Publishing;Springer | |
| 155 | Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings | Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali | 2020 | Springer International Publishing;Springer | |
| 156 | Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings | Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss | 2020 | Springer International Publishing;Springer | |
| 157 | Real-Time and Retrospective Analyses of Cyber Security | David Anthony Bird | 2020 | IGI Global | |
| 158 | Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Advances in Information Security, Privacy, and Ethics) | Natalie Sjelin (editor) | 2020 | IGI Global | |
| 159 | The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks | Alan Calder | 2020 | IT Governance Publishing Ltd | |
| 160 | The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks | Alan Calder | 2020 | IT Governance Ltd | |
| 161 | Cyber security A national priority of Bangladesh | Md. Shariful Islam | 2020 | Routledge | |
| 162 | Cyber Security Practitioner's Guide | Hamid Jahankhani (editor) | 2020 | WSPC | |
| 163 | Cyber Security Practitioner's Guide | Hamid Jahankhani (editor) | 2020 | WSPC | |
| 164 | Cyber Security Practitioner's Guide | Hamid Jahankhani (editor) | 2020 | WSPC | |
| 165 | Cyber Security ABCs: Delivering Awareness, Behaviours and Culture Change | Jessica Barker; Adrian Davis; Bruce Hallas; Ciarán Mc Mahon | 2020 | BCS, The Chartered Institute for IT | |
| 166 | Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers | Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha | 2020 | Springer | |
| 167 | Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career | Jessica Barker | 2020 | Kogan Page | |
| 168 | Handbook of Computer Networks and Cyber Security. Principles and Paradigms | Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta | 2020 | Springer | |
| 169 | Cyber Security Report 2020. | coll. | 2020 | CPR | |
| 170 | Cyber Security: Essential Principles to Secure Your Organisation | Alan Calder; Archie (Male Synthesized Voice) | 2020 | IT Governance Ltd | |
| 171 | Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing) | Shishir K. Shandilya (editor), Neal Wagner (editor), Atulya K. Nagar (editor) | 2020 | Springer | |
| 172 | Cyber Security in India: Education, Research and Training (IITK Directions, 4) | Sandeep Kumar Shukla (editor), Manindra Agrawal (editor) | 2020 | Springer | |
| 173 | The NICE Cyber Security Framework: Cyber Security Management | Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh | 2020 | Springer | |
| 174 | Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147) | Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) | 2020 | Springer | |
| 175 | Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146) | Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) | 2020 | Springer | |
| 176 | Information and Cyber Security: 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Communications in Computer and Information Science, 1166) | Hein Venter (editor), Marianne Loock (editor), Marijke Coetzee (editor), Mariki Eloff (editor), Jan Eloff (editor) | 2020 | Springer | |
| 177 | International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and Intelligence | Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman | 2019 | Springer International Publishing | |
| 178 | Social Network Forensics, Cyber Security, and Machine Learning | P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat | 2019 | Springer Singapore | |
| 179 | Advances in Cyber Security: Principles, Techniques, and Applications | Kuan-Ching Li, Xiaofeng Chen, Willy Susilo | 2019 | Springer Singapore | |
| 180 | Cyber Security: Threats and Responses for Government and Business | Jack Caravelli, Nigel Jones | 2019 | Praeger Security International | |
| 181 | The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2019 | Springer International Publishing | |
| 182 | Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers | Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou | 2019 | Springer Singapore | |
| 183 | Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings | Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung | 2019 | Springer International Publishing | |
| 184 | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Third International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) | Yang Xu, Hong Xia, Feng Gao, Weihua Chen, Zheming Liu, Pengfei Gu | 2019 | Springer Singapore | |
| 185 | Computer and cyber security: principles, algorithm, applications, and perspectives | Agrawal, Dharma Prakash; Gupta, Brij; Wang, Haoxiang | 2019 | CRC Press | |
| 186 | Machine learning for computer and cyber security: principles, algorithms, and practices | Gupta, Brij; Sheng, Quan Z | 2019 | CRC Press | |
| 187 | CyBok: The Cyber Security Body of Knowledge | Awais Rashid; Howard Chivers; George Danezis; Emil Lupu; Andrew Martin | 2019 | National Cyber Security Centre | |
| 188 | Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security | Erickson Karnel | 2019 | | |
| 189 | Deep Learning Applications for Cyber Security | Mamoun Alazab, MingJian Tang | 2019 | Springer International Publishing | |
| 190 | Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings | Xiaofeng Chen, Xinyi Huang, Jun Zhang | 2019 | Springer International Publishing | |
| 191 | Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security | Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman | 2019 | Springer International Publishing | |
| 192 | Science of Cyber Security: Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers | Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung | 2019 | Springer International Publishing | |
| 193 | Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part I | Auhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki | 2019 | Springer International Publishing | |
| 194 | Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part II | Auhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki | 2019 | Springer International Publishing | |
| 195 | Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings | Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu | 2019 | Springer Singapore | |
| 196 | Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT | Tounsi, Wiem | 2019 | ISTE | |
| 197 | Advances in Cyber Security: Principle, Techniques, and Applications | Kuan-Ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor) | 2019 | Springer Verlag, Singapore | |
| 198 | Advances in Cyber Security: Principle, Techniques, and Applications | Kuan-ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor) | 2019 | Springer-Nature New York Inc | |
| 199 | Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) | Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) | 2019 | Information Science Reference | |
| 200 | Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals | Zach Codings | 2019 | | |
| 201 | Computer and cyber security: principles, algorithm, applications, and perspectives | Agrawal, Dharma Prakash;Gupta, Brij;Wang, Harry Haoxiang | 2019 | CRC Press | |
| 202 | CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners) | STEVEN, MICHAEL; STEVEN, MICHAEL | 2019 | | |
| 203 | Cyber Security comprehensive beginners guide to learn the basics and effective methods of cybersecurity | Walker, Brian | 2019 | | |
| 204 | Cyber Security: Threats and Responses for Government and Business | Caravelli, Jack;Jones, Nigel;Kozup, John C | 2019 | Praeger | |
| 205 | Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications | El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk | 2019 | Institution of Engineering and Technology | |
| 206 | Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies | Gia Nhu Nguyen; Dac-Nhuong Le; Raghvendra Kumar; Jyotir Moy Chatterjee; Manju Khari | 2019 | Wiley-Scrivener | |
| 207 | Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications | El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk | 2019 | The Institution of Engineering and Technology | |
| 208 | Cyber Security in Parallel and Distributed Computing | DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee | 2019 | Scrivener Publishing | |
| 209 | Handbook of Computer Networks and Cyber Security: Principles and Paradigms | Brij B. Gupta; Gregorio Martinez Perez; Dharma P. Agrawal; Deepak Gupta | 2019 | Springer Nature | |
| 210 | How Cyber Security Can Protect Your Business : A Guide for All Stakeholders | Christopher Wright; Archie (Male Synthesized Voice) | 2019 | IT Governance Ltd | |
| 211 | Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond | Matt Reyes | 2019 | Independently Published | |
| 212 | Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond | Matt Reyes | 2019 | Independently Published | |
| 213 | International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence | Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) | 2018 | Edizioni della Normale | |
| 214 | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Yang Xu,Feng Gao,Weihua Chen,Zheming Liu,Pengfei Gu (eds.) | 2018 | Springer Singapore | |
| 215 | Cyber Security for Cyber Physical Systems | Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) | 2018 | Springer International Publishing | |
| 216 | Cyber Security: Power and Technology | Martti Lehto, Pekka Neittaanmäki | 2018 | Springer International Publishing | |
| 217 | Cyber Security Cryptography and Machine Learning | Itai Dinur, Shlomi Dolev, Sachin Lodha | 2018 | Springer International Publishing | |
| 218 | Cyber Security | M. U. Bokhari, Namrata Agrawal, Dharmendra Saini | 2018 | Springer Singapore | |
| 219 | Science of Cyber Security: First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers | Feng Liu, Shouhuai Xu, Moti Yung | 2018 | Springer International Publishing | |
| 220 | From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday | Pierangela Samarati, Indrajit Ray, Indrakshi Ray | 2018 | Springer International Publishing | |
| 221 | Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings | Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan | 2018 | Springer Singapore | |
| 222 | Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings | Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang | 2018 | Springer Singapore | |
| 223 | Handbook Of Research On Information And Cyber Security In The Fourth Industrial Revolution | Ziska Fields | 2018 | IGI Global/IRMA | |
| 224 | Hands-on Machine Learning for Cyber Security | Soma Halder | 2018 | Packt Publishing | |
| 225 | Cyber security innovation for the digital economy : a case study of the Russian Federation | Sergei Petrenko | 2018 | | |
| 226 | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | Chertoff, Michael | 2018 | Grove Atlantic;Grove Press | |
| 227 | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | Chertoff, Michael | 2018 | Atlantic Monthly Press;Grove Atlantic; Grove/Atlantic, Incorporated | |
| 228 | GDPR and Cyber Security for Business Information Systems | Antoni Gobeo, Connor Fowler, William J. Buchanan | 2018 | River Publishers | |
| 229 | Cyber Security: Law and Guidance | Helen Wong (editor) | 2018 | Bloomsbury Professional | |
| 230 | Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks) | Darren Quick, Kim-Kwang Raymond Choo | 2018 | Springer | |
| 231 | The GCHQ Puzzle Book II: From WWI ciphers to modern cyber security, pit your wits against 100 years of codebreaking genius | GCHQ | 2018 | Penguin Books Ltd | |
| 232 | Digital Cop: A Digital Cop's Guide to Cyber Security | Baghla, Sahil;Soni, Arun | 2017;2015 | Notion Press | |
| 233 | Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems | Edward Griffor | 2017 | Syngress | |
| 234 | Cyber Security. Simply. Make it Happen | Ferri Abolhassan (ed.) | 2017 | Springer | |
| 235 | Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology | Nicholas J. Daras, Themistocles M. Rassias (eds.) | 2017 | Springer International Publishing | |
| 236 | Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings | Shlomi Dolev, Sachin Lodha (eds.) | 2017 | Springer International Publishing | |
| 237 | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Yang Xu (eds.) | 2017 | Springer Singapore | |
| 238 | Research Methods for Cyber Security | Thomas Edgar and David Manz (Auth.) | 2017 | Syngress | |
| 239 | Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center | Marshall Copeland (auth.) | 2017 | Apress | |
| 240 | Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology | Nicholas J. Daras, Themistocles M. Rassias (eds.) | 2017 | Springer | |
| 241 | Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents | Gerard Johansen | 2017 | Packt Publishing | |
| 242 | Cyber security : A practitioner’s guide | David Sutton | 2017 | Swindon, United Kingdom BCS, the Chartered Institute for IT | |
| 243 | Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents | Gerard Johansen | 2017 | Packt Publishing | |
| 244 | Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Xu, Yang | 2017 | Springer Singapore | |
| 245 | Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Xu, Yang | 2017 | Springer | |
| 246 | Cyber security engineering: a practical approach for systems and software assurance | Mead, Nancy R.;Woody, Carol C | 2017 | Addison-Wesley | |
| 247 | Cyber security and policy : a substantive dialogue | Anuradha Mathrani (editor); Julian Jang-Jaccard (editor); Andrew M. Colarik (editor) | 2017 | | |
| 248 | Industrial Cyber Security for Dummies. | David Meltzer and Jeff Lund | 2017 | John Wiley & Sons, Inc. | |
| 249 | Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings | Shlomi Dolev; Sachin Lodha | 2017 | Springer | |
| 250 | International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors | U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation | 2017 | e-artnow | |
| 251 | Introduction to Cyber Security | Jeetendra Pande | 2017 | Uttarakhand Open University | |
| 252 | Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factor | Andreas Von Grebmer | 2017 | Books on Demand | |
| 253 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 | Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) | 2016 | Springer Singapore | |
| 254 | Cyber security for industrial control systems : from the viewpoint of close-loop | Chen, Jiming; Cheng, Peng; Zhang, Heng | 2016 | CRC Press | |
| 255 | Cyber Security Awareness for CEOs and Management | Dalziel, Henry; Willson, David | 2016 | Syngress is an imprint of Elsevier | |
| 256 | Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers | Kristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.) | 2016 | Springer International Publishing | |
| 257 | Cyber Security Engineering A Practical Approach for Systems and Software Assurance | Carol Woody, Nancy R. Mead | 2016 | Addison-Wesley Professional | |
| 258 | Cyber Security Engineering: A Practical Approach for Systems and Software Assurance | Nancy R. Mead, Carol Woody | 2016 | Addison-Wesley Professional | |
| 259 | Cyber Security: Everything an Executive Needs to Know | Phillip Ferraro | 2016 | Phillip J Ferraro LLC | |
| 260 | Essential Cyber Security Handbook | Nam Nguyen | 2016 | Nam Nguyen | |
| 261 | Cyber Security And The Politics Of Time | Tim Stevens | 2016 | Cambridge University Press | |
| 262 | Cyber security for industrial control systems : from the viewpoint of close-loop | Peng Cheng, Heng Zhang, Jiming Chen (eds.) | 2016 | CRC Press | |
| 263 | Cyber Security Cyber Attacks and Counter Measures: User Perspective (PGDCS-03) | Nihar Ranjan Pande (ed.) | 2016 | Uttarakhand Open University | |
| 264 | A Human Readable Guide to Cyber Security | Dane Christian | 2015 | | |
| 265 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki | 2015 | Springer International Publishing | |
| 266 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
| 267 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
| 268 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki (eds.) | 2015 | Springer International Publishing | |
| 269 | Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings | Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.) | 2015 | Springer International Publishing | |
| 270 | Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2015 | Springer International Publishing | |
| 271 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmaki | 2015 | Springer | |
| 272 | A simpler guide to online security for everyone : how to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services | Clark, Ceri | 2015 | Ceri Clark;Lycan Books | |
| 273 | A Human Readable Guide to Cyber Security | Christian, Dane | 2015 | | |
| 274 | Cyber Security Incident Management Guide | Centre For Cyber Security Belgium | 2015 | Centre For Cyber Security Belgium | |
| 275 | Cyber Security Awareness for Corporate Directors and Board Members | Willson, David; Dalziel, Henry | 2015 | Elsevier Science | |
| 276 | Cyber Security Awareness for Lawyers | David Willson, Henry Dalziel | 2015 | Syngress | |
| 277 | Cyber Security Awareness for Accountants and CPAs | David Willson, Henry Dalziel | 2015 | Syngress | |
| 278 | Cyber Security Awareness for CEOs and Management | David Willson, Henry Dalziel | 2015 | Syngress | |
| 279 | Finance: Cloud Computing, Cyber Security and Cyber Heist--Beginners Guide to Help Protect Against Online Theft in the Cyber World | Alex Nkenchor Uwajeh | 2015 | Alex Nkenchor Uwajeh | |
| 280 | HACK-X-CRYPT: A Straight Forward Guide Towards Ethical Hacking and Cyber Security | Ujjwal Sahay | 2015 | Ujjwal Sahay | |
| 281 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 | Anthony Bonato, Stephen Finbow, Przemys?aw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) | 2014 | Springer India | |
| 282 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut, Daniel Bachrach | 2014 | Apress | |
| 283 | 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy | Daniel G. Bachrach, Eric J. Rzeszut (auth.) | 2014 | Apress | |
| 284 | Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations | Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
| 285 | Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2014 | Springer International Publishing | |
| 286 | Cyber Security | Voeller, John G. | 2014 | Wiley | |
| 287 | CANSO Cyber Security and Risk Assessment Guide | coll. | 2014 | Civil Air Navigation Services Organisation | |
| 288 | 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy | Eric J. Rzeszut & Daniel G. Bachrach | 2014 | Friends of ED/Apress | |
| 289 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut; Daniel Bachrach | 2014 | Apress | |
| 290 | Cyber security and IT infrastructure protection | Vacca, John R | 2014 | Syngress | |
| 291 | Cyber Security and Resiliency Policy Framework | A. Vaseashta; P. Susmann; E. Braman | 2014 | IOS Press, Incorporated | |
| 292 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
| 293 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
| 294 | Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp and Raj Samani (Auth.) | 2013 | Syngress | |
| 295 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Maurizio Martellini | 2013 | Springer | |
| 296 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
| 297 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
| 298 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
| 299 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
| 300 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco | 2013 | CRC Press | |
| 301 | Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology Policies | Richard Phillips, Rayton R. Sianjina | 2013 | Routledge | |
| 302 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
| 303 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
| 304 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
| 305 | Advances in Cyber Security : Technology, Operations, and Experiences | D. Frank Hsu; Dorothy Marinucci | 2013 | Fordham University Press | |
| 306 | FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security | Stephen D. Gantz and Daniel R. Philpott (Eds.) | 2012 | Syngress | |
| 307 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
| 308 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
| 309 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
| 310 | Cyber Security Policy Guidebook | Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss | 2012 | Wiley | |
| 311 | Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security Professionals | Y. Anto | 2012 | LAP LAMBERT Academic Publishing | |
| 312 | Cyber Security Policy Guidebook | Jennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus H. Sachs; Jeffrey Schmidt | 2012 | John Wiley & Sons | |
| 313 | A System-Aware Cyber Security architecture | Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 | 2011 | | |
| 314 | Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives | WILEY INDIA | 2011 | Nina Godbole, Sunit Belapure, Kamlesh Bajaj | |
| 315 | Cyber Law and Cyber Security in Developing and Emerging Economies | Zeinab Karake Shalhoub, Lubna Al Qasimi | 2010 | | |
| 316 | Digital Security: Cyber Terror and Cyber Security (The Digital World) | Ananda Mitra | 2010 | | |
| 317 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
| 318 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
| 319 | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (A | Kenneth J. Knapp | 2009 | Information Science Reference | |
| 320 | Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for | U. Gori | 2009 | | |
| 321 | Insider Attack and Cyber Security. Beyond the Hacker | Salvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, | 2008 | Springer | |
| 322 | Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Se | Anoop Singhal | 2006 | | |
| 323 | The Complete Cyber Security Course - Volume 1 | Nathan House | 0 | | |
| 324 | Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts | Ethem Mining | 2019 | Independently published | |
| 325 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 | Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) | 2016 | Springer Singapore | |
| 326 | A Human Readable Guide to Cyber Security | Dane Christian | 2015 | | |
| 327 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki | 2015 | Springer International Publishing | |
| 328 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
| 329 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
| 330 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki (eds.) | 2015 | Springer International Publishing | |
| 331 | Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings | Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.) | 2015 | Springer International Publishing | |
| 332 | Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2015 | Springer International Publishing | |
| 333 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 | Anthony Bonato, Stephen Finbow, Przemys?aw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) | 2014 | Springer India | |
| 334 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut, Daniel Bachrach | 2014 | Apress | |
| 335 | 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy | Daniel G. Bachrach, Eric J. Rzeszut (auth.) | 2014 | Apress | |
| 336 | Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations | Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
| 337 | Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2014 | Springer International Publishing | |
| 338 | Cyber Security | Voeller, John G. | 2014 | Wiley | |
| 339 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
| 340 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
| 341 | Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp and Raj Samani (Auth.) | 2013 | Syngress | |
| 342 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Maurizio Martellini | 2013 | Springer | |
| 343 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
| 344 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
| 345 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
| 346 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
| 347 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco | 2013 | CRC Press | |
| 348 | Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology Policies | Richard Phillips, Rayton R. Sianjina | 2013 | Routledge | |
| 349 | Cyber security policy guidebook | Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss | 2012 | Wiley | |
| 350 | FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security | Stephen D. Gantz and Daniel R. Philpott (Eds.) | 2012 | Syngress | |
| 351 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
| 352 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
| 353 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
| 354 | Cyber Security Essentials | James Graham, Ryan Olson, Rick Howard | 2011 | Auerbach Publications | |
| 355 | Cyber Security Essentials | Rick Howard | 2011 | CRC Press | |
| 356 | Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies | Junaid Ahmed Zubairi, Athar Mahboob | 2011 | IGI Global snippet | |
| 357 | A System-Aware Cyber Security architecture | Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 | 2011 | | |
| 358 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
| 359 | Cyber Security Essentials | Rick Howard | 2010 | CRC Press | |
| 360 | Cyber Security Essentials | James Graham, Ryan Olson, Rick Howard | 2010 | CRC Press | |
| 361 | Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering | Hamid R. Nemati | 2010 | IGI Global | |
| 362 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
| 363 | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) | Kenneth J. Knapp | 2009 | Information Science Reference | |
| 364 | Insider attack and cyber security : beyond the hacker | Salvatore J Stolfo; et al | 2008 | Springer | |
| 365 | Data Warehousing and Data Mining Techniques for Cyber Security | Anoop Singhal (auth.) | 2007 | Springer US | |
| 366 | Cyber Security | Carter Michael. | | | |
| 367 | Cyber Security | Carter Michael. | | | |
| 368 | Applied Cryptography for Cyber Security and Defense. Information Encryption and Cyphering | Nemati H.R., Yang L. | | | |
| 369 | etc. Insider Attack and Cyber Security. Beyond the Hacker | Stolfo S.J. | | | |
| 370 | Strategic Cyber Security | Geers K. | | | |
| 371 | Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks | Cornish Paul. | | | |
| 372 | Global Cyber Security - Thinking About The Niche for NATO | Tikk Eneken. | | | |
| 373 | Cyber Security Education: Principles and Policies | Greg Austin | | | |
| 374 | Handbook of Research on Multimedia Cyber Security | Gupta Brij | | Information Science Reference | |
| 375 | Cyber Security: ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners | David White | | | |
| 376 | Connected Places: cyber security principles. | National Cyber Security Centre | | | |
| 377 | How to get a job in cyber security earning six figures | Lina Lau | | | |
| 378 | Cyber Security and Laws: by Ques10 | Ques10 Team | | | |
| 379 | Fundamentals of Cyber Security | Mayank Bhushan | | | |
| 380 | Cyber Security: Python for Penetration Testing | Travis Czech | | | |
| 381 | From CIA to APT: An Introduction to Cyber Security | Amoroso and Amoroso, Matthew Amoroso | | | |
| 382 | Practical Cyber Security for Extremely Busy People: Protect yourself, your family, and your career from online exploitation | Daniel Farber Huang | | | |
| 383 | Computer Engineering:2 books in 1: Linux for Beginners+Cyber Security, How to Win with Cyberattacks and How to Use Linux Like a Pro | John Snowden | | | |
| 384 | CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT IT | Waleed Umar | | | |
| 385 | CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT IT | Waleed Umar | | | |
| 386 | Cyber Security Intelligence and Analytics | Zheng Xu | | Springer Nature | |
| 387 | Cyber Security Intelligence and Analytics | Zheng Xu | | Springer Nature | |
| 388 | Advance Cyber Security | Manmohan Singh, Priyanka Sharma, Rahul Sharma | | Arcler Press | |
| 389 | Cyber security. The complete guide to cyber threats and protection | David Sutton | | | |
| 390 | Digital Transformation, Cyber Security and Resilience of Modern Societies (Studies in Big Data, 84) | Todor Tagarev; Krassimir T. Atanassov; Vyacheslav Kharchenko; Janusz Kacprzyk | | | |