Pak Asia Book Corporation

Pak Asia Book Corportation

Pak Asia Book Corporation

List of Cyber Security Engineering Books

Sr. No.TitleAuthorYearPublisherOrder Qty
1Intelligent Approaches to Cyber SecurityNarendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli2024CRC Press
2Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117)Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor)2024Springer
3Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers (Communications in Computer and Information Science)Haomiao Yang (editor), Rongxing Lu (editor)2024Springer
4Cyber Security and Business Analysis: An essential guide to secure and robust systemsBindu Channaveerappa2024BCS, The Chartered Institute for IT
5Cyber Security and Business Analysis: An essential guide to secure and robust systemsBindu Channaveerappa2024BCS, The Chartered Institute for IT
6Collaborative Approaches for Cyber Security in Cyber-Physical SystemsTheo Dimitrakos, Javier Lopez, Fabio Martinelli2023Springer
7Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022 Matsue, Japan, August 10–12, 2022 Revised Selected PapersChunhua Su, Kouichi Sakurai2023Springer
8Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, ProceedingsAbderrahmane Nitaj, Karim Zkik2023Springer
9Machine Learning for Cyber Security2023Springer International Publishing
10Machine Learning for Cyber Security2023Springer International Publishing
11Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part IIIYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
12Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part IIYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
13Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part IYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
14Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 ProceedingsYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
15Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 ProceedingsYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
16Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part IYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
17Cyber Security Applications for Industry 4.0R Sujatha, G Prakash, Noor Zaman Jhanjhi2023CRC Press
18International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta2023Springer
19The NICE Cyber Security Framework: Cyber Security Intelligence and AnalyticsIzzat Alsmadi2023Springer
20Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman2023Springer
21Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman2023Springer
22Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics)Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla2023River Publishers
23The NICE Cyber Security Framework. Cyber Security Intelligence and AnalyticsIzzat Alsmadi2023Springer
24Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum CryptographyOm Pal; Vinod Kumar; Rijwan Khan; Bashir Alam; Mansaf Alam2023
25Artificial Intelligence and Cyber Security in Industry 4.0Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi2023Springer
26Artificial Intelligence and Cyber Security in Industry 4.0Velliangiri Sarveshwaran; Joy Iong-Zong Chen; Danilo Pelusi2023Springer Nature
27Collaborative Approaches for Cyber Security in Cyber-Physical SystemsTheo Dimitrakos; Javier Lopez; Fabio Martinelli2023Springer Nature
28The NICE Cyber Security Framework: Cyber Security Intelligence and AnalyticsIzzat Alsmadi2023Springer Nature
29Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, ProceedingsAbderrahmane Nitaj; Karim Zkik2023Springer Nature
30Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected PapersChunhua Su; Kouichi Sakurai2023Springer Nature
31Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications)Hamid Jahankhani (editor), Ayman El Hajjar (editor)2023Springer
32Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications)Hamid Jahankhani (editor), Ayman El Hajjar (editor)2023Springer
33Intelligent Approaches to Cyber SecurityNarendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas2023CRC Press
34Confident Cyber Security: The Essential Insights and How to Protect from ThreatsJessica Barker2023Kogan Page
35Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11)Dr Jessica Barker2023Kogan Page
36Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11)Dr Jessica Barker2023Kogan Page
37Wireless Communication in Cyber SecurityS. Sountharrajan (editor), R. Maheswar (editor), Geetanjali Rathee (editor), M. Akila (editor)2023Wiley-Scrivener
38Cyber Security for Next-Generation Computing TechnologiesInam Ullah Khan2023CRC Press
39Cyber Security and Social Media Applications (Lecture Notes in Social Networks)Sibel Tar?yan Özyer (editor), Buket Kaya (editor)2023Springer
40Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected PapersAntonio Skarmeta (editor), Daniele Canavese (editor), Antonio Lioy (editor), Sara Matheu (editor)2023Springer
41Digital Transformation, Cyber Security and Resilience: Second International Conference, DIGILIENCE 2020, Varna, Bulgaria, September 30 – October 2, 2020, Revised Selected PapersTodor Tagarev (editor), Nikolai Stoianov (editor)2023Springer
42Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things)Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor)2023Springer
43Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science)Moti Yung (editor), Chao Chen (editor), Weizhi Meng (editor)2023Springer
44Cyber Security and Digital Forensics: Challenges and Future TrendsMangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le2022Wiley-Scrivener
45Cyber Security Politics: Socio-Technological Transformations and Political FragmentationMyriam Dunn Cavelty, Andreas Wenger2022Routledge
46Secure Data Science: Integrating Cyber Security and Data ScienceB. Thuraisngham, M. Kantarcioglu, L. Khan2022
47Cyber Security and Network SecuritySabyasachi Pramanik (editor), Debabrata Samanta (editor), M. Vinay (editor), Abhijit Guha (editor)2022Wiley-Scrivener
48Cyber Security Practical Engineering ApproachHenrique Santos2022
49Cyber Security (2022) [Lehto Neittaanmaki] [9783030912925]Lehto Neittaanmaki2022
50Cyber Security : Critical Infrastructure ProtectionMartti Lehto; Pekka Neittaanmäki2022Springer International Publishing
51Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
52Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
53Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
54Holistic Approach to Quantum Cryptography in Cyber SecurityShashi Bhushan; Manoj Kumar; Pramod Kumar; Renjith V Ravi; Anuj Kumar Singh2022CRC Press
55Strategic Cyber Security ManagementPeter Trim, Yang-Im Lee2022Routledge
56Strategic Cyber Security ManagementPeter Trim, Yang-Im Lee2022Routledge
57Cyber Security Threats and Challenges Facing Human LifeHari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor)2022Chapman and Hall/CRC
58Strategic Cyber Security ManagementPeter Trim, Yang-Im Lee2022Routledge
59Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301)Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor)2022Springer
60Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor)2022Chapman and Hall/CRC
61Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor)2022Chapman and Hall/CRC
62Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor)2022Chapman and Hall/CRC
63Cyber Security and Critical InfrastructuresLeandros Maglaras; Helge Janicke; Mohamed Amine Ferrag (eds.)2022MDPI
64Cyber Security for Beginners: A Comprehensive and Essential Guide for Every Novice to Understand and Master CybersecurityLiam Smith2022Independently published
65Cyber Security Applications for Industry 4.0R. Sujatha, G. Prakash, Noor Zaman Jhanjhi2022CRC Press/Chapman & Hall
66Cyber Security Applications for Industry 4.0 (Chapman & Hall/CRC Cyber-Physical Systems)R Sujatha (editor), G Prakash (editor), Noor Zaman Jhanjhi (editor)2022Chapman and Hall/CRC
67Advances in Nature-Inspired Cyber Security and ResilienceShishir Kumar Shandilya, Neal Wagner, V.B. Gupta, Atulya K. Nagar2022Springer
68Cyber Security for MicrogridsSubham Sahoo, Frede Blaabjerg, Tomislav Dragicevi?2022The Institution of Engineering and Technology
69What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco, Bob Maley2022CRC Press
70Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected PapersIndhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan2022Springer
71Cross-industry Applications of Cyber Security FrameworksSukanta Baral, Richa Goel, Mashiur Rahman, Jahangir Sultan, Sarkar Jahan2022Information Science Reference
72Cross-Industry Applications of Cyber Security FrameworksSukanta Kumar Baral, Richa Goel, Md Mashiur Rahman2022IGI Global
73Cross-Industry Applications of Cyber Security FrameworksSukanta Kumar Baral, Richa Goel, Md Mashiur Rahman2022IGI Global
74Cyber Security and Operations Management for Industry 4.0Ahmed A Elngar; N Thillaiarasu; Mohamed Elhoseny; K Martin Sagayam2022CRC Press
75Advances in Cyber Security and Intelligent AnalyticsAbhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas2022CRC Press
76Machine Learning for Cyber SecurityPreeti Malik, Lata Nautiyal, Mangey Ram2022De Gruyter
77Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, ProceedingsEmmanuel Ahene, Fagen Li2022Springer
78Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected PapersWei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li2022Springer
79Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez2022Springer
80Relax: A Guide To True Cyber SecurityJ. Kenneth Fanger2022James Kenneth Fanger
81What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco, Bob Maley2022CRC Press
82Methods, Implementation, and Application of Cyber Security Intelligence and AnalyticsJena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar2022Information Science Reference
83Cyber Security Meets National Security: International Perspectives on Digital Era ThreatsNeil Kent, Irina du Quenoy2022Academica Press
84Machine Learning for Cyber SecurityPreeti Malik (editor); Lata Nautiyal (editor); Mangey Ram (editor)2022De Gruyter
85Cyber Security and Digital Forensics: Challenges and Future TrendsSabyasachi Pramanik2022Wiley-Scrivener
86Holistic Approach to Quantum Cryptography in Cyber SecurityShashi Bhushan2022CRC Press
87Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies)Shaun Kimmons2022Felix Walter
88A Straightforward Guide to Cyber Security For Small to Medium Size Business: How to Ensure Your Business is Prepared to Combat a Cyber AttackDavid Marsh2022Straightforward Publishing
89Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected PapersWei Lu; Yuqing Zhang; Weiping Wen; Hanbing Yan; Chao Li2022Springer Singapore Pte. Limited
90Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, ProceedingsShlomi Dolev; Jonathan Katz; Amnon Meisels2022Springer Nature
91Advances in Nature-Inspired Cyber Security and ResilienceShishir Kumar Shandilya; Neal Wagner; V.B. Gupta; Atulya K. Nagar2022Springer Nature
92The Art of Cyber Security: A practical guide to winning the war on cyber crimeIT Governance Publishing (editor)2022It Governance Publishing
93Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007)Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor)2022Springer
94Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631)Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor)2022Springer
95Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123)Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor)2022Springer
96Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
97Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks)Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li2022Springer
98Science of Cyber Security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers (Lecture Notes in Computer Science, 13580)Chunhua Su (editor), Kouichi Sakurai (editor), Feng Liu (editor)2022Springer
99Frontiers in Cyber Security: 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers (Communications in Computer and Information Science)Chunjie Cao (editor), Yuqing Zhang (editor), Yuan Hong (editor), Ding Wang (editor)2022Springer
100Cyber Security: The Complete Guide to Cyber Threats and Protection 2nd EditionDavid Sutton2022BCS Learning and Development Ltd
101Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected PapersHein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha2021Springer
102Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure SecurityMarshall Copeland, Matthew Jacobs2021Apress
103A Profound Guide On Cyber Security: Getting Protected At Ease As a Professional And a BeginnerAmelia Mike2021
104The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise NetworksPurackal, Rachel Sebastian2021
105Modern Cryptography for Cyber Security Professionals(2021)[Bock][9781838644352]Lisa Bock2021Packt Publishing Pvt Ltd
106Cyber Security Meets Machine LearningXiaofeng Chen, Willy Susilo, Elisa Bertino2021Springer
107Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, ProceedingsShlomi Dolev; Oded Margalit; Benny Pinkas; Alexander Schwarzmann2021Springer
108Cyber Security For Beginners: Learn How To Be Secure OnlineHazel, Riley Zoey.2021
109IT And Cyber Security For Beginners 2 Books in 1: Learn How To master IT and Cyber SecurityHazel , Riley Zoey.2021
110Auditing Information and Cyber Security Governance: A Controls-Based ApproachRobert E. Davis2021CRC Press
111Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor)2021World Scientific Publishing Co Pte Ltd
112Game Theory and Machine Learning for Cyber SecurityCharles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor)2021Wiley-IEEE Press
113Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor)2021Springer
114Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995)Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop2021Springer
115Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science)Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor)2021Springer
116Cyber Security Defense with Microsoft DefenderKawula, Dave; O'Neill Sr, John; Kawula, Cristal; Cabot, Emile; Sun, Cary2021
117Networking for Beginners: Simple Guide to Study Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber SecurityMathew, Jack2021
118Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or OpportunitiesSanjay Misra (editor), Amit Kumar Tyagi (editor)2021Springer
119Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or OpportunitiesSanjay Misra (editor), Amit Kumar Tyagi (editor)2021Springer
120Strategies for e-Service, e-Governance, and Cyber Security: Challenges and Solutions for Efficiency and SustainabilityBhaswati Sahoo, Ranbindra Narayana Behera, Sasmita Rani Samanta, Prasant Kumar Pattnaik2021Apple Academic Press
121The Cyber Security Body of Knowledge 1.1.0Cybok2021Cybok.org
122Game Theory and Machine Learning for Cyber SecurityCharles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor)2021Wiley-IEEE Press
123Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks)Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra2021Springer
124Cyber Security, Artificial Intelligence, Data Protection & the LawRobert Walters, Marko Novak2021Springer
125Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies)Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor)2021Springer
126Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Communications in Computer and Information Science)Wei Lu (editor), Qiaoyan Wen (editor), Yuqing Zhang (editor), Bo Lang (editor), Weiping Wen (editor), Hanbing Yan (editor), Chao Li (editor), Li Ding (editor), Ruiguang Li (editor)2021Springer
127Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995)Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop2021Springer
128Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks)Kwangjo Kim, Harry Chandra Tanuwidjaja2021Springer
129Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Security and Cryptology)Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor)2021Springer
130Cyber Security Intelligence and AnalyticsZheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh2020Springer International Publishing
131Cyber Security: The Lifeline Of Information And Communication TechnologyRamjee Prasad, Vandana Rohokale2020Springer
132Machine Learning Approaches In Cyber Security AnalyticsTony Thomas, Athira P Vijayaraghavan, Sabu Emmanuel2020Springer
133Handbook Of Computer Networks And Cyber Security: Principles And ParadigmsBrij Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta2020Springer
134Secrets of a Cyber Security ArchitectBrook S. E. Schoenfield2020CRC Press
135Distributed Control Methods and Cyber Security Issues in MicrogridsWenchao Meng (editor), Xiaoyu Wang (editor), Shichao Liu (editor)2020Academic Press
136Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)2020Springer
137Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)Padmavathi Ganapathi (editor), D. Shanmugapriya (editor)2020Information Science Reference
138Security And Law: Legal And Ethical Aspects Of Public Security, Cyber Security And Critical Infrastructure SecurityAnton Vedder , Jessica Schroers , Charlotte Ducuing , Peggy Valcke2020Intersentia
139The Pocket Guide to Cyber SecurityH, James; D, Usha2020Usha D & James H
140Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security ThreatsKiser, Quinn2020
141Cyber Security Handbook: Protect Yourself Against Cyber CrimeGreenwood, W. Muse2020
142Cyber SecurityJocelyn O. Padallan2020Arcler Press
143First Line of Defense: The Beginners Book of Cyber SecurityNelson, Christopher2020
144The Cyber Security Network GuideFiedelholtz2020Springer
145Machine Learning Approaches in Cyber Security AnalyticsTony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel2020Springer
146Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAMRegner Sabillon2020
147Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020): 149 (Lecture Notes in Networks and Systems)Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar2020Springer Singapore
148Quantum Cryptography and the Future of Cyber SecurityNirbhay Kumar Chaubey, Bhavesh B. Prajapati2020Information Science Reference
149Automotive Cyber Security: Introduction, Challenges, and StandardizationShiho Kim, Rakesh Shrestha2020Springer Singapore;Springer
150Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected PapersSuresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar2020Springer Singapore;Springer
151Frontiers in Cyber Security: Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, ProceedingsGuangquan Xu, Kaitai Liang, Chunhua Su2020Springer Singapore;Springer
152Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part IXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang2020Springer International Publishing;Springer
153Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part IIXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang2020Springer International Publishing;Springer
154Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part IIIXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang2020Springer International Publishing;Springer
155Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, ProceedingsTouhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali2020Springer International Publishing;Springer
156Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, ProceedingsShlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss2020Springer International Publishing;Springer
157Real-Time and Retrospective Analyses of Cyber SecurityDavid Anthony Bird2020IGI Global
158Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Advances in Information Security, Privacy, and Ethics)Natalie Sjelin (editor)2020IGI Global
159The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacksAlan Calder2020IT Governance Publishing Ltd
160The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber AttacksAlan Calder2020IT Governance Ltd
161Cyber security A national priority of BangladeshMd. Shariful Islam2020Routledge
162Cyber Security Practitioner's GuideHamid Jahankhani (editor)2020WSPC
163Cyber Security Practitioner's GuideHamid Jahankhani (editor)2020WSPC
164Cyber Security Practitioner's GuideHamid Jahankhani (editor)2020WSPC
165Cyber Security ABCs: Delivering Awareness, Behaviours and Culture ChangeJessica Barker; Adrian Davis; Bruce Hallas; Ciarán Mc Mahon2020BCS, The Chartered Institute for IT
166Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected PapersHein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha2020Springer
167Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your CareerJessica Barker2020Kogan Page
168Handbook of Computer Networks and Cyber Security. Principles and ParadigmsBrij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta2020Springer
169Cyber Security Report 2020.coll.2020CPR
170Cyber Security: Essential Principles to Secure Your OrganisationAlan Calder; Archie (Male Synthesized Voice)2020IT Governance Ltd
171Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)Shishir K. Shandilya (editor), Neal Wagner (editor), Atulya K. Nagar (editor)2020Springer
172Cyber Security in India: Education, Research and Training (IITK Directions, 4)Sandeep Kumar Shukla (editor), Manindra Agrawal (editor)2020Springer
173The NICE Cyber Security Framework: Cyber Security ManagementIzzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh2020Springer
174Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147)Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)2020Springer
175Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146)Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)2020Springer
176Information and Cyber Security: 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Communications in Computer and Information Science, 1166)Hein Venter (editor), Marianne Loock (editor), Marijke Coetzee (editor), Mariki Eloff (editor), Jan Eloff (editor)2020Springer
177International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and IntelligenceJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman2019Springer International Publishing
178Social Network Forensics, Cyber Security, and Machine LearningP. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat2019Springer Singapore
179Advances in Cyber Security: Principles, Techniques, and ApplicationsKuan-Ching Li, Xiaofeng Chen, Willy Susilo2019Springer Singapore
180Cyber Security: Threats and Responses for Government and BusinessJack Caravelli, Nigel Jones2019Praeger Security International
181The NICE Cyber Security Framework: Cyber Security Intelligence and AnalyticsIzzat Alsmadi2019Springer International Publishing
182Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected PapersXiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou2019Springer Singapore
183Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, ProceedingsShlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung2019Springer International Publishing
184Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Third International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP)Yang Xu, Hong Xia, Feng Gao, Weihua Chen, Zheming Liu, Pengfei Gu2019Springer Singapore
185Computer and cyber security: principles, algorithm, applications, and perspectivesAgrawal, Dharma Prakash; Gupta, Brij; Wang, Haoxiang2019CRC Press
186Machine learning for computer and cyber security: principles, algorithms, and practicesGupta, Brij; Sheng, Quan Z2019CRC Press
187CyBok: The Cyber Security Body of KnowledgeAwais Rashid; Howard Chivers; George Danezis; Emil Lupu; Andrew Martin2019National Cyber Security Centre
188Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic SecurityErickson Karnel2019
189Deep Learning Applications for Cyber SecurityMamoun Alazab, MingJian Tang2019Springer International Publishing
190Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, ProceedingsXiaofeng Chen, Xinyi Huang, Jun Zhang2019Springer International Publishing
191Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber SecuritySushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman2019Springer International Publishing
192Science of Cyber Security: Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected PapersFeng Liu, Jia Xu, Shouhuai Xu, Moti Yung2019Springer International Publishing
193Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IAuhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki2019Springer International Publishing
194Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IIAuhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki2019Springer International Publishing
195Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, ProceedingsBazhong Shen, Baocang Wang, Jinguang Han, Yong Yu2019Springer Singapore
196Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTTounsi, Wiem2019ISTE
197Advances in Cyber Security: Principle, Techniques, and ApplicationsKuan-Ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor)2019Springer Verlag, Singapore
198Advances in Cyber Security: Principle, Techniques, and ApplicationsKuan-ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor)2019Springer-Nature New York Inc
199Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)Padmavathi Ganapathi (editor), D. Shanmugapriya (editor)2019Information Science Reference
200Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity FundamentalsZach Codings2019
201Computer and cyber security: principles, algorithm, applications, and perspectivesAgrawal, Dharma Prakash;Gupta, Brij;Wang, Harry Haoxiang2019CRC Press
202CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners)STEVEN, MICHAEL; STEVEN, MICHAEL2019
203Cyber Security comprehensive beginners guide to learn the basics and effective methods of cybersecurityWalker, Brian2019
204Cyber Security: Threats and Responses for Government and BusinessCaravelli, Jack;Jones, Nigel;Kozup, John C2019Praeger
205Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applicationsEl-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk2019Institution of Engineering and Technology
206Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case StudiesGia Nhu Nguyen; Dac-Nhuong Le; Raghvendra Kumar; Jyotir Moy Chatterjee; Manju Khari2019Wiley-Scrivener
207Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applicationsEl-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk2019The Institution of Engineering and Technology
208Cyber Security in Parallel and Distributed ComputingDacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee2019Scrivener Publishing
209Handbook of Computer Networks and Cyber Security: Principles and ParadigmsBrij B. Gupta; Gregorio Martinez Perez; Dharma P. Agrawal; Deepak Gupta2019Springer Nature
210How Cyber Security Can Protect Your Business : A Guide for All StakeholdersChristopher Wright; Archie (Male Synthesized Voice)2019IT Governance Ltd
211Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and BeyondMatt Reyes2019Independently Published
212Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and BeyondMatt Reyes2019Independently Published
213International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and IntelligenceJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.)2018Edizioni della Normale
214 Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantYang Xu,Feng Gao,Weihua Chen,Zheming Liu,Pengfei Gu (eds.)2018Springer Singapore
215 Cyber Security for Cyber Physical SystemsSaqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.)2018Springer International Publishing
216Cyber Security: Power and TechnologyMartti Lehto, Pekka Neittaanmäki2018Springer International Publishing
217Cyber Security Cryptography and Machine LearningItai Dinur, Shlomi Dolev, Sachin Lodha2018Springer International Publishing
218Cyber SecurityM. U. Bokhari, Namrata Agrawal, Dharmendra Saini2018Springer Singapore
219Science of Cyber Security: First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected PapersFeng Liu, Shouhuai Xu, Moti Yung2018Springer International Publishing
220From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th BirthdayPierangela Samarati, Indrajit Ray, Indrakshi Ray2018Springer International Publishing
221Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, ProceedingsGeetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan2018Springer Singapore
222Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, ProceedingsFagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang2018Springer Singapore
223Handbook Of Research On Information And Cyber Security In The Fourth Industrial RevolutionZiska Fields2018IGI Global/IRMA
224Hands-on Machine Learning for Cyber SecuritySoma Halder2018Packt Publishing
225Cyber security innovation for the digital economy : a case study of the Russian FederationSergei Petrenko2018
226Exploding Data: Reclaiming Our Cyber Security in the Digital AgeChertoff, Michael2018Grove Atlantic;Grove Press
227Exploding Data: Reclaiming Our Cyber Security in the Digital AgeChertoff, Michael2018Atlantic Monthly Press;Grove Atlantic; Grove/Atlantic, Incorporated
228GDPR and Cyber Security for Business Information SystemsAntoni Gobeo, Connor Fowler, William J. Buchanan2018River Publishers
229Cyber Security: Law and GuidanceHelen Wong (editor)2018Bloomsbury Professional
230Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks)Darren Quick, Kim-Kwang Raymond Choo2018Springer
231The GCHQ Puzzle Book II: From WWI ciphers to modern cyber security, pit your wits against 100 years of codebreaking geniusGCHQ2018Penguin Books Ltd
232Digital Cop: A Digital Cop's Guide to Cyber SecurityBaghla, Sahil;Soni, Arun2017;2015Notion Press
233Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical SystemsEdward Griffor2017Syngress
234Cyber Security. Simply. Make it HappenFerri Abolhassan (ed.)2017Springer
235Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and TechnologyNicholas J. Daras, Themistocles M. Rassias (eds.)2017Springer International Publishing
236Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, ProceedingsShlomi Dolev, Sachin Lodha (eds.)2017Springer International Publishing
237Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantYang Xu (eds.)2017Springer Singapore
238Research Methods for Cyber SecurityThomas Edgar and David Manz (Auth.)2017 Syngress
239Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security CenterMarshall Copeland (auth.)2017Apress
240Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and TechnologyNicholas J. Daras, Themistocles M. Rassias (eds.)2017Springer
241Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidentsGerard Johansen2017Packt Publishing
242Cyber security : A practitioner’s guideDavid Sutton2017Swindon, United Kingdom BCS, the Chartered Institute for IT
243Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidentsGerard Johansen2017Packt Publishing
244Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantXu, Yang2017Springer Singapore
245Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantXu, Yang2017Springer
246Cyber security engineering: a practical approach for systems and software assuranceMead, Nancy R.;Woody, Carol C2017Addison-Wesley
247Cyber security and policy : a substantive dialogueAnuradha Mathrani (editor); Julian Jang-Jaccard (editor); Andrew M. Colarik (editor)2017
248Industrial Cyber Security for Dummies.David Meltzer and Jeff Lund2017John Wiley & Sons, Inc.
249Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, ProceedingsShlomi Dolev; Sachin Lodha2017Springer
250International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government SectorsU. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation2017e-artnow
251Introduction to Cyber SecurityJeetendra Pande2017Uttarakhand Open University
252Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factorAndreas Von Grebmer2017Books on Demand
253Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.)2016Springer Singapore
254Cyber security for industrial control systems : from the viewpoint of close-loopChen, Jiming; Cheng, Peng; Zhang, Heng2016CRC Press
255Cyber Security Awareness for CEOs and ManagementDalziel, Henry; Willson, David2016Syngress is an imprint of Elsevier
256Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected PapersKristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.)2016Springer International Publishing
257Cyber Security Engineering A Practical Approach for Systems and Software AssuranceCarol Woody, Nancy R. Mead2016Addison-Wesley Professional
258Cyber Security Engineering: A Practical Approach for Systems and Software AssuranceNancy R. Mead, Carol Woody2016Addison-Wesley Professional
259Cyber Security: Everything an Executive Needs to KnowPhillip Ferraro2016Phillip J Ferraro LLC
260Essential Cyber Security HandbookNam Nguyen2016Nam Nguyen
261Cyber Security And The Politics Of TimeTim Stevens2016Cambridge University Press
262Cyber security for industrial control systems : from the viewpoint of close-loopPeng Cheng, Heng Zhang, Jiming Chen (eds.)2016CRC Press
263Cyber Security Cyber Attacks and Counter Measures: User Perspective (PGDCS-03)Nihar Ranjan Pande (ed.)2016Uttarakhand Open University
264A Human Readable Guide to Cyber SecurityDane Christian2015
265Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki2015Springer International Publishing
266Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
267Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
268Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki (eds.)2015Springer International Publishing
269Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. ProceedingsHamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.)2015Springer International Publishing
270Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2015Springer International Publishing
271Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmaki2015Springer
272A simpler guide to online security for everyone : how to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google servicesClark, Ceri2015Ceri Clark;Lycan Books
273A Human Readable Guide to Cyber SecurityChristian, Dane2015
274Cyber Security Incident Management GuideCentre For Cyber Security Belgium2015Centre For Cyber Security Belgium
275Cyber Security Awareness for Corporate Directors and Board MembersWillson, David; Dalziel, Henry2015Elsevier Science
276Cyber Security Awareness for LawyersDavid Willson, Henry Dalziel2015Syngress
277Cyber Security Awareness for Accountants and CPAsDavid Willson, Henry Dalziel2015Syngress
278Cyber Security Awareness for CEOs and ManagementDavid Willson, Henry Dalziel2015Syngress
279Finance: Cloud Computing, Cyber Security and Cyber Heist--Beginners Guide to Help Protect Against Online Theft in the Cyber WorldAlex Nkenchor Uwajeh2015Alex Nkenchor Uwajeh
280HACK-X-CRYPT: A Straight Forward Guide Towards Ethical Hacking and Cyber SecurityUjjwal Sahay2015Ujjwal Sahay
281Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013Anthony Bonato, Stephen Finbow, Przemys?aw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)2014Springer India
28210 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut, Daniel Bachrach2014Apress
28310 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and PrivacyDaniel G. Bachrach, Eric J. Rzeszut (auth.)2014Apress
284Bio-inspiring Cyber Security and Cloud Services: Trends and InnovationsAboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.)2014Springer-Verlag Berlin Heidelberg
285Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2014Springer International Publishing
286Cyber SecurityVoeller, John G.2014Wiley
287CANSO Cyber Security and Risk Assessment Guidecoll.2014Civil Air Navigation Services Organisation
28810 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyEric J. Rzeszut & Daniel G. Bachrach2014Friends of ED/Apress
28910 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut; Daniel Bachrach2014Apress
290Cyber security and IT infrastructure protectionVacca, John R2014Syngress
291Cyber Security and Resiliency Policy FrameworkA. Vaseashta; P. Susmann; E. Braman2014IOS Press, Incorporated
292Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
293Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
294Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp and Raj Samani (Auth.)2013Syngress
295Cyber Security: Deterrence and IT Protection for Critical InfrastructuresMaurizio Martellini2013Springer
296Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
297Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
298Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
299Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
300What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco2013CRC Press
301Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology PoliciesRichard Phillips, Rayton R. Sianjina2013Routledge
302Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
303Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
304Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
305Advances in Cyber Security : Technology, Operations, and ExperiencesD. Frank Hsu; Dorothy Marinucci2013Fordham University Press
306FISMA and the Risk Management Framework. The New Practice of Federal Cyber SecurityStephen D. Gantz and Daniel R. Philpott (Eds.)2012Syngress
307FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
308FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
309FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
310Cyber Security Policy GuidebookJennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss2012Wiley
311Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security ProfessionalsY. Anto2012LAP LAMBERT Academic Publishing
312Cyber Security Policy GuidebookJennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus H. Sachs; Jeffrey Schmidt2012John Wiley & Sons
313A System-Aware Cyber Security architectureRick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 229042011
314Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal PerspectivesWILEY INDIA2011Nina Godbole, Sunit Belapure, Kamlesh Bajaj
315Cyber Law and Cyber Security in Developing and Emerging EconomiesZeinab Karake Shalhoub, Lubna Al Qasimi2010
316Digital Security: Cyber Terror and Cyber Security (The Digital World)Ananda Mitra2010
317Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
318Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
319Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (AKenneth J. Knapp2009Information Science Reference
320Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science forU. Gori2009
321Insider Attack and Cyber Security. Beyond the HackerSalvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, 2008Springer
322Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information SeAnoop Singhal2006
323The Complete Cyber Security Course - Volume 1Nathan House0
324Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking ConceptsEthem Mining2019Independently published
325Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.)2016Springer Singapore
326A Human Readable Guide to Cyber SecurityDane Christian2015
327Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki2015Springer International Publishing
328Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
329Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
330Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki (eds.)2015Springer International Publishing
331Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. ProceedingsHamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.)2015Springer International Publishing
332Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2015Springer International Publishing
333Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013Anthony Bonato, Stephen Finbow, Przemys?aw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)2014Springer India
33410 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut, Daniel Bachrach2014Apress
33510 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and PrivacyDaniel G. Bachrach, Eric J. Rzeszut (auth.)2014Apress
336Bio-inspiring Cyber Security and Cloud Services: Trends and InnovationsAboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.)2014Springer-Verlag Berlin Heidelberg
337Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2014Springer International Publishing
338Cyber SecurityVoeller, John G.2014Wiley
339Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
340Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
341Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp and Raj Samani (Auth.)2013Syngress
342Cyber Security: Deterrence and IT Protection for Critical InfrastructuresMaurizio Martellini2013Springer
343Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
344Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
345Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
346Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
347What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco2013CRC Press
348Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology PoliciesRichard Phillips, Rayton R. Sianjina2013Routledge
349Cyber security policy guidebookJennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss2012Wiley
350FISMA and the Risk Management Framework. The New Practice of Federal Cyber SecurityStephen D. Gantz and Daniel R. Philpott (Eds.)2012Syngress
351FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
352FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
353FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
354Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard2011Auerbach Publications
355Cyber Security Essentials Rick Howard2011CRC Press
356Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Junaid Ahmed Zubairi, Athar Mahboob2011IGI Global snippet
357A System-Aware Cyber Security architectureRick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 229042011
358Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
359Cyber Security EssentialsRick Howard2010CRC Press
360Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard2010CRC Press
361Applied Cryptography for Cyber Security and Defense: Information Encryption and CypheringHamid R. Nemati2010IGI Global
362Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
363Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)Kenneth J. Knapp2009Information Science Reference
364Insider attack and cyber security : beyond the hackerSalvatore J Stolfo; et al2008Springer
365Data Warehousing and Data Mining Techniques for Cyber SecurityAnoop Singhal (auth.)2007Springer US
366Cyber SecurityCarter Michael.
367Cyber SecurityCarter Michael.
368Applied Cryptography for Cyber Security and Defense. Information Encryption and CypheringNemati H.R., Yang L.
369etc. Insider Attack and Cyber Security. Beyond the HackerStolfo S.J.
370Strategic Cyber SecurityGeers K.
371Cyber Security and Politically, Socially and Religiously Motivated Cyber AttacksCornish Paul.
372Global Cyber Security - Thinking About The Niche for NATOTikk Eneken.
373Cyber Security Education: Principles and PoliciesGreg Austin
374Handbook of Research on Multimedia Cyber SecurityGupta BrijInformation Science Reference
375Cyber Security: ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security PractitionersDavid White
376Connected Places: cyber security principles.National Cyber Security Centre
377How to get a job in cyber security earning six figuresLina Lau
378Cyber Security and Laws: by Ques10Ques10 Team
379Fundamentals of Cyber SecurityMayank Bhushan
380Cyber Security: Python for Penetration TestingTravis Czech
381From CIA to APT: An Introduction to Cyber SecurityAmoroso and Amoroso, Matthew Amoroso
382Practical Cyber Security for Extremely Busy People: Protect yourself, your family, and your career from online exploitationDaniel Farber Huang
383Computer Engineering:2 books in 1: Linux for Beginners+Cyber Security, How to Win with Cyberattacks and How to Use Linux Like a ProJohn Snowden
384CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT ITWaleed Umar
385CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT ITWaleed Umar
386Cyber Security Intelligence and AnalyticsZheng XuSpringer Nature
387Cyber Security Intelligence and AnalyticsZheng XuSpringer Nature
388Advance Cyber SecurityManmohan Singh, Priyanka Sharma, Rahul SharmaArcler Press
389Cyber security. The complete guide to cyber threats and protectionDavid Sutton
390Digital Transformation, Cyber Security and Resilience of Modern Societies (Studies in Big Data, 84)Todor Tagarev; Krassimir T. Atanassov; Vyacheslav Kharchenko; Janusz Kacprzyk

You cannot copy content of this page