-
Daniel Shoemaker, Ken Sig...
This book explains cybersecurity through a simple story r...
Daniel Shoemaker, Ken Sig...
This book explains cybersecurity through a simple story r...
Suhel Ahmad Khan, Rajeev ...
The textbook explores fundamental security theories that ...
Jessa Lingel
The internet has become a battleground.
Carey Parker
Beginning-Intermediate user level
-
Laurent Richard, Sandrine ...
Pegasus by Laurent Richard and Sandrine Rigaud investigat...
Mark Merkow
This book is written with a contemporary view on securing...
John Kiriakou
Have you ever thought you were being followed or watched?
Maria Tzanou
This book examines health and big data questions in light...
Antonio Argandona, Joy Ma...
The Home in the Digital Age is a set of multidisciplinary...
Kristin Lauter, Wei Dai, ...
This book summarizes recent inventions, provides guidelin...
Kui Ren, Cong Wang
This book comprehensively reviews searchable encryption, ...
Tony Thomas, Roopak Suren...
The popularity of Android mobile phones has attracted cyb...
Branden Williams, James A...
CI DSS is now in its 18th year and it is continuing to do...
Yuchao Zhang, Liang-Jie Z...
This book constitutes the proceedings of the 29th Interna...
Branden Williams, James A...
CI DSS is now in its 18th year and it is continuing to do...