Computer-Cyber Security & Cryptography
Theoretical Cybersecurity: Principl...
Theoretical Cybersecurity: Principles and Advanced Concepts..
Securing the Perimeter: Deploying I...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software..
Protective Security: Creating Milit...
Protective Security: Creating Military-Grade Defenses for Your Digital Business..
Practical Cryptography in Python: L...
Practical Cryptography in Python: Learning Correct Cryptography by Example..
Malware Analysis and Detection Engi...
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware..
IT Security Controls: A Guide to Co...
IT Security Controls: A Guide to Corporate Standards and Frameworks..
Internet of Nano Things and Wireles...
Internet of Nano Things and Wireless Body Area Networks..
Cybersecurity Incident Response: Ho...
Cybersecurity Incident Response: How to Contain Eradicate and Recover from Incidents..
Cybersecurity for Space: Protecting...
Cybersecurity for Space: Protecting the Final Frontier..
Beginning Ethical Hacking with Kali...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues..