Cyber Security

Posted by

List of Cyber Security Books

Sr. No.TitleAuthorYearPublisherQty
1Philosophy Of CybersecurityLukasz Olejnik, Artur Kurasinski2024CRC Press | Taylor & Francis Group
2Cybercrime And CybersecurityPaul A. Watters2024Routledge | Taylor & Francis Group
3Psychocybernetics 2024zeroual khalid2024khalid zeroual
4The Latest Developments and Challenges in Biomedical Engineering:Proceedings of the 23rd Polish Conference on Biocybernetics and Biomedical Engineering, Lodz, Poland, September 27–29, 2023Pawel Strumillo; Artur Klepaczko; Michal Strzelecki; Dorota Bociaga2024Springer Nature Switzerland
5Intelligent Techniques for Cyber-Physical SystemsMohammad Sajid, Anil Kumar Sagar, Jagendra Singh, Osamah Ibrahim Khalaf, Mukesh Prasad2024CRC Press
6Intelligent Approaches to Cyber SecurityNarendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli2024CRC Press
7Discovering Cybersecurity: A Technical Introduction for the Absolute BeginnerSeth James Nielson2024Apress
8Discovering Cybersecurity: A Technical Introduction for the Absolute BeginnerSeth James Nielson2024Apress
9CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003)Mya Heath2024McGraw Hill LLC
10The Business of Cyber: Why You Should Question What Your Security Team Are Telling YouPeter Fagan2024CRC Press
11Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud SecurityJit Sinha2024Orange Education Pvt Ltd, AVA™
12CC Certified in Cybersecurity Study Guide (Sybex Study Guide)Mike Chapple2024Sybex
13Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud SecurityJit Sinha2024Orange education pvt ltd
14Enterprise Cyber Risk Management as a Value Creator : Leverage Cybersecurity for Competitive AdvantageBob Chaput2024Apress
15Reconstructing Feminism Through Cyberfeminism (Studies in Critical Social Sciences, 275)Gzde Ersz (editor), Gkmen Kantar (editor), Meltem Ince Yenilmez (editor)2024Brill Academic Pub
16Ultimate Cyberwarfare for Evasive Cyber Tactics: Unravel the Techniques of Cyberwarfare, Hacktivism and Asymmetric Conflicts for Tactical Excellence with Real-world Use Cases and Strategic InsightsChang Tan2024Orange Education Pvt Ltd, AVA™
17Great Power Cyber Competition (Routledge Advances in Defence Studies)David V. Gioe (editor), Margaret W. Smith (editor)2024Routledge
18Great Power Cyber Competition (Routledge Advances in Defence Studies)David V. Gioe (editor), Margaret W. Smith (editor)2024Routledge
19Ultimate Cyberwarfare for Evasive Cyber TacticsChang Tan2024Orange education pvt ltd
20An Introduction to CyberpsychologyGráinne Kirwan, Irene Connolly, Hannah Barton, Marion Palmer2024Routledge
21Artificial Intelligence for Cyber Defense and Smart PolicingS Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand2024CRC Press
22Linux Hacking: A Beginner's Guide to Mastering CyberSecurity and Ethical Hacking with Linux Tools and TechniquesVERA POE2024Independently Published
23An Introduction to Cyberpsychology (BPS Core Textbooks Series)Gráinne Kirwan (editor), Irene Connolly (editor), Hannah Barton (editor), Marion Palmer (editor)2024Routledge
24The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity.M. A. Jabbar, Sanju Tiwari, Subhendu Kumar Pani, Stephen Huang2024CRC Press
25Introduction to Cybersecurity in the Internet of ThingsKeke Gai, Jing Yu, Liehuang Zhu2024CRC Press
26Cybernetics for the 21st Century Vol. 1: Epistemological Reconstruction (Philosophy, Art and Technology)Yuk Hui2024Hanart Press
27Advanced Product Management Series: CybersecurityAlex Cowan2024Cooke & McDouglas
28Cyber Defense Magazine - February 2024Cyber Defense Magazine2024Cyber Defense Magazine
29Beyond Digital Distraction: Educating Today's Cyber Student (Digital Education and Learning)Kurt C. Schuett2024Palgrave Macmillan
30Understanding Cybersecurity on Smartphones: Challenges, Strategies, and TrendsAndi Fitriah Abdul Kadir , Arash Habibi Lashkari , Mahdi Daghmehchi Firoozjaei2024Springer Cham
31Understanding Cybersecurity on Smartphones: Challenges, Strategies, and TrendsAndi Fitriah Abdul Kadir; Arash Habibi Lashkari; Mahdi Daghmehchi Firoozjaei2024Springer Cham
32Building Cybersecurity Applications with Blockchain and Smart ContractsNour El Madhoun, Ioanna Dionysiou, Emmanuel Bertin2024Springer Cham
33Building Cybersecurity Applications with Blockchain and Smart ContractsNour El Madhoun; Ioanna Dionysiou; Emmanuel Bertin2024Springer Cham
34Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023Hamid Jahankhani2024Springer
35Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023Hamid Jahankhani2024Springer
36The Cybernetic Border: Drones, Technology, and IntrusionIván Chaar López2024Duke University Press Books
37Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications)Reza Montasari2024Springer
38Ransomware and Cyber Extortion: Response and PreventionSherri Davidoff, Matt Durrin, Karen Sprenger2024Pearson
39Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised ... I (Lecture Notes in Computer Science, 14398)Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens-Boulahia (editor), Costas Lambrinoudakis (editor), Joaquin Garcia-Alfaro (editor), Guillermo Navarro-Arribas (editor), Pantaleone Nespoli (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor)2024Springer
40Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117)Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor)2024Springer
41Cognitive Computing and Cyber Physical Systems: 4th EAI International Conference, IC4S 2023, Bhimavaram, Andhra Pradesh, India, August 4-6, 2023, ProceedingsPrakash Pareek (editor), Nishu Gupta (editor), M. J. C. S. Reis (editor)2024Springer
42Cybercrime and Digital DevianceRoderick S. Graham, 'Shawn K. Smith2024Routledge
43Cognitive Computing and Cyber Physical Systems: 4th EAI International Conference, IC4S 2023, Bhimavaram, Andhra Pradesh, India, August 4-6, 2023, ... and Telecommunications Engineering)Prakash Pareek (editor), Nishu Gupta (editor), M. J. C. S. Reis (editor)2024Springer
44ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skillsClint Bodungen2024Packt Publishing Pvt Ltd
45Industrial Cyber-Physical Systems: Advancing Industry 4.0 from Vision to Application (Markt- und Unternehmensentwicklung Markets and Organisations)Sascha Julian Oks2024Springer Gabler
46Industrial Cyber-Physical Systems: Advancing Industry 4.0 from Vision to Application (Markt- und Unternehmensentwicklung Markets and Organisations)Sascha Julian Oks2024Springer Gabler
47Industrial Cyber-Physical Systems: Advancing Industry 4.0 from Vision to Application (Markt- und Unternehmensentwicklung Markets and Organisations)Sascha Julian Oks2024Springer Gabler
48The Cybersecurity Guide to Governance, Risk, and ComplianceJason Edwards, Griffin Weaver2024Wiley
49The Cybersecurity Guide to Governance, Risk, and ComplianceJason Edwards, Griffin Weaver2024Wiley
50Cybercrime and Digital DevianceGraham, Roderick S., Smith, 'Shawn K.2024Routledge
51ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skillsClint Bodungen2024Packt Publishing
52Ethical Hacking with Python: Developing Cybersecurity ToolsNate Phoetean2024Independently Published
53Understanding Mental Health Apps: An Applied Psychosocial Perspective (Palgrave Studies in Cyberpsychology)Lewis Goodings, Darren Ellis, Ian Tucker2024Palgrave Macmillan
54Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using NmapTravis DeForge2024Orange Education Pvt Ltd, AVA™
55The Cybersecurity Bible: [5 in 1] The All-In-One Guide to Detect, Prevent, and Manage Cyber Threats. Includes Hands-On Exercises to Become an Expert and Lead Your (First) Security TeamWorley, Rick C.2024Independently Published
56Cyber Resilience Act Requirements Standards MappingHernandez Ramos, J.L., Karopoulos, G., Nai Fovino, I., Spigolon, R., Sportiello, L., Steri, G., Gorniak, S., Magnabosco, P.2024Publications Office of the European Union
57Stepping Through Cybersecurity Risk Management: A Systems Thinking ApproachJennifer L. Bayuk2024Wiley
58Stepping Through Cybersecurity Risk Management : A Systems Thinking ApproachJennifer L. Bayuk2024Wiley
59Stepping Through Cybersecurity Risk Management: A Systems Thinking ApproachJennifer L. Bayuk2024Wiley
60Machine Learning for Cyber Physical System: Advances and ChallengesJanmenjoy Nayak, Bighnaraj Naik, Vimal S, Margarita Favorskaya2024Springer
61Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems)Bharat Bhushan (editor), Sudhir Kumar Sharma (editor), Parma Nand (editor), Achyut Shankar (editor)2024CRC Press
62Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2023; 03–04 July; University of ... Denmark (Springer Proceedings in Complexity)Cyril Onwubiko (editor), Pierangelo Rosati (editor), Aunshul Rege (editor), Arnau Erola (editor), Xavier Bellekens (editor), Hanan Hindy (editor), Martin Gilje Jaatun (editor)2024Springer
63Security and Privacy in Cyber-Physical Systems and Smart Vehicles: First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, ... and Telecommunications Engineering)Yu Chen (editor), Chung-Wei Lin (editor), Bo Chen (editor), Qi Zhu (editor)2024Springer
64Cybersecurity Mastery: Defeat Cyber Threats, Enhance Your Defense, and Overcome Vulnerability with Expert Strategies to Navigate with Confidence.Miller, Alan2024
65Proceedings of the 6th International Conference on Communications and Cyber Physical Engineering: ICCCE 2023; 28–29 April, Hyderabad, India (Lecture Notes in Electrical Engineering, 1096)Amit Kumar (editor), Stefan Mozar (editor)2024Springer
66Cyber Defense Magazine - April 2024Cyber Defense Magazine2024Cyber Defense Magazine
67Cyber Operations: A Case Study ApproachJerry M. Couretas2024Wiley
68Cyber Operations: A Case Study ApproachJerry M. Couretas2024Wiley
69Cyber Operations: A Case Study ApproachJerry M. Couretas2024Wiley
70Cybersecurity Career Roadmap 2024: Paving the Path to Cyber ExcellenceDan Williams2024Dan Williams
71Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat DetectionShilpa Mahajan; Mehak Khurana; Vania Vieira Estrela2024WILEY
72Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers (Communications in Computer and Information Science)Haomiao Yang (editor), Rongxing Lu (editor)2024Springer
73A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security programDebra Baker2024Packt Publishing
74A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security programDebra Baker2024Packt Publishing
75A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security programDebra Baker2024Packt Publishing
76Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architectureLester Nichols2024Packt Publishing
77Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architectureLester Nichols2024Packt Publishing
78The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital AgePeter Kestner2024Springer
79The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital AgePeter Kestner2024Springer
80The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital AgePeter Kestner2024Springer
81The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital AgePeter Kestner2024Springer Fachmedien Wiesbaden
82The Politics of Cyber-Security (International Studies Intensives)Myriam Dunn Cavelty2024Routledge
83The Politics of Cyber-Security (International Studies Intensives)Myriam Dunn Cavelty2024Routledge
84Social Engineering in Cybersecurity: Threats and DefensesGururaj H. L., Janhavi V., Ambika V.2024CRC Press
85The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital AgePeter Kestner2024Springer Fachmedien Wiesbaden
86Feminist CyberlawMeg Leta Jones (editor), Amanda Levendowski (editor)2024University of California Press
87Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity SuccessTyler Wall; Jarrett Rodrick2024Apress
88Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity SuccessTyler Wall; Jarrett Rodrick2024Apress
89Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity SuccessTyler Wall; Jarrett Rodrick2024Apress
90Critical Infrastructure Security: Cybersecurity lessons learned from real-world breachesSoledad Antelada Toledano2024Packt Publishing
91Critical Infrastructure Security: Cybersecurity lessons learned from real-world breachesSoledad Antelada Toledano2024Packt Publishing
92Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defenseShane Hartman2024Packt Publishing
93Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defenseShane Hartman2024Packt Publishing
94Cyber Sovereignty: The Future of Governance in CyberspaceLucie Kadlecová2024Stanford University Press
95Cyber Security and Business Analysis: An essential guide to secure and robust systemsBindu Channaveerappa2024BCS, The Chartered Institute for IT
96Cyber Security and Business Analysis: An essential guide to secure and robust systemsBindu Channaveerappa2024BCS, The Chartered Institute for IT
97Advanced Techniques and Applications of Cybersecurity and ForensicsKeshav Kaushik, Mariya Ouaissa, Aryan Chaudhary2024CRC Press
98Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tacticsMilad Aslaner2024Packt Publishing
99Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defenseShane Hartman2024Packt Publishing
100Critical Infrastructure Security: Cybersecurity lessons learned from real-world breachesSoledad Antelada Toledano2024Packt Publishing
101Ultimate Linux Network Security for Enterprises: Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services (English Edition)Adarsh Kant2024Orange Education Pvt Ltd
102Ultimate Linux Network Security for Enterprises: Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services (English Edition)Adarsh Kant2024Orange Education Pvt Ltd
103Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurityZhassulan Zhussupov2024Packt Publishing Pvt. Ltd.
104Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali LinuxKarl Lane2024Packt Publishing Pvt Ltd
105Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurityFrancisco Javier Santiago Vázquez2024Packt Publishing Pvt Ltd
106Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurityFrancisco Javier Santiago Vázquez2024Packt Publishing
107Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurityFrancisco Javier Santiago Vázquez2024Packt Publishing
108Mastering Cybersecurity: Strategies, Technologies, and Best PracticesJason Edwards2024Apress
109Mastering Cybersecurity: Strategies, Technologies, and Best PracticesJason Edwards2024Apress
110Mastering Cybersecurity: Strategies, Technologies, and Best PracticesJason Edwards2024Apress
111Cybernetics and the Constructed Environment: Design Between Nature and TechnologyZihao Zhang2024Routledge
112Cybernetics and the Constructed Environment: Design Between Nature and TechnologyZihao Zhang2024Routledge
113Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing)Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor)2024CRC Press
114Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing)Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor)2024CRC Press
115Malware Development for Ethical Hackers: Learn How to Develop Various Types of Malware to Strengthen CybersecurityZhassulan Zhussupov2024Packt Publishing
116The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital AgePeter Kestner2024Springer Nature
117Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient DefenceRong Su2024CRC Press
118Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient DefenceRong Su2024CRC Press
119Ethical Hacking: Understanding the basics of Hacking Tools and Techniques for Cybersecurity and Safeguarding Information in computer systems and computer networksLewis Finan2024Independently Published
120Secure and Smart Cyber-Physical SystemsUttam Ghosh (editor), Fortune Mhlanga (editor), Danda B Rawat (editor)2024CRC Press
121Cybersecurity for Space: A Guide to Foundations and ChallengesJacob G. Oakley2024Apress
122Cybersecurity for Space: A Guide to Foundations and ChallengesJacob G. Oakley2024Apress
123Cybersecurity for Space: A Guide to Foundations and ChallengesJacob G. Oakley2024Apress
124Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts)Ravindra Das2024CRC Press
125Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts)Ravindra Das2024CRC Press
126Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts)Ravindra Das2024CRC Press
127Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts)Ravindra Das2024CRC Press
128The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamicAkash Mukherjee2024Packt Publishing Pvt Ltd
129Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOpsJohn Sotiropoulos2024Packt Publishing
130Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee2024Springer; Third Edition 2024
131Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee2024Springer; Third Edition 2024
132Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat DetectionShilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor)2024Wiley
133Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat DetectionShilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor)2024Wiley
134Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven MethodsAshish Mishra2023BPB Publications
135Cyber InvestigationsAndré Årnes (editor)2023Wiley
136Cyber Investigations: A Research Based Introduction for Advanced StudiesAndré Årnes2023Wiley
137Cyber Infrastructure for the Smart Electric GridAnurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser2023Wiley-IEEE Press
138Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional ClassroomDaniel Shoemaker, Ken Sigler, Tamara Shoemaker2023CRC Press
139Cyber Physical Systems: Concepts and ApplicationsAnupam Baliyan, Kuldeep Singh Kaswan, Naresh Kumar, Kamal Upreti, Ramani Kannan2023CRC Press/Chapman & Hall
140Cybersecurity All-in-One For DummiesJoseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs2023For Dummies
141Cyber Physical Systems. Concepts and ApplicationsAnupam Baliyan, Kuldeep Singh Kaswan, Naresh Kumar, Kamal Upreti, and Ramani Kannan2023CRC Press
142Teaching Cybersecurity. A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional ClassroomDaniel Shoemaker, Ken Sigler, Tamara Shoemaker2023CRC Press
143Collaborative Approaches for Cyber Security in Cyber-Physical SystemsTheo Dimitrakos, Javier Lopez, Fabio Martinelli2023Springer
144Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National CybersecurityReza Montasari2023Springer
145The Sharing Economy for Tackling Cybercrime: Uberization of Public-Private PartnershipsEthem Ilbiz, Christian Kaunert2023Springer
146Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategiesDwayne Natwick2023Packt Publishing
147Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategiesDwayne Natwick2023Packt Publishing
148Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022Hamid Jahankhani2023Springer
149Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022 Matsue, Japan, August 10–12, 2022 Revised Selected PapersChunhua Su, Kouichi Sakurai2023Springer
150Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, ProceedingsAbderrahmane Nitaj, Karim Zkik2023Springer
151Artificial Intelligence and Cybersecurity. Theory and ApplicationsTuomo Sipola, Tero Kokkonen, Mika Karjalainen2023Springer
152Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrimeNearchos Nearchou2023
153Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and TrendsGurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari2023Springer
154Machine Learning for Cyber Security2023Springer International Publishing
155Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail UsEugene H. Spafford; Leigh Metcalf; Josiah Dykstra2023Addison-Wesley Professional
156Machine Learning for Cyber Security2023Springer International Publishing
157Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security, 101)Reza Montasari2023Springer
158Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security, 101)Reza Montasari2023Springer
159Cyber-Physical Systems and Control IIDmitry G. Arseniev, Nabil Aouf2023Springer
160Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part IIIYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
161Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part IIYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
162Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part IYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
163Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organizationTim Rains2023Packt Publishing
164Intelligent Cyber Physical Systems and Internet of Things: ICoICI 2022Jude Hemanth, Danilo Pelusi, Joy Iong-Zong Chen2023Springer
165Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry: A Comparative Study within the G-20Felix I. Lessambo2023Palgrave Macmillan
166Cyber-Physical Systems for Industrial Transformation: Fundamentals, Standards, and ProtocolsGunasekaran Manogaran; Nour Eldeen Mahmoud Khalifa; Mohamed Loey; Mohamed Hamed N. Taha2023CRC Press
167Power Systems Cybersecurity: Methods, Concepts, and Best PracticesHassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong2023Springer
168Intelligent Edge Computing for Cyber Physical ApplicationsD. Jude Hemanth, B. B. Gupta, Mohamed Elhoseny, Swati Vijay Shinde2023Academic Press
1695G Cyber Risks and MitigationSabhyata Soni2023CRC Press
170Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 Copenhagen, Denmark, September 26–30, 2022 Revised Selected PapersSokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla2023Springer
171Computer Security. ESORICS 2022 International Workshops. CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 Copenhagen, Denmark, September 26–30, 2022 Revised Selected PapersSokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla2023Springer
172Understanding Cybersecurity Management in Decentralized Finance. Challenges, Strategies, and TrendsGurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari2023Springer
173Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 ProceedingsYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
174Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 ProceedingsYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
175Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part IYuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li2023Springer
176Cyber Security Applications for Industry 4.0R Sujatha, G Prakash, Noor Zaman Jhanjhi2023CRC Press
177Kids Cybersecurity Using Computational Intelligence TechniquesWael Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara2023Springer
178Artificial Intelligence for Cyber-Physical Systems HardeningIssa Traore, Isaac Woungang, Sherif Saad2023Springer
179International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta2023Springer
180Mastering Linux Security And Hardening: A Practical Guide To Protecting Your Linux System From Cyber AttacksDonald A. Tevault2023Packt Publishing
181Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacksDonald A. Tevault2023Packt Publishing
182Cybertax: Managing the Risks and ResultsGeorge K.Tsantes, James F. Ransome2023CRC Press/Auerbach
183Cyber Deception: Techniques, Strategies, and Human AspectsTiffany Bao, MilindTambe, Cliff Wang2023Springer
184We Are All Targets: How Renegade Hackers Invented Cyber War and Unleashed an Age of Global ChaosMatt Potter2023Hachette Books
185Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, IndiaAmit Kumar, Stefan Mozar, Jan Haase2023Springer
186Cyber Deception: Techniques, Strategies, and Human AspectsTiffany Bao, Milind Tambe, Cliff Wang2023Springer
187Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; WalesCyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun2023Springer
188Big Data Analytics and Intelligent Systems for Cyber Threat IntelligenceYassine Maleh (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor)2023River Publishers
189Understanding Cyber-Warfare Politics, Policy And StrategyChristopher Whyte, Brian Mazanec2023Routledge | Taylor & Francis Group
190Computational Intelligence for Cybersecurity Management and ApplicationsYassine Maleh (editor), Mamoun Alazab (editor), Soufyane Mounir (editor)2023CRC Press
191Cybersecurity in Transport Systems (Transportation)Martin Hawley2023The Institution of Engineering and Technology
192Cognitive Computing and Cyber Physical Systems: Third EAI International Conference, IC4S 2022, Virtual Event, November 26-27, 2022, ProceedingsNishu Gupta, Prakash Pareek, M.J.C.S. Reis2023Springer
193Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang2023Springer
194Cybersecurity for Smart Cities: Practices and ChallengesMohiuddin Ahmed, Paul Haskell-Dowland2023Springer
195Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2: BDCPS 2022, December 16–17, Bangkok, ThailandMohammed Atiquzzaman, Neil Yuwen Yen, Zheng Xu2023Springer
196Cognitive Computing and Cyber Physical Systems. Third EAI International Conference, IC4S 2022 Virtual Event, November 26–27, 2022 ProceedingsNishu Gupta, Prakash Pareek, M. J. C. S. Reis2023Springer
197Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic TechnologiesKutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat2023Springer
198How to Measure Anything in Cybersecurity RiskDouglas W.Hubbard; RICHARD SEIERSEN2023Wiley
199Machine Learning Techniques for CybersecurityElisa Bertino; Sonam Bhardwaj; Fabrizio Cicala; Sishuai Gong; Imtiaz Karim; Charalampos Katsis; Hyunwoo Lee; Adrian Shuai Li; Ashraf Y. Mahgoub2023Springer International Publishing
200Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang2023Springer
201Machine Learning Techniques for CybersecurityElisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub2023Springer
202Escalation Dynamics in CyberspaceErica D. Lonergan, Shawn W. Lonergan2023Oxford University Press
203Cyber Threat IntelligenceMartin Lee2023Wiley
204How to Measure Anything in Cybersecurity RiskDouglas W. Hubbard, Richard Seiersen2023Wiley
205Advances in Cognitive Science and Communications. Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, IndiaAmit Kumar, Stefan Mozar, Jan Haase2023Springer
206The NICE Cyber Security Framework: Cyber Security Intelligence and AnalyticsIzzat Alsmadi2023Springer
207Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best PracticesDietmar P. F. Möller2023Springer
208MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100Kathiravan Udayakumar; Puthiyavan Udayakumar2023John Wiley & Sons, Inc.
209Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best PracticesDietmar P.F. Möller2023Springer
210MCE Microsoft ® Certified Expert Cybersecurity Architect Study Guide. Exam SC- 100Kathiravan Udayakumar, Puthiyavan Udayakumar2023Sybex
211Blockchain for Cybersecurity in Cyber-Physical SystemsYassine Maleh, Mamoun Alazab, Imed Romdhani2023Springer
212Online Harms and Cybertrauma: Legal and Harmful Issues with Children and Young PeopleCatherine Knibbs2023Routledge
213Cybercrime in Social Media: Theory and SolutionsPradeep Kumar Roy, Asis Kumar Tripathy2023CRC Press/Chapman & Hall
214Cyber Laundering: International Policies And PracticesNathalie Rebe2023World Scientific
215Regulating Cyber Technologies: Privacy Vs SecurityNathalie Rébé2023World Scientific
216Handbook of Research on Cybersecurity Risk in Contemporary Business SystemsFestus Fatai Adedoyin, Bryan Christiansen2023IGI Global
217Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman2023Springer
218Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman2023Springer
219Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)Michael Roytman and Ed Bellis2023Artech House
220Cyberbiosecurity: A New Field to Deal with Emerging ThreatsDov Greenbaum (editor)2023Springer
221Cyberbiosecurity: A New Field to Deal with Emerging ThreatsDov Greenbaum (editor)2023Springer
222Cybersecurity Teaching in Higher EducationLeslie F. Sikos (editor), Paul Haskell-Dowland (editor)2023Springer
223Cybersecurity Teaching in Higher EducationLeslie F. Sikos (editor), Paul Haskell-Dowland (editor)2023Springer
224Cybersecurity, Privacy and Data Protection in EU Law: A Law, Policy and Technology AnalysisMaria Grazia Porcedda2023Bloomsbury Publishing
225Cyberdemocracy: Transforming PoliticsHarem Karem2023Palgrave Macmillan
226Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organizationKunal Sehgal, Nikolaos Thymianis2023Packt Publishing
227Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organizationKunal Sehgal, Nikolaos Thymianis2023Packt Publishing
228Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics)Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla2023River Publishers
229Cybersecurity for Decision MakersNarasimha Rao Vajjhala (editor), Kenneth David Strang (editor)2023CRC Press
230Plunkett’s Cybersecurity, Digital ID & Online Fraud Industry Almanac 2023: Cybersecurity, Digital ID & Online Fraud Industry Market Research, Statistics, Trends and Leading Companies2023Plunkett Research, Ltd.
231Cognitive Dependability Engineering: Managing Risks in Cyber-Physical-Social Systems under Deep UncertaintyLech Bukowski2023CRC Press/Science Publishers
232Research Techniques for Computer Science, Information Systems and CybersecurityUche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor2023Springer
233Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (2nd Early Release)Kim Crawley2023O'Reilly Media, Inc.
234Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 1: BDCPS 2022, December 16-17, Bangkok, ThailandMohammed Atiquzzaman, Neil Yen, Zheng Xu2023Springer
23510 Machine Learning Blueprints You Should Know for CybersecurityRajvardhan Oak2023Packt Publishing
236The NICE Cyber Security Framework. Cyber Security Intelligence and AnalyticsIzzat Alsmadi2023Springer
237Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive GuideAlexander Kott2023Springer
238Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive GuideAlexander Kott2023Springer International Publishing
239Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum CryptographyOm Pal; Vinod Kumar; Rijwan Khan; Bashir Alam; Mansaf Alam2023
240Balkan Cyberia: Cold War Computing, Bulgarian Modernization, and the Information Age behind the Iron CurtainVictor Petrov2023The MIT Press
241Balkan Cyberia: Cold War Computing, Bulgarian Modernization, And The Information Age Behind The Iron CurtainVictor Petrov2023The MIT Press
242Cybercrime in the Pandemic Digital Age and BeyondRussell G. Smith; Rick Sarre; Lennon Yao-Chung Chang; Laurie Yiu-Chung Lau2023Springer Nature
243Cyberdemocracy: Transforming PoliticsHarem Karem2023Springer Nature
244Artificial Intelligence and Cyber Security in Industry 4.0Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi2023Springer
245Modern Vulnerability Management. Predictive CybersecurityMichael Roytman, Ed Bellis2023Artech House
246Modern Vulnerability Management. Predictive CybersecurityMichael Roytman2023Artech House
247Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release)Kim Crawley2023O'Reilly Media, Inc.
248Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2023Apress
249Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2023Apress
250Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2023Apress
251Cybersecurity First Principles: A Reboot of Strategy and TacticsRick Howard2023Wiley
25210 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniquesRajvardhan Oak2023Packt Publishing
25310 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniquesRajvardhan Oak2023Packt Publishing
25410 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniquesRajvardhan Oak2023Packt Publishing
255Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2023Apress
256Cyber Threat IntelligenceMartin Lee2023Wiley
257Cyber Threat IntelligenceMartin Lee2023Wiley
258Technological Innovation for Connected Cyber Physical Spaces: 14th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2023 Caparica, Portugal, July 5–7, 2023 ProceedingsLuis M. Camarinha-Matos Filipa Ferrada2023Springer-IFIP
259Cybersecurity First Principles: A Reboot of Strategy and TacticsRick Howard2023Wiley
260Cybersecurity First Principles: A Reboot of Strategy and TacticsRick Howard2023Wiley
261Parallel Population and Parallel Human: A Cyber-Physical Social ApproachPeijun Ye, Fei-Yue Wang2023Wiley-IEEE Press
262Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity programJason Brown2023Packt Publishing
263Cyber-Physical-Human Systems: Fundamentals and ApplicationsAnuradha M. Annaswamy, Pramod P. Khargonekar, Françoise Lamnabhi-Lagarrigue, Sarah K. Spurgeon2023Wiley-IEEE Press
264Counterintelligence in a Cyber WorldPaul A. Watters2023Springer
265Smart Grid Resilience: Extreme Weather, Cyber-Physical Security, and System InterdependencyJunjian Qi2023Springer
266CC Certified in Cybersecurity All-in-One Exam GuideJordan Genung, Steven Bennett2023McGraw Hill
267Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security: IC4S 2022Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou2023Springer
268Building a Career in Cybersecurity: The Strategy and Skills You Need to SucceedYuri Diogenes2023Addison-Wesley
269A History of Cyber Literary Criticism in ChinaOuyang Youquan2023Routledge
270Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership)Anuradha M. Annaswamy (editor), Pramod P. Khargonekar (editor), Francoise Lamnabhi-Lagarrigue (editor), Sarah K. Spurgeon (editor)2023Wiley-IEEE Press
271Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership)Anuradha M. Annaswamy (editor), Pramod P. Khargonekar (editor), Francoise Lamnabhi-Lagarrigue (editor), Sarah K. Spurgeon (editor)2023Wiley-IEEE Press
272Vision, Technology, And Subjectivity In Mexican Cyberpunk LiteratureStephen C. Tobin2023Palgrave Macmillan
273Cybercrime During the SARS-CoV-2 Pandemic: Evolutions, Adaptations, ConsequencesDaniel Ventre, Hugo Loiseau2023Wiley-ISTE
274HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023 Held as Part of the 25th HCI International Conference, HCII 2023 Copenhagen, Denmark, July 23–28, 2023 ProceedingsAbbas Moallem2023Springer
275Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectivelyAshish M Kothekar2023Packt Publishing
276Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectivelyAshish M Kothekar2023Packt Publishing
277Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectivelyAshish M Kothekar2023Packt Publishing
278Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFAMarco Fanti2023Packt Publishing
279Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFAMarco Fanti2023Packt Publishing
280Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFAMarco Fanti2023Packt Publishing
281Networks and Systems in Cybernetics: Proceedings of 12th Computer Science On-line Conference 2023, Volume 2Radek Silhavy, Petr Silhavy2023Springer
282Output Regulation and Cybersecurity of Networked Switched SystemsLili Li, Jun Fu2023Springer
283Building a Career in Cybersecurity: The Strategy and Skills You Need to SucceedYuri Diogenes2023Addison-Wesley
284Cybersecurity: A Technology Landscape Analysis (Applied Innovation and Technology Management)Tugrul U Daim (editor), Marina Dabic (editor)2023Springer
285Cybersecurity: A Technology Landscape Analysis (Applied Innovation and Technology Management)Tugrul U Daim (editor), Marina Dabic (editor)2023Springer
286Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions GuideJody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu2023Apress
287WordPress Security Secrets Revealed: A Cybersecurity Consultant’s Guide to Stop Hackers on WordPress Websites that Power almost Half of the InternetSahil B.2023Notion Press
288Cybersecurity First Principles: A Reboot of Strategy and TacticsRick Howard2023Wiley
289Cyber Threat IntelligenceMartin Lee2023Wiley
290Artificial Intelligence and Cyber Security in Industry 4.0Velliangiri Sarveshwaran; Joy Iong-Zong Chen; Danilo Pelusi2023Springer Nature
291Cyber Deception: Techniques, Strategies, and Human AspectsTiffany Bao; Milind Tambe; Cliff Wang2023Springer Nature
292Advances in Cybersecurity, Cybercrimes, and Smart Emerging TechnologiesAhmed A. Abd El-Latif; Yassine Maleh; Wojciech Mazurczyk; Mohammed ELAffendi; Mohamed I. Alkanhal2023Springer Nature
293Counterintelligence in a Cyber WorldPaul A. Watters2023Springer Nature
294Intelligent Safety: How to Protect Your Connected Family from Big CybercrimeHari Ravichandran2023Skyhorse
295Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best PracticesDietmar P.F. Möller2023Springer Nature
296Cybersecurity for Smart Cities: Practices and ChallengesMohiuddin Ahmed; Paul Haskell-Dowland2023Springer Nature
297Research Techniques for Computer Science, Information Systems and CybersecurityUche M. Mbanaso; Lucienne Abrahams; Kennedy Chinedu Okafor2023Springer Nature
298Cybersecurity All-In-One for DummiesJoseph Steinberg; Kevin Beaver; Ira Winkler; Ted Coombs2023For Dummies
299Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1Jemal H. Abawajy; Zheng Xu; Mohammed Atiquzzaman; Xiaolu Zhang2023Springer Nature
300Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; WalesCyril Onwubiko; Pierangelo Rosati; Aunshul Rege; Arnau Erola; Xavier Bellekens; Hanan Hindy; Martin Gilje Jaatun2023Springer Nature
301The Sharing Economy for Tackling CybercrimeEthem Ilbiz; Christian Kaunert2023Springer Nature
302Collaborative Approaches for Cyber Security in Cyber-Physical SystemsTheo Dimitrakos; Javier Lopez; Fabio Martinelli2023Springer Nature
303Intelligent Cyber Physical Systems and Internet of Things: ICoICI 2022Jude Hemanth; Danilo Pelusi; Joy Iong-Zong Chen2023Springer Nature
304Kids Cybersecurity Using Computational Intelligence TechniquesWael M. S. Yafooz; Hussain Al-Aqrabi; Arafat Al-Dhaqm; Abdelhamid Emara2023Springer Nature
305Vision, Technology, and Subjectivity in Mexican Cyberpunk LiteratureStephen C. Tobin2023Springer Nature
306Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic TechnologiesKutub Thakur; Al-Sakib Khan Pathan; Sadia Ismat2023Springer Nature
307The NICE Cyber Security Framework: Cyber Security Intelligence and AnalyticsIzzat Alsmadi2023Springer Nature
308Cognitive Computing and Cyber Physical Systems: Third EAI International Conference, IC4S 2022, Virtual Event, November 26-27, 2022, ProceedingsNishu Gupta; Prakash Pareek; M.J.C.S. Reis2023Springer Nature
309Technological Innovation for Connected Cyber Physical Spaces: 14th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2023, Caparica, Portugal, July 5–7, 2023, ProceedingsLuis M. Camarinha-Matos; Filipa Ferrada2023Springer Nature
310Power Systems Cybersecurity: Methods, Concepts, and Best PracticesHassan Haes Alhelou; Nikos Hatziargyriou; Zhao Yang Dong2023Springer Nature
311Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, ProceedingsAbderrahmane Nitaj; Karim Zkik2023Springer Nature
312Blockchain for Cybersecurity in Cyber-Physical SystemsYassine Maleh; Mamoun Alazab; Imed Romdhani2023Springer Nature
313Mobilizing the C-Suite: Waging War Against CyberattacksFrank Riccardi2023Business Expert Press
314Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected PapersChunhua Su; Kouichi Sakurai2023Springer Nature
315Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022Hamid Jahankhani2023Springer Nature
316Dancho Danchev's Cyber Intelligence Cybercrime Research Memoir Second EditionDancho Danchev2023Dancho Danchev
317How to Be OT Cybersecurity Professional [Team-IRA]Alqurashi, Nebras;2023Austin Macauley Publishers
318Cyber-Physical Systems Engineering and ControlAlla G. Kravets, Alexander A. Bolshakov, Maxim V Shcherbakov2023Springer
319Cyberspace and InstabilityRobert Chesney (editor); James Shires (editor); Max Smeets (editor)2023Edinburgh University Press
320What Is Cybersecurity For?Tim Stevens2023Bristol University Press
321Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on CybersecuritySatya Prakash Yadav (editor); Raghuraj Singh (editor); Vibhash Yadav (editor); Fadi Al-Turjman (editor); Swarn Avinash Kumar (editor)2023De Gruyter
322Cyber Guardians: Empowering Board Members for Effective CybersecurityBart R. McDonough2023Wiley
323Advancements in Cybercrime Investigation and Digital ForensicsA. Harisha & Amarnath Mishra & Chandra Singh2023CRC Press
324Hacking and Security: The Comprehensive Guide to Penetration Testing and CybersecurityKofler, Michael; Gebeshuber, Klaus;Kloep, Peter;Neugebauer, Frank; Zingsheim, Andr?;Hackner, Thomas;Widl, Markus;Aigner, Roland;Kania, Stefan; Scheible, Tobias;2023Rheinwerk Publishing Inc.
325Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications)Hamid Jahankhani (editor), Ayman El Hajjar (editor)2023Springer
326Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications)Hamid Jahankhani (editor), Ayman El Hajjar (editor)2023Springer
327Evolution of the Cyber Domain: The Implications for National and Global SecurityEneken Tikk-Ringas2023Taylor & Francis
328New Age Cyber Threat Mitigation for Cloud Computing NetworksAkashdeep Bhardwaj2023Bentham Science Publishers
329New Age Cyber Threat Mitigation for Cloud Computing NetworksAkashdeep Bhardwaj2023Bentham Science Publishers
330New Age Cyber Threat Mitigation for Cloud Computing NetworksAkashdeep Bhardwaj2023Bentham Science Publishers
331Cybersecurity for EntrepreneursGloria D'Anna, Zachary A Collier2023SAE International
332Cybersecurity for EntrepreneursGloria D'Anna, Zachary A Collier2023SAE International
333Cybersecurity for EntrepreneursGloria D'Anna, Zachary A Collier2023SAE International
334Battlefield Cyber: How China and Russia are Undermining Our Democracy and National SecurityWilliam J Holstein, Michael McLaughlin2023Prometheus
3351000 Facts about the Greatest Video Games: A Pixelated Journey from Pong to CyberpunkDaniel Scott2023
336Building a Cyber Risk Management ProgramBrian Allen, Brandon Bapst, and Terry Allan Hicks2023O'Reilly Media, Inc.
337Building a Cyber Risk Management ProgramBrian Allen, Brandon Bapst, and Terry Allan Hicks2023O'Reilly Media, Inc.
338Cyber Resilience in Critical InfrastructureSinan Küfeoglu, Abdullah Talip Akgün2023CRC Press
339The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security IndustryAlon Arvatz2023Wiley
340The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security IndustryAlon Arvatz2023Wiley
341The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security IndustryAlon Arvatz2023Wiley
342Cyber Resilience in Critical InfrastructureSinan Kufeoglu, Abdullah Talip Akgun2023
343Intelligent Approaches to Cyber SecurityNarendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas2023CRC Press
344Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure ServicesPuthiyavan Udayakumar2023Apress
345Target Tehran - How Israel Is Using Sabotage, Cyberwarfare, Assassination – and Secret Diplomacy – to Stop a Nuclear Iran and Create a New Middle EastYonah Jeremy Bob; Ilan Evyatar2023Simon & Schuster
346Cyber Threat IntelligenceMartin Lee2023Wiley
347Israel and the Cyber ThreatCharles D. Freilich, Matthew S. Cohen and Gabi Siboni2023Oxford University Press
348Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber PowerCharles D. Freilich, Matthew S. Cohen, Gabi Siboni2023Oxford University Press
349Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber PowerCharles D. Freilich; Matthew S. Cohen; Gabi Siboni2023Oxford University Press
350Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security DeploymentRichie Miller2023Independently published
351Cyber Guardians : Empowering Board Members for Effective CybersecurityBart R. McDonough2023Wiley
352Artificial Intelligence & Blockchain in Cyber Physical Systems: Technologies & ApplicationsMuhammad Arif, Valentina Emilia Balas, Tabrez Nafis, Nawab Muhammad Faseeh Qureshi, Samar Wazir, Ibrar Hussain2023CRC Press
353IEEE Systems, Man, & Cybernetics Magazine2023
354Confident Cyber Security: The Essential Insights and How to Protect from ThreatsJessica Barker2023Kogan Page
355Introduction To Cybersecurity: A Multidisciplinary ChallengeRobin Sharp2023Springer
356Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail UsEugene H. Spafford, Leigh Metcalf and Josih Dykstra2023Addison-Wesley Professional
357Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail UsEugene H. Spafford, Leigh Metcalf; Josih Dykstra2023Addison-Wesley Professional
358Automotive Cybersecurity Engineering Handbook: The automotive engineer's roadmap to cyber-resilient vehiclesDr. Ahmad MK Nasser2023Packt Publishing Pvt Ltd
359Cybersecurity All-in-One For DummiesJoseph Steinberg; Kevin Beaver; Ted Coombs; Ira Winkler2023
360Escalation Dynamics in CyberspaceErica D. Lonergan;Shawn W. Lonergan;2023Oxford University Press USA
361Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11)Dr Jessica Barker2023Kogan Page
362Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11)Dr Jessica Barker2023Kogan Page
363The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurityCesar Bravo, Desilda Toska2023Packt Publishing Pvt Ltd
364Wireless Communication for CybersecurityS. Sountharrajan; R. Maheswar Geetanjali; Rathee; M. Akila2023Wiley
365Artificial Intelligence for Biometrics and Cybersecurity: Technology and applicationsAhmed A. Abd El-Latif, Mohammed Adel Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk2023The Institution of Engineering and Technology
366Cybernetic Aesthetics: Modernist Networks of Information and DataHeather A. Love2023Cambridge University Press
367Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurityRishalin Pillay, Mohammed Abutheraa2023Packt Publishing
368Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniquesMUHIBULLAH. MOHAMMED2023Packt
369Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023Hind Zantout; Hani Ragab Hassen2023Springer Nature Switzerland
370Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023Hind Zantout; Hani Ragab Hassen2023Springer Nature Switzerland
371Cyber Malware : Offensive and Defensive SystemsIman Almomani; Leandros A. Maglaras; Mohamed Amine Ferrag; Nick Ayres2023Springer International Publishing
372Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects, 2nd EdDiana Kelley?, Ed Moyle2023Packt Publishing Pvt Ltd
373Wireless Communication in Cyber SecurityS. Sountharrajan (editor), R. Maheswar (editor), Geetanjali Rathee (editor), M. Akila (editor)2023Wiley-Scrivener
374Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architectsDiana Kelley, Ed Moyle2023Packt Publishing
375How to Measure Anything in Cybersecurity RiskDouglas W. Hubbard; RICHARD SEIERSEN2023Wiley
376Cyber Security for Next-Generation Computing TechnologiesInam Ullah Khan2023CRC Press
377Self-Powered Cyber Physical SystemsRathishchandra R. Gatti, Chandra Singh, Rajeev Agrawal, Felcy Jyothi Serrao2023Scrivener Publishing, Wiley Blackwell
378Cyberspace and InstabilityRobert Chesney, James Shires, Max Smeets2023Edinburgh University Press
379Deploying the Zero Trust Framework in MSFT Azure (Cyber Shorts)Ravindra Das2023CRC Press
380Deploying the Zero Trust Framework in MSFT Azure (Cyber Shorts)Ravindra Das2023CRC Press
381Combatting Cyberbullying in Digital Media with Artificial IntelligenceMohamed Lahby (editor), Al-Sakib Khan Pathan (editor), Yassine Maleh (editor)2023Chapman and Hall/CRC
382Discovering Cybersecurity: A Technical Introduction For The Absolute BeginnerSeth James Nielson2023Apress
383Smart Grid Resilience: Extreme Weather, Cyber-Physical Security, and System InterdependencyJunjian Qi2023Springer Nature
384Output Regulation and Cybersecurity of Networked Switched SystemsLili Li; Jun Fu2023Springer Nature
385Networks and Systems in Cybernetics: Proceedings of 12th Computer Science On-line Conference 2023, Volume 2Radek Silhavy; Petr Silhavy2023Springer Nature
386HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, ProceedingsAbbas Moallem2023Springer Nature
387Building a Cyber Risk Management ProgramBrian Allen2023O'Reilly Media
388Building a Cyber Risk Management Program: Evolving Security for the Digital AgeBrian Allen, Brandon Bapst, Terry Allan Hicks2023O'Reilly Media
389AI Embedded Assurance for Cyber SystemsCliff Wang; S. S. Iyengar; Kun Sun2023Springer International Publishing
390The Chinese Internet (Routledge Studies in New Media and Cyberculture)Yuqi Na2023Routledge
391Explainable AI for CybersecurityZhixin Pan, Prabhat Mishra2023Springer
392Explainable AI for CybersecurityZhixin Pan, Prabhat Mishra2023Springer
393Explainable AI for CybersecurityZhixin Pan, Prabhat Mishra2023Springer
394Against Cybercrime: Toward a Realist Criminology of Computer Crime (New Directions in Critical Criminology)Kevin F. Steinmetz2023Routledge
395Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity TechniquesAlex Khang, Shashi Kant Gupta, Sita Rani, Dimitrios A. Karras2023CRC Press
396Malware Analysis and Intrusion Detection in Cyber-Physical SystemsS L Shiva Darshan (editor), M V Manoj Kumar (editor), B S Prashanth (editor)2023IGI Global
397Malware Analysis and Intrusion Detection in Cyber-Physical SystemsS L Shiva Darshan (editor), M V Manoj Kumar (editor), B S Prashanth (editor)2023IGI Global
398CYBERDEFENSE: the next generationMarcus Matthias Keupp (ed)2023Springer Cham
399The Chinese Internet (Routledge Studies in New Media and Cyberculture)Yuqi Na2023Routledge
400The Chinese Internet (Routledge Studies in New Media and Cyberculture)Yuqi Na2023Routledge
401Cybernetics and the Origin of Information (Groundworks)Raymond Ruyer2023Rowman & Littlefield Publishers
402Cyber Wargaming: Research and Education for Security in a Dangerous Digital WorldFrank L. Smith; Nina A. Kollars; Benjamin H. Schechter2023Georgetown University Press
403Cyber Wargaming: Research and Education for Security in a Dangerous Digital WorldFrank L. Smith; Nina A. Kollars; Benjamin H. Schechter2023Georgetown University Press
404Cyberfeminism IndexMindy Seu (editor)2023Inventory Press
405Big Data Analytics in Intelligent IoT and Cyber-Physical Systems (Transactions on Computer Systems and Networks)Nonita Sharma (editor), Monika Mangla (editor), Subhash K. Shinde (editor)2023Springer
40626 Below (Alaskan Cyber Hunters, 1)Kimberley Woodhouse2023Kregel Publications
407Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions GuideJody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu2023Apress
408A Transdisciplinary Introduction to the World of Cybernetics: Basics, Models, Theories and Practical ExamplesE. W. Udo Küppers2023Springer
409A Transdisciplinary Introduction to the World of Cybernetics: Basics, Models, Theories and Practical ExamplesE. W. Udo Küppers2023Springer
410Cyber Forensics up and Running : A hands-on guide to digital forensics tools and techniqueVashishth, Tarun;2023BPB Publications
411Cybersecurity (Computer Science Fundamentals)Edet, Theophilus2023CompreQuest Books
412SANS ICS Cybersecurity Field Manual Volume 2Dean Parsons2023SANS
413Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail UsEugene H. Spafford, Leigh Metcalf, Josiah Dykstra, Vint Cerf2023Addison-Wesley
414Defending APIs against Cyber Attack: Learn the secrets of defense techniques to build secure application programming interfacesColin Domoney2023Packt Publishing Ltd.
415Cybersecurity Threats, Malware Trends, and Strategies: Discover Risk Mitigation Strategies for Modern Threats to Your OrganizationTim Rains2023Packt Publishing
416PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamersMiriam C Wiesner2023Packt Publishing
417Cybersecurity Study GuideSam O.A2023
418Cybernetic Aesthetics: Modernist Networks of Information and DataHeather A. Love2023Cambridge University Press
419Cybercrime and Challenges in South AfricaStanley Osezua Ehiane (editor), Sogo Angel Olofinbiyi (editor), Sazelo Michael Mkhize (editor)2023Palgrave Macmillan
420Cybersecurity and Data Laws of the Commonwealth: International Trade, Investment and ArbitrationRobert Walters2023Springer
421A Century of Pulitzer Prize Global Press Coverage 1917-2017: The International Reporting awards from First World War to Cyberwar (Pulitzer Prize Panorama)Heinz-Dietrich Fischer2023LIT Verlag
422Cyber Security and Social Media Applications (Lecture Notes in Social Networks)Sibel Tariyan Özyer (editor), Buket Kaya (editor)2023Springer
423CyberSecurity in a DevOps Environment: From Requirements to MonitoringAndrey Sadovykh (editor), Dragos Truscan (editor), Wissam Mallouli (editor), Ana Rosa Cavalli (editor), Cristina Seceleanu (editor), Alessandra Bagnato (editor)2023Springer
424Cybersecurity and Evolutionary Data Engineering: Select Proceedings of the 2nd International Conference, ICCEDE 2022 (Lecture Notes in Electrical Engineering, 1073)Raj Jain (editor), Carlos M. Travieso (editor), Sanjeev Kumar (editor)2023Springer
425Cybersecurity Vigilance and Security Engineering of Internet of Everything (Internet of Things)Kashif Naseer Qureshi (editor), Thomas Newe (editor), Gwanggil Jeon (editor), Abdellah Chehri (editor)2023Springer
426Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected PapersAntonio Skarmeta (editor), Daniele Canavese (editor), Antonio Lioy (editor), Sara Matheu (editor)2023Springer
427Digital Transformation, Cyber Security and Resilience: Second International Conference, DIGILIENCE 2020, Varna, Bulgaria, September 30 – October 2, 2020, Revised Selected PapersTodor Tagarev (editor), Nikolai Stoianov (editor)2023Springer
428Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, ProceedingsSanjay Goel (editor), Pavel Gladyshev (editor), Akatyev Nikolay (editor), George Markowsky (editor), Daryl Johnson (editor)2023Springer
429Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail UsEugene Spafford, Leigh Metcalf, Josiah Dykstra2023Addison-Wesley Professional
430Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2023Apress
431Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things)Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor)2023Springer
432Machine Learning and Optimization Techniques for Automotive Cyber-Physical SystemsVipin Kumar Kukkala; Sudeep Pasricha2023Springer Nature
433Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Hardware ArchitecturesSudeep Pasricha (editor), Muhammad Shafique (editor)2023Springer
434Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Software Optimizations and Hardware/Software CodesignSudeep Pasricha (editor), Muhammad Shafique (editor)2023Springer
435Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use Cases and Emerging ChallengesSudeep Pasricha (editor), Muhammad Shafique (editor)2023Springer
436ISA/IEC 62443 Cybersecurity Fundamental Specialist IC32 v4.2 Student Noteset2023isa.org
437ISA/IEC 62443 Cybersecurity Fundamental Specialist IC32 v4.2 Student Noteset2023isa.org
438Science Diplomacy, Cyberdiplomacy and Techplomacy in EU-LAC Relations (United Nations University Series on Regionalism, 25)Mario Torres Jarrín, Shaun Riordan2023Springer
439Society 5.0: Cyber-Solutions for Human-Centric Technologies (Studies in Systems, Decision and Control, 437)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim V. Shcherbakov (editor)2023Springer
440Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science, 1683)Luis Bathen (editor), Gokay Saldamli (editor), Xiaoyan Sun (editor), Thomas H. Austin (editor), Alex J. Nelson (editor)2023Springer
441Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science)Moti Yung (editor), Chao Chen (editor), Weizhi Meng (editor)2023Springer
442Cybersecurity for Decision MakersNarasimha Rao Vajjhala (editor), Kenneth David Strang (editor)2023CRC Press
443Fundamental and Applied Scientific Research in the Development of Agriculture in the Far East (AFE-2022): Agricultural Cyber-Physical Systems, Volume 2 (Lecture Notes in Networks and Systems, 706)Khasanov Sayidjakhon Zokirjon ugli (editor), Aleksei Muratov (editor), Svetlana Ignateva (editor)2023Springer
444The CISO Perspective: Understand the importance of the CISO in the cyber threat landscapeIT Governance Publishing (editor)2023It Governance Publishing
445The CISO Perspective: Understand the importance of the CISO in the cyber threat landscapeIT Governance Publishing (editor)2023It Governance Publishing
446The CISO Perspective: Understand the importance of the CISO in the cyber threat landscapeIT Governance Publishing (editor)2023It Governance Publishing
447Exam Ref SC-100 Microsoft Cybersecurity ArchitectYuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez2023Microsoft Press
448Exam Ref SC-100 Microsoft Cybersecurity ArchitectYuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez2023Microsoft Press
449Exam Ref SC-100 Microsoft Cybersecurity ArchitectYuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez2023Microsoft Press
450Cybersecurity In Poland: Legal AspectsKatarzyna Chalubinska-Jentkiewicz, Filip Radoniewicz, Tadeusz Zielinski2022Springer
451Understanding cybersecurity technologies : a guide to selecting the right cybersecurity toolsAbbas Moallem2022CRC Press
452Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021João Manuel R. S. Tavares, Paramartha Dutta, Soumi Dutta, Debabrata Samanta2022Springer
453Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology)Ishaani Priyadarshini (editor), Rohit Sharma (editor)2022CRC Press
454Understanding Cybersecurity Law and Digital Privacy: A Common Law PerspectiveMelissa Lukings, Arash Habibi Lashkari2022Springer
455Understanding Cybersecurity Law and Digital Privacy: A Common Law PerspectiveMelissa Lukings, Arash Habibi Lashkari2022Springer
456Cybersecurity for eHealth: A Simplified Guide to Practical Cybersecurity for Non-technical Stakeholders & Practitioners of HealthcareEmmanuel C. Ogu2022Routledge
457Networked and Event-Triggered Control Approaches in Cyber-Physical SystemsJinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen2022CRC Press
458Cyberphysical Smart Cities Infrastructures: Optimal Operation and Intelligent Decision MakingM. Hadi Amini (editor), Miadreza Shafie-khah (editor)2022Wiley
459Cyber-physical Systems and Industry 4.0 : Practical Applications and Security ManagementDinesh Goyal (editor); Karthikrajan Senthilnathan (editor); Mohammad Israr (editor); Shanmugam Balamurugan (editor); Iyswarya Annapoorani (editor)2022Apple Academic Press Inc.
460Networked and Event- Triggered Control Approaches in Cyber-Physical SystemsJinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen2022CRC Press
461Go H*ck Yourself: A Simple Introduction to Cyber Attacks and DefenseBryson Payne2022No Starch Press
462Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISODr. Erdal Ozkaya2022Packt Publishing - ebooks Account
463Intelligent Workloads at the Edge: Deliver cyber-physical outcomes with data and machine learning using AWS IoT GreengrassIndraneel Mitra, Ryan Burke2022Packt Publishing
464Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity FrameworkCynthia Brumfield2022Wiley
465Intelligent Workloads at the Edge: Deliver cyber-physical outcomes with data and machine learning using AWS IoT GreengrassIndraneel Mitra, Ryan Burke2022Packt Publishing
466An Introduction to Cyber Analysis and TargetingJerry M. Couretas2022Springer
467The CISO Evolution: Business Knowledge for Cybersecurity ExecutivesMatthew K. Sharp, Kyriakos Lambros2022Wiley
468Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications)Stanislav Abaimov, Maurizio Martellini2022Springer
469Mathematics in Cyber ResearchPaul L. Goethals, Natalie M. Scala, Daniel T. Bennett2022CRC Press
470The Cybersecurity Mindset: A Virtual and Transformational Thinking ModeDewayne Hart2022Koehler Books
471Python for Cybersecurity: Using Python for Cyber Offense and DefenseHoward E Poston2022Wiley
472Cyber Security and Digital Forensics: Challenges and Future TrendsMangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le2022Wiley-Scrivener
473Maritime Cybersecurity A Guide for Leaders and ManagersGary C. Kessler; Steven D. Shepard2022
474Access Control Models and Architectures For IoT and Cyber Physical SystemsMaanak Gupta, Smriti Bhatt, Asma Hassan Alshehri, Ravi Sandhu2022Springer
475Cyber Security Politics: Socio-Technological Transformations and Political FragmentationMyriam Dunn Cavelty, Andreas Wenger2022Routledge
476Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21Yassine Maleh, Mamoun Alazab, Noreddine Gherabi, Lo’ai Tawalbeh, Ahmed A. Abd El-Latif2022Springer
477Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies, 109)Sanjay Misra (editor), Chamundeswari Arumugam (editor)2022Springer
478The Art of Cyberwarfare An Investigator's Guide to Espionage, Ransomware, and Organized CybercrimeJon DiMaggio2022No Starch Press
479The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized CybercrimeJon DiMaggio2022No Starch Press
480The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacksJeremy Wittkop2022Packt Publishing
481Cyber Muslims Mapping Islamic Digital Media in the Digital AgeRobert Rozehnal2022Bloomsbury Academic
482Agile Security Operations: Engineering for agility in cyber defense, detection, and responseHinne Hettema2022Packt Publishing
483Agile Security Operations: Engineering for agility in cyber defense, detection, and responseHinne Hettema2022Packt Publishing
484Python for Cybersecurity: Using Python for Cyber Offense and DefenseHoward E. Poston2022Wiley
485Secure Data Science: Integrating Cyber Security and Data ScienceB. Thuraisngham, M. Kantarcioglu, L. Khan2022
486Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-pacificFrancis C. Domingo2022Routledge
487Cybersecurity and High-Performance Computing EnvironmentsKuan-Ching Li Nitin Sukhija Elizabeth Bautista Jean-Luc Gaudiot2022Taylor & Francis
488Cyber Security and Network SecuritySabyasachi Pramanik (editor), Debabrata Samanta (editor), M. Vinay (editor), Abhijit Guha (editor)2022Wiley-Scrivener
489Cyber Security Practical Engineering ApproachHenrique Santos2022
490Cyber Security (2022) [Lehto Neittaanmaki] [9783030912925]Lehto Neittaanmaki2022
491Cyber Security : Critical Infrastructure ProtectionMartti Lehto; Pekka Neittaanmäki2022Springer International Publishing
492Semi-State Actors in CybersecurityFlorian J. Egloff2022Oxford University Press
493Semi-State Actors in CybersecurityFlorian J. Egloff2022Oxford University Press
494Security of Biochip Cyberphysical Systems (2022) [Mohammed et al] [9783030932732]2022
495Cybersecurity for dummies.Joseph Steinberg2022
496Cybersecurity and Local GovernmentDonald F. Norris, Laura K. Mateczun, Richard F. Forno2022Wiley
497Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
498Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
499Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
500Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems)Bishwajeet Pandey, Shabeer Ahmad2022Chapman & Hall
501Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems)Bishwajeet Pandey, Shabeer Ahmad2022Chapman & Hall
502The Cyber Meta-Reality: Beyond the MetaverseJoshua A. Sipper2022Lexington Books
503Cyber Peace: Charting A Path Toward A Sustainable, Stable, And Secure CyberspaceScott J. Shackelford, Frédérick Douzet, Christopher Ankersen2022Cambridge University Press
504The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized CybercrimeJon DiMaggio2022No Starch Press
505Cybersecurity For Dummies (For Dummies (Computer/Tech))Joseph Steinberg2022For Dummies
506CYBER CRIME INVESTIGATOR'S FIELD GUIDEBRUCE MIDDLETON2022CRC PRESS
507Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoTCharles J. Brooks, Philip A. Craig Jr.2022Wiley
508Cyber Persistence Theory: Redefining National Security in CyberspaceMichael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett2022Oxford University Press
509Cybersecurity and Cognitive ScienceAhmed A. Moustafa (editor)2022Academic Press
510Cybersecurity and Cognitive ScienceAhmed A. Moustafa (editor)2022Academic Press
511Cybersecurity and Cognitive ScienceAhmed A. Moustafa (editor)2022Academic Press
512Cyber-Physical Systems: Foundations and TechniquesUzzal Sharma (editor), Parma Nand (editor), Jyotir Moy Chatterjee (editor), Vishal Jain (editor), Noor Zaman Jhanjhi (editor), R. Sujatha (editor)2022Wiley-Scrivener
513Cyber-Physical Systems: Foundations and TechniquesUzzal Sharma (editor), Parma Nand (editor), Jyotir Moy Chatterjee (editor), Vishal Jain (editor), Noor Zaman Jhanjhi (editor), R. Sujatha (editor)2022Wiley-Scrivener
514Holistic Approach to Quantum Cryptography in Cyber SecurityShashi Bhushan; Manoj Kumar; Pramod Kumar; Renjith V Ravi; Anuj Kumar Singh2022CRC Press
515The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needsChad Maurice, Jeremy Thompson, William Copeland2022Packt Publishing
516The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needsChad Maurice, Jeremy Thompson, William Copeland2022Packt Publishing
517The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needsChad Maurice, Jeremy Thompson, William Copeland2022Packt Publishing
518Cyber Persistence Theory: Redefining National Security in Cyberspace (Bridging the Gap)Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett2022Oxford University Press
519Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programsKyle Wilhoit, Joseph Opacki2022Packt Publishing
520Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programsKyle Wilhoit, Joseph Opacki2022Packt Publishing
521Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programsKyle Wilhoit, Joseph Opacki2022Packt Publishing
522Handbook of Research of Internet of Things and Cyber-Physical Systems: An Integrative Approach to an Interconnected FutureAmit Kumar Tyagi (editor), Niladhuri Sreenath (editor)2022Apple Academic Press
523Handbook of Research of Internet of Things and Cyber-Physical Systems: An Integrative Approach to an Interconnected FutureAmit Kumar Tyagi (editor), Niladhuri Sreenath (editor)2022Apple Academic Press
524Strategic Cyber Security ManagementPeter Trim, Yang-Im Lee2022Routledge
525Strategic Cyber Security ManagementPeter Trim, Yang-Im Lee2022Routledge
526Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems)Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia2022Chapman and Hall/CRC
527Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems)Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia2022Chapman and Hall/CRC
528Mathematics in cyber researchPaul L. Goethals (editor); Natalie Michele Scala (editor); Daniel T. Bennett (editor)2022CRC Press
529Cybersecurity Crisis Management and Lessons Learned From the COVID-19 PandemicRyma Abassi (editor), Aida Ben Chehida Douss (editor)2022Information Science Reference
530Cybersecurity Crisis Management and Lessons Learned From the COVID-19 PandemicRyma Abassi (editor), Aida Ben Chehida Douss (editor)2022Information Science Reference
531Cybersecurity Crisis Management and Lessons Learned From the COVID-19 PandemicRyma Abassi (editor), Aida Ben Chehida Douss (editor)2022Information Science Reference
532Cybersecurity Career GuideAlyssa Miller2022Manning Publications
533Handbook of Research on Cyber Law, Data Protection, and Privacy (Advances in Information Security, Privacy, and Ethics)Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (editor), Mamta Sharma (editor), Shaharyar Asaf Khan (editor)2022Information Science Reference
534Handbook of Research on Cyber Law, Data Protection, and Privacy (Advances in Information Security, Privacy, and Ethics)Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (editor), Mamta Sharma (editor), Shaharyar Asaf Khan (editor)2022Information Science Reference
535Handbook of Research on Cyber Law, Data Protection, and Privacy (Advances in Information Security, Privacy, and Ethics)Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (editor), Mamta Sharma (editor), Shaharyar Asaf Khan (editor)2022Information Science Reference
536IEEE Systems, Man, & Cybernetics Magazine2022
537Cybersecurity Awareness (Advances in Information Security, 88)Jerry Andriessen (editor), Thomas Schaberreiter (editor), Alexandros Papanikolaou (editor), Juha Röning (editor)2022Springer
538Cybersecurity Awareness (Advances in Information Security, 88)Jerry Andriessen (editor), Thomas Schaberreiter (editor), Alexandros Papanikolaou (editor), Juha Röning (editor)2022Springer
539Cybersecurity Career GuideAlyssa Miller2022Manning
540Cybersecurity and Identity Access ManagementBharat S. Rawal, Gunasekaran Manogaran, Alexender Peter2022Springer
541Cybersecurity Measures for E-Government Frameworks (Advances in Electronic Government, Digital Divide, and Regional Development)Noor Zaman (editor), Imdad Ali Shah (editor), Samina Rajper (editor)2022Information Science Reference
542Cyber Security Threats and Challenges Facing Human LifeHari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor)2022Chapman and Hall/CRC
543Real-time Applications of Machine Learning in Cyber-physical Systems (Advances in Computational Intelligence and Robotics)Balamurugan Easwaran (editor), Kamal Kant Hiran (editor), Sangeetha Krishnan (editor), Ruchi Doshi (editor)2022Engineering Science Reference
544Real-time Applications of Machine Learning in Cyber-physical Systems (Advances in Computational Intelligence and Robotics)Balamurugan Easwaran (editor), Kamal Kant Hiran (editor), Sangeetha Krishnan (editor), Ruchi Doshi (editor)2022Engineering Science Reference
545A Brief History of CyberspaceHuansheng Ning2022CRC Press
546Security Engineering for Embedded and Cyber-Physical SystemsSaad Motahhir, Yassine Maleh2022CRC Press
547Strategic Cyber Security ManagementPeter Trim, Yang-Im Lee2022Routledge
548Russian Information Warfare: Assault on Democracies in the Cyber Wild WestBilyana Lilly2022Naval Institute Press
549Russian Information Warfare: Assault on Democracies in the Cyber Wild WestBilyana Lilly2022Naval Institute Press
550Theoretical Cybersecurity: Principles and Advanced ConceptsJacob G. Oakley; Michael Butler; Matthew Puckett; J. Louis Sewell; Wayne York2022Apress
551Theoretical Cybersecurity: Principles and Advanced ConceptsJacob G. Oakley; Michael Butler; Matthew Puckett; J. Louis Sewell; Wayne York2022Apress
552Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021Pradeep Kumar Singh, Slawomir T. Wierzchon, Sudeep Tanwar, Joel J. P. C. Rodrigues, Maria Ganzha2022Springer
553Brutal Kangaroo: WikiLeaks Verdict Against Josh Schulte, and Other Whistleblowers: Convicted of sending the CIA's Vault 7 cyber tools to Wikileaks, Schulte remains in jail under DOJ SAMs. And others?Matthew Russell Lee2022
554Cybersecurity for Artificial IntelligenceMark Stamp; Corrado Aaron Visaggio; Francesco Mercaldo; Fabio Di Troia2022Springer
555Microgrid Cyberphysical Systems: Renewable Energy and Plug-in Vehicle IntegrationBidyadhar Subudhi (editor), Pravat Kumar Ray (editor)2022Elsevier
556Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor)2022Springer
557Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor)2022Springer
558Cybersecurity for Artificial Intelligence (Advances in Information Security, 54)Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor)2022Springer
559Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301)Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor)2022Springer
560Cybersecurity and Identity Access ManagementBharat S. Rawal, Gunasekaran Manogaran, Alexender Peter2022Springer
561Cybersecurity and Identity Access ManagementBharat S. Rawal, Gunasekaran Manogaran, Alexender Peter2022Springer
562Cybersecurity and Identity Access ManagementBharat S. Rawal, Gunasekaran Manogaran, Alexender Peter2022Springer
563Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor)2022Chapman and Hall/CRC
564Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based DevelopmentFrank J. Furrer2022Springer Vieweg
565Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based DevelopmentFrank J. Furrer2022Springer Vieweg
566Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based DevelopmentFrank J. Furrer2022Springer Vieweg
567Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud ResourcesMorey J. Haber, Brian Chappell, Christopher Hills2022Apress
568Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud ResourcesMorey J. Haber, Brian Chappell, Christopher Hills2022Apress
569Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor)2022Chapman and Hall/CRC
570Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems)Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor)2022Chapman and Hall/CRC
571Cyberpredators and Their PreyLauren R. Shapiro2022CRC Press
572Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity careerKen Underhill, Christophe Foulon, Tia Hopkins2022Packt Publishing
573Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity careerKen Underhill, Christophe Foulon, Tia Hopkins2022Packt Publishing
574Cyber And The City: Securing London’s Banks In The Computer AgeAshley Sweetman2022Springer
575Exploring Careers in Cybersecurity and Digital ForensicsLucy K. Tsado, Robert Osgood2022Rowman & Littlefield Publishers
576Exploring Careers in Cybersecurity and Digital ForensicsLucy K. Tsado, Robert Osgood2022Rowman & Littlefield Publishers
577Executive's Guide to Cyber Risk: Securing the Future TodaySiegfried Moyo2022Wiley
578Executive's Guide to Cyber Risk: Securing the Future TodaySiegfried Moyo2022Wiley
579Executive's Guide to Cyber Risk: Securing the Future TodaySiegfried Moyo2022Wiley
580Executive's Guide to Cyber Risk: Securing the Future TodaySiegfried Moyo2022Wiley
581Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th EditionVijay Kumar Velu2022Packt Publishing
582Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th EditionVijay Kumar Velu2022Packt Publishing
583Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th EditionVijay Kumar Velu2022Packt Publishing
584Decision Advantage: Intelligence in International Politics from the Spanish Armada to CyberwarJennifer E. Sims2022Oxford University Press
585From City Space to Cyberspace: Art, Squatting, and Internet Culture in the NetherlandsAmanda Wasielewski2022Amsterdam University Press
586Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and ApplicationsOlivier Cardin, William Derigent, Damien Trentesaux2022Wiley-ISTE
587Security and Resilience in Cyber-Physical Systems: Detection, Estimation and ControlMasoud Abbaszadeh, Ali Zemouche2022Springer
588Cybercrimes and Financial Crimes in the Global EraYanping Liu, Minghai Tian, Yanming Shao2022Springer
589Security and Resilience in Cyber-Physical Systems: Detection, Estimation and ControlMasoud Abbaszadeh, Ali Zemouche2022Springer
590Cyber Security and Critical InfrastructuresLeandros Maglaras; Helge Janicke; Mohamed Amine Ferrag (eds.)2022MDPI
591Security and Resilience in Cyber-Physical Systems: Detection, Estimation and ControlMasoud Abbaszadeh (editor), Ali Zemouche (editor)2022Springer
592Security and Resilience in Cyber-Physical Systems: Detection, Estimation and ControlMasoud Abbaszadeh (editor), Ali Zemouche (editor)2022Springer
593Data Analytics for CybersecurityVandana P. Janeja2022Cambridge University Press
594Cybersecurity and digital forensics : challenges and future paradigmsRandal Joyce; Abdulrahman Yarali; Faris Sahawneh2022Nova Science Publishers
595Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd EditionMark Dunkerley, Matt Tumbarello2022Packt Publishing
596Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd EditionMark Dunkerley, Matt Tumbarello2022Packt Publishing
597Cyberhate in the Context of MigrationsAngeliki Monnier, Axel Boursier, Annabelle Seoane2022Palgrave Macmillan
598Cyber Security for Beginners: A Comprehensive and Essential Guide for Every Novice to Understand and Master CybersecurityLiam Smith2022Independently published
599Complex Systems: Spanning Control and Computational Cybernetics: Foundations: Dedicated to Professor Georgi M. Dimirovski on his AnniversaryPeng Shi, Jovan Stefanovski, Janusz Kacprzyk2022Springer
600Advances in Blockchain Technology for Cyber Physical SystemsYassine Maleh, Lo’ai Tawalbeh, Saad Motahhir, Abdelhakim Senhaji Hafid2022Springer
601The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber WarGeoff White2022Penguin Business
602Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence PracticesDr. Erdal Ozkaya2022BPB Publications
603Security and Privacy in CyberspaceOmprakash Kaiwartya, Keshav Kaushik, Sachin Kumar Gupta, Ashutosh Mishra, Manoj Kumar2022Springer
604Cyber Security Applications for Industry 4.0R. Sujatha, G. Prakash, Noor Zaman Jhanjhi2022CRC Press/Chapman & Hall
605Cyber Security Applications for Industry 4.0 (Chapman & Hall/CRC Cyber-Physical Systems)R Sujatha (editor), G Prakash (editor), Noor Zaman Jhanjhi (editor)2022Chapman and Hall/CRC
606Defending Cyber Systems through Reverse Engineering of Criminal MalwareMarwan Omar2022Springer
607Big Data Analytics and Computational Intelligence for CybersecurityMariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar2022Springer
608Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and CyberattacksJosephine Wolff2022The MIT Press
609Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven MethodsAshish Mishra2022BPB Publications
610Secure and Trusted Cyber Physical Systems: Recent Approaches and Future DirectionsShantanu Pal, Zahra Jadidi, Ernest Foo2022Springer
611The Rule of Law in CyberspaceCarlos Blanco de Morais, Gilmar Ferreira Mendes, Thomas Vesting2022Springer
612Conflicts, Crimes and Regulations in CyberspaceSébastien-Yves Laurent2022Wiley-ISTE
613Advances in Nature-Inspired Cyber Security and ResilienceShishir Kumar Shandilya, Neal Wagner, V.B. Gupta, Atulya K. Nagar2022Springer
614Aviation Cybersecurity: Foundations, principles, and applicationsHoubing Song, Kenneth Hopkinson, Tomaso De Cola, Tom Alexandrovich, Dahai Liu2022Scitech Publishing
615Evidence-Based Cybersecurity: Foundations, Research, and PracticePierre-Luc Pomerleau, David Maimon2022CRC Press
616Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical VariationClaudia Lanza2022CRC Press
617The Great Power Competition, Volume 3: Cyberspace: The Fifth DomainAdib Farhadi, Ronald P. Sanders, Anthony Masys2022Springer
618Cybersecurity for Coaches and Therapists A Practical Guide for Protecting Client DataAlexandra J.S. Fouracres2022Routledge
619Cybersecurity in Smart Homes: Architectures, Solutions and TechnologiesRida Khatoun2022Wiley-ISTE
620Cyber-physical Systems: Theory, Methodology, and ApplicationsPedro H. J. Nardelli2022Wiley-IEEE Press
621Cyber Security for MicrogridsSubham Sahoo, Frede Blaabjerg, Tomislav Dragicevic2022The Institution of Engineering and Technology
622The CISO Evolution: Business Knowledge for Cybersecurity ExecutivesMatthew K. Sharp; Kyriakos P. Lambros2022Wiley
623Mastering Cyber IntelligenceJean Nestor M. Dahj;2022Packt
624Machine Learning for Cybersecurity: Innovative Deep Learning SolutionsMarwan Omar2022Springer
625Offensive Cyber OperationsDaniel Moore;2022LightningSource
626Weaponizing CyberspaceNicholas Michael Sambaluk2022ABC-CLIO
627Cyberhate: The Far Right in the Digital AgeJames Bacigalupo2022Lexington Books
628Big Data Management and Analysis for Cyber Physical Systems: Selected Papers of BDET 2022Loon Ching Tang, Hongzhi Wang2022Springer
629Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacksAlexey Kleymenov, Amr Thabet2022Packt Publishing
630Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably ParanoidSeth Enoka2022No Starch Press
631Cybersecurity (Chapman & Hall/CRC Textbooks in Computing)Henrique M. D. Santos2022Chapman and Hall/CRC
632What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco, Bob Maley2022CRC Press
633Rethinking European Cyber Defense Policy : Toward a Defense Superiority DoctrineValentin Weber2022Deutsche Gesellschaft für Auswärtige Politik
634A Reliable Global Cyber Power : Cyberspace and Germany’s National Security StrategyValentin Weber2022Deutsche Gesellschaft für Auswärtige Politik
635Cybersecurity – Attack and Defense StrategiesYuri Diogenes, Dr. Erdal Ozkaya2022Packt Publishing
636Cybersecurity – Attack and Defense StrategiesYuri Diogenes, Dr. Erdal Ozkaya2022Packt Publishing
637Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected PapersIndhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan2022Springer
638Cybersecurity – Attack and Defense StrategiesYuri Diogenes, Erdal Ozkaya2022Packt
639Cybersecurity – Attack and Defense Strategies: Improve your security posture to mitigate risks and prevent attackers from infiltrating your system, 3rd EditionYuri Diogenes, Dr. Erdal Ozkaya2022Packt Publishing
640Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and ApplicationsOlivier Cardin, William Derigent, Damien Trentesaux2022Wiley-ISTE
641Cybersecurity Public Policy: SWOT Analysis Conducted on 43 CountriesBradley Fowler, Kennedy Maranga2022CRC Press
642Cyber Investigations : A Research Based Textbook for Advanced StudiesÅrnes, André;2022John Wiley & Sons, Incorporated
643Cyber-Security Threats and Response Models in Nuclear Power PlantsCarol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski2022Springer
644Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal PerspectiveMelissa Lukings, Arash Habibi Lashkari2022Springer
645Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2021 (Algorithms for Intelligent Systems)Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor)2022Springer
646Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And CyberattacksJosephine Wolff2022The MIT Press
647Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the BodyBernard Widrow2022Springer
648Ransomware and Cyber Extortion: Response and PreventionSherri Davidoff, Matt Durrin, Karen Sprenger2022Addison-Wesley Professional
649Break in Cyber PlaybookMike Miller2022
650The New Technological Condition: Architecture and Technical Thinking in the Age of CyberneticsGeorg Vrachliotis2022Birkhäuser
651Handbook on Artificial Intelligence-Empowered Applied Software Engineering: VOL.2: Smart Software Applications in Cyber-Physical SystemsMaria Virvou, George A. Tsihrintzis, Nikolaos G. Bourbakis, Lakhmi C. Jain2022Springer
652Handbook on Artificial Intelligence-Empowered Applied Software Engineering: VOL.2: Smart Software Applications in Cyber-Physical SystemsMaria Virvou, George A. Tsihrintzis, Nikolaos G. Bourbakis, Lakhmi C. Jain2022Springer
653Cyber-Physical Systems: Solutions to Pandemic ChallengesTushar Semwal, Faiz Iqbal2022CRC Press/Science Publishers
654Cyber Careers: The Basics of Information Technology and Deciding on a Career PathPee Vululleh2022CRC Press
655Cross-industry Applications of Cyber Security FrameworksSukanta Baral, Richa Goel, Mashiur Rahman, Jahangir Sultan, Sarkar Jahan2022Information Science Reference
656Cross-Industry Applications of Cyber Security FrameworksSukanta Kumar Baral, Richa Goel, Md Mashiur Rahman2022IGI Global
657Cross-Industry Applications of Cyber Security FrameworksSukanta Kumar Baral, Richa Goel, Md Mashiur Rahman2022IGI Global
658Losing the Cybersecurity War: And What We Can Do to Stop ItSteve King, Kiren Chaudry2022CRC Press
659Cyber Security and Operations Management for Industry 4.0Ahmed A Elngar; N Thillaiarasu; Mohamed Elhoseny; K Martin Sagayam2022CRC Press
660Python for Cybersecurity: Using Python for Cyber Offense and DefenseHoward E. Poston III2022Wiley
661CyberterrorismErica Grove2022Greenhaven Publishing LLC
662Cybersecurity Risk Management: An ERM ApproachKok-Boon Oh2022Nova Science Publishers
663Making Sense of CybersecurityThomas Kranz2022Manning Publications Co.
664Convergence of Deep Learning in Cyber-IoT Systems and SecurityRajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal, S. Balamurugan2022Wiley-Scrivener
665The Ransomware Hunting Team - A Band of Misfits' Improbable Crusade to Save the World from CybercrimeRenee Dudley2022Farrar, Straus and Giroux
666Can. Trust. Will.: Hiring for the Human Element in the New Age of CybersecurityLeeza Garber; Scott Olson2022Business Expert Press
667Cybersecurity: A Practical Engineering ApproachHenrique M. D. Santos2022CRC Press/Chapman & Hall
668Smart Cities: Cyber Situational Awareness to Support Decision MakingNataliia Neshenko, Elias Bou-Harb, Borko Furht2022Springer
669Cybersecurity in Intelligent Networking Systems (IEEE Press)Shengjie Xu, Yi Qian, Rose Qingyang Hu2022Wiley-IEEE Press
670Cybersecurity in Intelligent Networking Systems (IEEE Press)Shengjie Xu, Yi Qian, Rose Qingyang Hu2022Wiley-IEEE Press
671Cybersecurity in Intelligent Networking Systems (IEEE Press)Shengjie Xu, Yi Qian, Rose Qingyang Hu2022Wiley-IEEE Press
672Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and ManagementJyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh2022CRC Press/Chapman & Hall
673Cyberwarfare: Threats to Critical InfrastructureKristan Stoddart2022Palgrave Macmillan
674Emerging Trends in Cybersecurity ApplicationsKevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun2022Springer
675Advances in Cyber Security and Intelligent AnalyticsAbhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas2022CRC Press
676Machine Learning for Cyber SecurityPreeti Malik, Lata Nautiyal, Mangey Ram2022De Gruyter
677Artificial Intelligence for Cyber-Physical Systems HardeningIssa Traore, Isaac Woungang, Sherif Saad2022Springer
678Information Systems Security: in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Turbulent TimesKennedy Njenga2022Nova Science Publishers
679Cybersecurity Ethics: An IntroductionMary Manjikian2022Routledge
680Information Systems Security in Small and Medium-Sized Enterprises. Emerging Cybersecurity Threats in Times of TurbulenceKennedy Njenga2022
681Cyberwarfare. Threats to Critical InfrastructureKristan Stoddart2022Palgrave Macmillan
682Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, ProceedingsEmmanuel Ahene, Fagen Li2022Springer
683Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably ParanoidSeth Enoka2022No Starch Press
684Artificial Intelligence and Cybersecurity: Theory and ApplicationsTuomo Sipola, Tero Kokkonen, Mika Karjalainen2022Springer
685Digital Forensics and Incident Response Incident response tools and techniques for effective cyber threat responseGerard Johansen2022Packt Publishing
686Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected PapersWei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li2022Springer
687Cybersecurity and Privacy Law Handbook: A beginner’s guide to dealing with privacy and security while keeping hackers at bayWalter Rocchi2022Packt Publishing
688Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative PerspectivesGertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo2022Palgrave Macmillan
689Internet of Things and Cyber Physical Systems: Security and ForensicsKeshav Kaushik, Susheela Dahiya, Akashdeep Bhardwaj, Yassine Maleh2022CRC Press
690Translation, Disinformation, and Wuhan Diary: Anatomy of a Transpacific Cyber CampaignMichael Berry2022Palgrave Macmillan
691Digital Grooming: Discourses of Manipulation and Cyber-CrimeNuria Lorenzo-Dus2022Oxford University Press
692An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governmentsKushantha Gunawardana2022Packt Publishing
693Managing Cybersecurity in the Process Industries: A Risk-based ApproachCCPS (Center for Chemical Process Safety)2022Wiley-AIChE
694Ransomware and CybercrimeAndrew Jenkinson2022CRC Press
695Cyber-Physical Systems in the Construction SectorWesam Salah Alaloul2022CRC Press
696Intelligent Cyber-Physical Systems for Autonomous TransportationSahil Garg, Gagangeet Singh Aujla, Kuljeet Kaur, Syed Hassan Ahmed Shah2022Springer
697Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez2022Springer
698Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital FutureAaron Mauro2022Bloomsbury Academic
699Internet of Things: Security and Privacy in CyberspaceSandeep Saxena, Ashok Kumar Pradhan2022Springer
700How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISORavi Das2022CRC Press/Auerbach
701Cyber-Physical Systems: A Comprehensive GuideNonita Sharma, L. K. Awasthi, Monika Mangla, K. P. Sharma, Rohit Kumar2022CRC Press/Chapman & Hall
702Relax: A Guide To True Cyber SecurityJ. Kenneth Fanger2022James Kenneth Fanger
703What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco, Bob Maley2022CRC Press
704ISO/IEC 27001:2022: Information security, cybersecurity and privacy protection — Information security management systems — RequirementsISO2022ISO
705Methods, Implementation, and Application of Cyber Security Intelligence and AnalyticsJena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar2022Information Science Reference
706Industrial Cybersecurity Case Studies and Best PracticesMustard, Steve2022ISA - International Society of Automation
707Striking Back: The End of Peace in Cyberspace - And How to Restore ItLucas Kello2022Yale University Press
708Encyclopedia Cyberspacia2022
709Smart Cities: Cyber Situational Awareness to Support Decision MakingNataliia Neshenko, Elias Bou-Harb, Borko Furht2022Springer
710Security and Privacy in CyberspaceOmprakash Kaiwartya, Keshav Kaushik, Sachin Kumar Gupta, Ashutosh Mishra, Manoj Kumar2022Springer
711Introduction to the Cyber RangesBishwajeet Pandey, Shabeer Ahmad2022CRC Press
712Cyber Security Meets National Security: International Perspectives on Digital Era ThreatsNeil Kent, Irina du Quenoy2022Academica Press
713Building a Cyber Resilient BusinessDr. Magda Lilia Chelly, Shamane Tan, Hai Tran2022Packt Publishing Limited
714Building a Cyber Resilient Business: A cyber handbook for executives and boardsDr. Magda Lilia Chelly, Shamane Tan, Hai Tran2022Packt Publishing
715Cyber War and Cyber Peace: Digital Conflict in the Middle EastMike Sexton, Eliza Campbell2022Bloomsbury Publishing
716Fifty Key Figures in Cyberpunk CultureAnna McFarlane, Graham J. Murphy, Lars Schmeink2022Routledge
717Cybermedia: Explorations in Science, Sound, and VisionCarol Vernallis; Holly Rogers; Selmin Kara; Jonathan Leal (editors)2022Bloomsbury Academic
718Cyber Muslims: Mapping Islamic Digital Media in the Internet AgeRobert Rozehnal (editor)2022Bloomsbury Academic
719The EU as a Global Digital Actor: Institutionalising Global Data Protection, Trade, and CybersecurityElaine Fahey2022Hart Publishing
720Cyber War and Cyber Peace: Digital Conflict in the Middle EastMike Sexton; Eliza Campbell (editors)2022I.B. Tauris
721Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital FutureAaron Mauro2022Bloomsbury Academic
722Machine Learning for Cyber SecurityPreeti Malik (editor); Lata Nautiyal (editor); Mangey Ram (editor)2022De Gruyter
723Striking Back: The End of Peace in Cyberspace - And How to Restore ItLucas Kello2022Yale University Press
724Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT IssueLarry Clinton2022Kogan Page
725Fundamentals of Adopting the NIST Cybersecurity FrameworkDavid Nichols, David Moskowitz2022The Stationery Office Ltd
726Success Cybernetics (Unabridged edition)Uell S. Andersen2022UELL S. ANDERSEN
727Cyber Crime Investigator's Field GuideBruce Middleton2022Auerbach Publications
728Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrimeNearchos Nearchou2022Packt Publishing
729The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacksJeremy Wittkop2022Packt Publishing
730The Informational Logic of Human Rights: Network Imaginaries in the Cybernetic AgeJoshua Bowsher2022Edinburgh University Press
731ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection — Guidance on managing information security risksISO2022ISO
732Practical Industrial Cybersecurity: Ics, Industry 4.0, and IiotPhilip A Craig; Charles J Brooks2022Wiley
733Cyber Security and Digital Forensics: Challenges and Future TrendsSabyasachi Pramanik2022Wiley-Scrivener
734Cyber Persistence Theory: Redefining National Security in CyberspaceMichael P. Fischerkeller; Emily O. Goldman; Richard J. Harknett2022Oxford University Press
735Holistic Approach to Quantum Cryptography in Cyber SecurityShashi Bhushan2022CRC Press
736Cyber-Physical Systems in the Construction SectorWesam Salah Alaloul2022CRC Press
737Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies)Shaun Kimmons2022Felix Walter
738A Straightforward Guide to Cyber Security For Small to Medium Size Business: How to Ensure Your Business is Prepared to Combat a Cyber AttackDavid Marsh2022Straightforward Publishing
739Cyber-physical Systems: Theory, Methodology, and Applications (IEEE Press)Pedro H. J. Nardelli2022Wiley-IEEE Press
740How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISORavi Das2022Auerbach Publications
741Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected PapersWei Lu; Yuqing Zhang; Weiping Wen; Hanbing Yan; Chao Li2022Springer Singapore Pte. Limited
742Cyber Troops, Online Manipulation of Public Opinion and Co-optation of Indonesia’s CybersphereYatun Sastramidjaja; Wijayanto2022ISEAS Publishing
743Between Page and Screen: Remaking Literature Through Cinema and CyberspaceKiene Brillenburg Wurth (editor)2022Fordham University Press
744Launching into Cyberspace: Internet and Politics in Five World RegionsMarcus Franda2022Lynne Rienner Publishers
745Cybersexualities: A Reader in Feminist Theory, Cyborgs and CyberspaceJenny Wolmark2022Edinburgh University Press
746Chinese Stardom in Participatory CybercultureDorothy Wai Sim Lau2022Edinburgh University Press
747Making Sense of CybersecurityThomas Kranz2022Manning Publications Co.
748Sacred Cyberspaces: Catholicism, New Media, and the Religious ExperienceOren Golan; Michele Martini2022McGill-Queen's University Press
749Cyber-Threats to Canadian DemocracyHolly Ann Garnett (editor); Michael Pal (editor)2022McGill-Queen's University Press
750IEEE Systems, Man and Cybernetics Magazine2022
751IEEE Systems, Man and Cybernetics Magazine2022
752IEEE Systems, Man and Cybernetics Magazine2022
753Cybersecurity for Small Networks: A Guide for the Reasonably ParanoidSeth Enoka2022No Starch Press
754Cybercrime and Digital Forensics: An IntroductionThomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar2022Routledge
755Cybercrime and Digital Forensics: An Introduction - 3rd EditionThomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar2022Routledge
756Go H*ck Yourself: A Simple Introduction to Cyber Attacks and DefenseBryson Payne2022No Starch Press
757ISO/IEC 27001 - Information security, cybersecurity and privacy protectionInternational Organization for Standardization, International Electrotechnical Commission2022ISO/IEC
758Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools (Lecture Notes in Computer Science, 13300)Joanna Kolodziej (editor), Matteo Repetto (editor), Armend Duzha (editor)2022Springer
759Cybersecurity of Digital Service Chains: Challenges, Methodologies, and ToolsJoanna Kolodziej; Matteo Repetto; Armend Duzha2022Springer Nature
760Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, ProceedingsShlomi Dolev; Jonathan Katz; Amnon Meisels2022Springer Nature
761Microgrid Cyberphysical Systems: Renewable Energy and Plug-in Vehicle IntegrationBidyadhar Subudhi (editor), Pravat Kumar Ray (editor)2022Elsevier
762Advances in Nature-Inspired Cyber Security and ResilienceShishir Kumar Shandilya; Neal Wagner; V.B. Gupta; Atulya K. Nagar2022Springer Nature
763Cyber-Physical Systems: Solutions to Pandemic ChallengesTushar Semwal; Faiz Iqbal2022CRC Press
764Managing Cybersecurity in the Process Industries: A Risk-based ApproachCCPS (Center for Chemical Process Safety)2022Wiley-AIChE
765Advances in Computing, Informatics, Networking and Cybersecurity: A Book Honoring Professor Mohammad S. Obaidat’s Significant Scientific ContributionsPetros Nicopolitidis; Sudip Misra; Laurence T. Yang; Bernard Zeigler; Zhaolng Ning2022Springer Nature
766Advances in Computing, Informatics, Networking and Cybersecurity: A Book Honoring Professor Mohammad S. Obaidat’s Significant Scientific Contributions (Lecture Notes in Networks and Systems, 289)Petros Nicopolitidis (editor), Sudip Misra (editor), Laurence T. Yang (editor), Bernard Zeigler (editor), Zhaolng Ning (editor)2022Springer
767Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater ResilienceCharlette Donalds; Corlane Barclay; Kweku-Muata Osei-Bryson2022Routledge
768Weaponizing Cyberspace: Inside Russia's Hostile Activities (Praeger Security International)Nicholas Sambaluk2022Praeger
769Cybersecurity For Dummies (For Dummies (Computer/Tech))Joseph Steinberg2022For Dummies
770The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacksJeremy Wittkop2022Packt Publishing
771Ransomware and CybercrimeAndrew Jenkinson2022CRC Press
772Agile Security Operations: Engineering for agility in cyber defense, detection, and responseHinne Hettema2022Packt Publishing
773Cyber Peace: Charting a Path Toward a Sustainable, Stable, and Secure CyberspaceScott J. Shackelford (editor), Frederick Douzet (editor), Christopher Ankersen (editor)2022Cambridge University Press
774Cybersecurity: A Practical Engineering ApproachHenrique M D Santos2022CRC Press
775Cybersecurity in Morocco (SpringerBriefs in Cybersecurity)Yassine Maleh, Youness Maleh2022Springer
776The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and CybersecurityTine Munk2022Routledge
777An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governmentsKushantha Gunawardana2022Packt Publishing
778Go H*ck Yourself: A Simple Introduction to Cyber Attacks and DefenseBryson Payne2022No Starch Press
779The Art of Cyber Security: A practical guide to winning the war on cyber crimeIT Governance Publishing (editor)2022It Governance Publishing
780Cybersecurity in Morocco (SpringerBriefs in Cybersecurity)Yassine Maleh, Youness Maleh2022Springer
781Cybercomplexity: A Macroscopic View of Cybersecurity Risk (Advanced Sciences and Technologies for Security Applications)Carl S. Young2022Springer
782Cyber-Physical Systems: Intelligent Models and Algorithms (Studies in Systems, Decision and Control, 417)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor)2022Springer
783Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007)Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor)2022Springer
784Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2021 (Algorithms for Intelligent Systems)Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor)2022Springer
785Cybersecurity: A New Approach Using Chaotic Systems (Studies in Big Data, 102)Ahmed A. Abd El-Latif (editor), Christos Volos (editor)2022Springer
786Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems, 467)Sudhanshu Maurya (editor), Sateesh K. Peddoju (editor), Badlishah Ahmad (editor), Ines Chihi (editor)2022Springer
787Complex Systems: Spanning Control and Computational Cybernetics: Applications: Dedicated to Professor Georgi M. Dimirovski on his Anniversary (Studies in Systems, Decision and Control, 415)Peng Shi (editor), Jovan Stefanovski (editor), Janusz Kacprzyk (editor)2022Springer
788Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings (Security and Cryptology)Weizhi Meng (editor), Mauro Conti (editor)2022Springer
789Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631)Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor)2022Springer
790Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings (Lecture Notes in Computer Science)Xiaofeng Chen (editor), Jian Shen (editor), Willy Susilo (editor)2022Springer
791Cybernetics Perspectives in Systems: Proceedings of 11th Computer Science On-line Conference 2022, Vol. 3 (Lecture Notes in Networks and Systems, 503)Radek Silhavy (editor)2022Springer
792Cyber Technological Paradigms and Threat Landscape in IndiaRamnath Reghunadhan2022Palgrave Macmillan
793Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the Body (Springer Series on Bio- and Neurosystems, 14)Bernard Widrow2022Springer
794Cyber-Physical Systems: Modelling and Industrial Application (Studies in Systems, Decision and Control, 418)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor)2022Springer
795Cyber Warfare, Security and Space Research: First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected PapersSandeep Joshi (editor), Amit Kumar Bairwa (editor), Amita Nandal (editor), Milena Radenkovic (editor), Cem Avsar (editor)2022Springer
796Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123)Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor)2022Springer
797The U.S. Cybersecurity and Intelligence Analysis ChallengesJohn Michael Weaver2022Palgrave Macmillan
798Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (SpringerBriefs in Computer Science)Marwan Omar2022Springer
799Digital Forensics and Cyber Crime: 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings (Lecture ... and Telecommunications Engineering, 441)Pavel Gladyshev (editor), Sanjay Goel (editor), Joshua James (editor), George Markowsky (editor), Daryl Johnson (editor)2022Springer
800Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, ... Selected Papers (Security and Cryptology)Sokratis Katsikas (editor), Costas Lambrinoudakis (editor), Nora Cuppens (editor), John Mylopoulos (editor), Christos Kalloniatis (editor), Weizhi Meng (editor), Steven Furnell (editor), Frank Pallas (editor), Jörg Pohle (editor)2022Springer
801Emerging Trends in Cybersecurity ApplicationsKevin Daimi (editor), Abeer Alsadoon (editor), Cathryn Peoples (editor), Nour El Madhoun (editor)2022Springer
802Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025)Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor)2022Springer
803HCI for Cybersecurity, Privacy and Trust (Lecture Notes in Computer Science)Abbas Moallem (editor)2022Springer
804Advanced Introduction to Cybersecurity LawDavid P. Fidler2022Edward Elgar
805Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies)Sanjay Misra (editor), Chamundeswari Arumugam (editor)2022Springer
806World Organization of Systems and Cybernetics 18. Congress-WOSC2021: Systems Approach and Cybernetics: Engaging for the Future of Mankind (Lecture Notes in Networks and Systems)Igor Perko (editor), Raul Espejo (editor), Vladimir Lepskiy (editor), Dmitry A. Novikov (editor)2022Springer
807Intelligent Decarbonisation: Can Artificial Intelligence and Cyber-Physical Systems Help Achieve Climate Mitigation Targets? (Lecture Notes in Energy, 86)Oliver Inderwildi (editor), Markus Kraft (editor)2022Springer
808Order in Chaos: Cybernetics of Brand ManagementOliver Errichiello, Marius Wernke2022Springer
809The Informational Logic of Human Rights: Network Imaginaries in the Cybernetic Age (Technicities)Joshua Bowsher2022Edinburgh University Press
810The Informational Logic of Human Rights: Network Imaginaries in the Cybernetic Age (Technicities)Joshua Bowsher2022Edinburgh University Press
811Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks)Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li2022Springer
812Social Media and Technology Across the Lifespan (Palgrave Studies in Cyberpsychology)Tanya Machin (editor), Charlotte Brownlow (editor), Susan Abel (editor), John Gilmour (editor)2022Palgrave Macmillan
813Research on the Rule of Law of China’s Cybersecurity: China’s Rule of Law in Cybersecurity Over the Past 40 YearsDaoli Huang2022Springer
814Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence, 1030)Nadia Nedjah (editor), Ahmed A. Abd El-Latif (editor), Brij B. Gupta (editor), Luiza M. Mourelle (editor)2022Springer
815Silicon Valley Cybersecurity Conference: Second Conference, SVCC 2021, San Jose, CA, USA, December 2–3, 2021, Revised Selected Papers (Communications in Computer and Information Science)Sang-Yoon Chang (editor), Luis Bathen (editor), Fabio Di Troia (editor), Thomas H. Austin (editor), Alex J. Nelson (editor)2022Springer
816Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 (Lecture Notes in Networks and Systems)Hani Ragab Hassen (editor), Hadj Batatia (editor)2022Springer
817Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected ... in Computer and Information Science)Erol Gelenbe (editor), Marija Jankovic (editor), Dionysios Kehagias (editor), Anna Marton (editor), Andras Vilmos (editor)2022Springer
818Proceedings of International Conference on Intelligent Cyber-Physical Systems: ICPS 2021 (Algorithms for Intelligent Systems)Basant Agarwal (editor), Azizur Rahman (editor), Srikant Patnaik (editor), Ramesh Chandra Poonia (editor)2022Springer
819Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021 (Lecture Notes in Networks and Systems, 421)Pradeep Kumar Singh (editor), Slawomir T. Wierzchon (editor), Sudeep Tanwar (editor), Joel J. P. C. Rodrigues (editor), Maria Ganzha (editor)2022Springer
820Science of Cyber Security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers (Lecture Notes in Computer Science, 13580)Chunhua Su (editor), Kouichi Sakurai (editor), Feng Liu (editor)2022Springer
821ICCCE 2021: Proceedings of the 4th International Conference on Communications and Cyber Physical Engineering (Lecture Notes in Electrical Engineering, 828)Amit Kumar (editor), Stefan Mozar (editor)2022Springer
822Frontiers in Cyber Security: 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers (Communications in Computer and Information Science)Chunjie Cao (editor), Yuqing Zhang (editor), Yuan Hong (editor), Ding Wang (editor)2022Springer
823Psycho-Cybernetics (Updated and Expanded)Maxwell Maltz2022
824Cyber Security: The Complete Guide to Cyber Threats and Protection 2nd EditionDavid Sutton2022BCS Learning and Development Ltd
825Cyber defense mechanisms security, privacy, and challengesKumar, Gautam(Editor);Saini, Dinesh Kumar(Editor);Cuong, Nguyen Ha Huy(Editor)2021CRC Press
826Rethinking Cybercrime: Critical DebatesTim Owen, Jessica Marshall2021Palgrave Macmillan
827CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002)Brent Chapman2021McGraw-Hill Education
828Cybersecurity in Digital Transformation: Scope and ApplicationsDietmar P.F. Möller2021Springer
829CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)Bobby E. Rogers2021McGraw-Hill
830Machine Intelligence and Big Data Analytics for Cybersecurity ApplicationsYassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi2021Springer
831Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected PapersSokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell2021Springer
832Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected PapersHein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha2021Springer
833Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)Andrew A. Bochman; Sarah Freeman2021CRC Press
834Practical AI for CybersecurityRavi Das2021CRC Press
835Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to DigitalPardeep Kumar, Vasaki Ponnusamy, Vishal Jain2021Engineering Science Reference
836Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The InternetSnowden, John2021
837Data-Centric Business and Applications: ICT Systems-Theory, Radio-Electronics, Information Technologies and CybersecurityTamara Radivilova, Dmytro Ageyev, Natalia Kryvinska2021Springer International Publishing;Springer
838ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical EngineeringAmit Kumar, Stefan Mozar2021Springer Singapore;Springer
839Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2020, 28-29 December 2020, Shanghai, ChinaMohammed Atiquzzaman, Neil Yen, Zheng Xu2021Springer Singapore;Springer
840Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure SecurityMarshall Copeland, Matthew Jacobs2021Apress
841THE NEW CYBERSECURITY FOR BEGINNERS AND DUMMIES: Extensive Guide To Getting Started In CybersecurityJEFF, DR. PATRICK2021
842Cybersecurity Research Analysis Report for Europe and Japan: Cybersecurity and Privacy Dialogue Between Europe and JapanAnna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc2021Springer International Publishing;Springer
843National Cyber Summit (NCS) Research Track 2020Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, Eric Imsand2021Springer International Publishing;Springer
844Artificial Intelligence and Industrial Applications: Artificial Intelligence Techniques for Cyber-Physical, Digital Twin Systems and Engineering ApplicationsTawfik Masrour, Ibtissam El Hassani, Anass Cherrafi2021Springer International Publishing;Springer
8452020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020)Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman2021Springer International Publishing;Springer
846A Journey of Embedded and Cyber-Physical Systems: Essays Dedicated to Peter Marwedel on the Occasion of His 70th BirthdayJian-Jia Chen2021Springer International Publishing;Springer
847Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & CybersecurityGrid, Alan2021
848The Philosophy of Lines: From Art Nouveau to CyberspaceThorsten Botz-Bornstein2021Springer Nature
849This Is How They Tell Me the World Ends: The Cyberweapons Arms RaceNicole Perlroth2021Bloomsbury Publishing USA
850Privacy, Regulations, and Cybersecurity: The Essential Business GuideChris Moschovitis2021
851A Profound Guide On Cyber Security: Getting Protected At Ease As a Professional And a BeginnerAmelia Mike2021
852Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidentsErdal Ozkaya2021Packt Publishing
853Ransomware Revolution: The Rise Of A Prodigious Cyber ThreatMatthew Ryan2021Springer
854CyberBRICS: Cybersecurity Regulations In The BRICS CountriesLuca Belli2021Springer
855Big Breaches: Cybersecurity Lessons For EveryoneNeil Daswani, Moudy Elbayadi2021Apress
856How Cybersecurity Really Works: A Hands-On Guide for Total Beginners - EARLY ACCESSSam Grubb2021No Starch Press
857Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity SuccessTyler Wall; Jarrett Rodrick2021Apress
858Cyberjutsu: Cybersecurity for the Modern NinjaBen McCarty2021No Starch Press
859The Game Has Changed:: Small Business Security And IT Advice In The Age Of CybercrimeJavaheri, David2021
860Inhabiting Cyberspace in India: Theory, Perspectives, and ChallengesSimi Malhotra, Kanika Sharma, Sakshi Dogra2021Springer
861Cybersecurity for SCADA SystemsWilliam T. Shaw2021PennWell Books
862Present And Future Paradigms Of Cyberculture In The 21st CenturySimber Atay, Gülsün Kurubacak-Meriç, Serap Sisman-Ugur2021IGI Global
863Cyberjutsu: Cybersecurity for the Modern NinjaBen McCarty2021No Starch Press
864Cyberjutsu: Cybersecurity for the Modern NinjaMcCarty, Ben2021
865Privacy, Regulations, And Cybersecurity: The Essential Business GuideChris Moschovitis2021John Wiley & Sons
866Transforming Cybersecurity Solutions Using BlockchainRashmi Agrawal, Neha Gupta2021Springer
867Understanding Communications Networks for Cybernetics ApplicationsKaveh Pahlavan2021River Publishers
868The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise NetworksPurackal, Rachel Sebastian2021
869Start-up Secure: Baking Cybersecurity into Your Company from Founding to ExitChris Castaldo2021
870Cyberjutsu: Cybersecurity for the Modern NinjaBen McCarty2021No Starch Press
871Shadow Warfare: Cyberwar Policy in the United States, Russia and ChinaElizabeth Van Wie Davis2021Rowman & Littlefield
872Neoliberalism and Cyberpunk Science Fiction: Living on the Edge of BurnoutCaroline Alphin2021Routledge
873Emergence of Cyber Physical System and IoT in Smart Automation and Robotics: Computer Engineering in AutomationKrishna Kant Singh, Anand Nayyar, Sudeep Tanwar, Mohamed Abouhawwash2021Springer
874Artificial Intelligence and Blockchain for Future Cybersecurity ApplicationsYassine Maleh, Youssef Baddi, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani2021Springer
875Cybercrime in Context: The human factor in victimization, offending, and policingMarleen Weulen Kranenbarg, Rutger Leukfeldt2021Springer
876Routledge Companion to Global Cyber-Security StrategyScott N. Romaniuk (editor), Mary Manjikian (editor)2021Routledge
877Cyber-Security Threats, Actors, and Dynamic MitigationNicholas Kolokotronis and Stavros Shiaeles2021CRC Press
878How Cybersecurity Really Works: A Hands-On Guide for Total BeginnersSam Grubb2021No Starch Press
879Adversarial Tradecraft in CybersecurityDan Borges2021Packt
880Modern Cryptography for Cyber Security Professionals(2021)[Bock][9781838644352]Lisa Bock2021Packt Publishing Pvt Ltd
881Modern Cryptography for Cybersecurity ProfessionalsLisa Bock2021Packt Publishing Pvt Ltd
882Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's dataLisa Bock2021Packt Publishing
883Cyberpunk Culture and Psychology: Seeing through the MirrorshadesAnna McFarlane2021Routledge
884Cyber Security Meets Machine LearningXiaofeng Chen, Willy Susilo, Elisa Bertino2021Springer
885Practical AI for CybersecurityRavi Das2021Auerbach Publications
886Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, ProceedingsShlomi Dolev; Oded Margalit; Benny Pinkas; Alexander Schwarzmann2021Springer
887Information-Driven Planning and Control (Cyber Physical Systems Series)Silvia Ferrari, Thomas A. Wettergren2021MIT Press
888Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's dataLisa Bock2021Packt Publishing
889Security Incidents & Response Against Cyber AttacksAkashdeep Bhardwaj, Varun Sapra2021Springer
890Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for BeginnersAlexander J. Roxon2021Apress
891Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity SuccessTyler Wall, Jarrett Rodrick2021Apress
892Further Advances in Internet of Things in Biomedical and Cyber Physical Systems: 193 (Intelligent Systems Reference Library, 193)Valentina E. Balas (editor), Vijender Kumar Solanki (editor), Raghvendra Kumar (editor)2021Springer
893Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant PerpetratorsMajeed Khader, Loo Seng Neo, Whistine Xiau Ting Chai2021World Scientific Pub Co Inc
894Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant PerpetratorsMajeed Khader, Whistine Xiau Ting Chai, Loo Seng Neo, Khader (editor), Majeed (editor), Neo (editor), Loo Seng (editor), Chai (editor), Whistine Xiau Ting (editor)2021World Scientific Publishing Co
895CyRM: Mastering the Management of Cybersecurity (Internal Audit and IT Audit)David X Martin2021CRC Press
896Cyberpolitics: Political Philosophy of the futureConstantino Pereira Martins ( ed.)2021IEF Coimbra University
897State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International LawEliza Watt2021Edward Elgar Publishing
898Cyber Security For Beginners: Learn How To Be Secure OnlineHazel, Riley Zoey.2021
899Optimal Spending on Cybersecurity Measures: Risk ManagementTara Kissoon2021Routledge
900Assessing and Insuring Cybersecurity RiskRavi Das2021CRC Press
901IT And Cyber Security For Beginners 2 Books in 1: Learn How To master IT and Cyber SecurityHazel , Riley Zoey.2021
902Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 ImplicationsGautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor)2021CRC Press
903Design, Applications, and Maintenance of Cyber-Physical SystemsPierluigi Rea, Erika Ottaviano, José Machado, and Katarzyna Antosz2021Engineering Science Reference (IGI Global)
904Cyberspace, Data Analytics, and PolicingDavid Skillicorn2021Chapman and Hall/CRC
905Securing Social Networks in CyberspaceAl-Sakib Khan Pathan (editor)2021CRC Press
906Auditing Information and Cyber Security Governance: A Controls-Based ApproachRobert E. Davis2021CRC Press
9072021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) ... Data Engineering and Communications Technol)Jemal Abawajy (editor), Zheng Xu (editor), Mohammed Atiquzzaman (editor), Xiaolu Zhang (editor)2021Springer Nature Switzerland AG
908Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science, 1436)Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor)2021Springer
909National Cyber Summit (NCS) Research Track 2021 (Lecture Notes in Networks and Systems, 310)Kim-Kwang Raymond Choo (editor), Tommy Morris (editor), Gilbert Peterson (editor), Eric Imsand (editor)2021Springer
910The Cybersecurity Manager's Guide: The Art of Building Your Security ProgramTodd Barnum2021O'Reilly Media
911Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor)2021World Scientific Publishing Co Pte Ltd
912Cybersecurity FundamentalsRajesh Kumar Goutam2021BPB Publications
913Cyber Threats and Nuclear WeaponsLin, Herbert;2021Stanford University Press
914Cyber Threats and Nuclear WeaponsHerbert Lin2021Stanford University Press
915The Cybersecurity Self-Help GuideArun Soni2021CRC Press
916A Simple Cyber Resilience Guide for BusinessCrawley, Kim;2021Wiley
9178 Steps to Better Security: A Simple Cyber Resilience Guide for BusinessKim Crawley2021Wiley
918Cyber Risks and Insurance: the Legal PrinciplesQC, Dean Armstrong; Steward, Thomas; Thakerar, Shyam2021Bloomsbury Publishing Plc
919CyberjutsuMcCarty, Ben2021No Starch Press
920A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems (Intelligent Systems Reference Library, 210)Pardeep Kumar (editor), Ahmed Jabbar Obaid (editor), Korhan Cengiz (editor), Ashish Khanna (editor), Valentina Emilia Balas (editor)2021Springer
921Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and ApplicationsHuadong Mo, Giovanni Sansavini, Min Xie2021Wiley
922Cybersecurity for Project Managers. A PRACTICAL GUIDENiharika Srivastav & Sanjay Saxena2021
923Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics)Anand Handa (editor), Rohit Negi (editor), Sandeep K. Shukla (editor)2021River Publishers
924Cybersecurity Issues in Emerging TechnologiesLeandros Maglaras (editor), Ioanna Kantzavelou (editor)2021CRC Press
925Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and Trends (Future of Business and Finance)Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari2021Springer
926Cyber Forensics: Examining Emerging and Hybrid TechnologiesAlbert J. Marcella (editor)2021CRC Press
927Cyber Law and Ethics: Regulation of the Connected WorldMark Grabowski, Eric P. Robinson2021Routledge
928Game Theory and Machine Learning for Cyber SecurityCharles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor)2021Wiley-IEEE Press
929Cyber Curiosity: A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern WorldLakeidra Smith2021New Degree Press
930Securing India in the Cyber EraSameer Patil2021Routledge
931Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's LeadersRenee Tarun2021Wiley
932Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against CyberattacksChris Peiris, Binil Pillai, Abbas Kudrati2021Wiley
933Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against CyberattacksChris Peiris, Binil Pillai, Abbas Kudrati2021Wiley
934Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's LeadersRenee Tarun2021Wiley
935Cybersecurity and Third-Party Risk: Third Party Threat HuntingGregory C. Rasner2021Wiley
936Cybersecurity and Third-Party Risk: Third Party Threat HuntingGregory C. Rasner2021Wiley
937The Smart Cyber Ecosystem for Sustainable Development: Principles, Building Blocks, and ParadigmsPardeep Kumar (editor), Vishal Jain (editor), Vasaki Ponnusamy (editor)2021Wiley-Scrivener
938Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity careerDr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen2021Packt Publishing
939Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity careerDr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen2021Packt Publishing
940The Smart Cyber Ecosystem for Sustainable Development: Principles, Building Blocks, and ParadigmsPardeep Kumar (editor), Vishal Jain (editor), Vasaki Ponnusamy (editor)2021Wiley-Scrivener
941CybersecurityDuane C. Wilson2021The MIT Press
942Innovations in Cyber Physical Systems: Select Proceedings of ICICPS 2020Jawar Singh, Sudhir Kumar, Umakanta Choudhury2021Springer
943Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition)Rajesh Kumar Goutam2021BPB Publications
944Game Theory for Cyber Deception: From Theory to ApplicationsJeffrey Pawlick, Quanyan Zhu2021Birkhäuser
945The Ultimate Guide on Cybersecurity + Data Science: 2 Books in 1. From Big Data to Knowledge Management + Data Analytics with R and the Blockchain for Your Business SuccessAdam Walker, Keith Hughes2021
946Verifying Cyber-Physical Systems: A Path to Safe Autonomy (Cyber Physical Systems Series)Sayan Mitra2021The MIT Press
947How Cybersecurity Really Works: A Hands-On Guide for Total BeginnersSam Grubb2021No Starch Press
948Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's LeadersRenee Tarun2021Wiley
949Cyberwarfare: Information Operations in a Connected WorldMike Chapple, David Seidl2021Jones & Bartlett Learning
950[Dissertation] Co-Design of Resilient Timing-Constrained Cyber-Physical SystemsHengyi Liang2021Northwestern University
951Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile DevicesAlex Alexandrou2021CRC Press
952Cybersecurity Data Science: Best Practices in an Emerging ProfessionScott Mongeau, Andrzej Hajdasinski2021Springer
953Cybersecurity Data Science: Best Practices in an Emerging ProfessionScott Mongeau, Andrzej Hajdasinski2021Springer
954Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor)2021Springer
955CybersecurityDuane C. Wilson2021The MIT Press
956Cyber Intelligence and Information Retrieval: Proceedings of CIIR 2021João Manuel R. S. Tavares (editor), Paramartha Dutta (editor), Soumi Dutta (editor), Debabrata Samanta (editor)2021Springer
957Practical AI for CybersecurityRavi Das2021Auerbach Publications
958Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environmentPascal Ackerman2021Packt Publishing
959Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environmentPascal Ackerman2021Packt Publishing
960Cybernetics for the Social SciencesBernard Scott2021BRILL
961Security of Cyber-Physical Systems: State Estimation and ControlChengwei Wu, Weiran Yao, Guanghui Sun, Ligang Wu2021Springer
962Security of Cyber-Physical Systems: State Estimation and ControlChengwei Wu, Weiran Yao, Guanghui Sun, Ligang Wu2021Springer
963Cyber Victimology: Decoding Cyber-Crime VictimisationDebarati Halder2021Routledge
964Network Security And Cyber Defense (CNSS)Singh, Gurpej2021
965Explainable AI Within the Digital Transformation and Cyber Physical Systems: XAI Methods and ApplicationsMoamar Sayed-Mouchaweh2021Springer
966Explainable AI Within the Digital Transformation and Cyber Physical Systems: XAI Methods and ApplicationsMoamar Sayed-Mouchaweh2021Springer
967Cybersecurity Data Science Best Practices in an Emerging ProfessionScott Mongeau, Andrzej Hajdasinski2021Springer
968Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environmentPascal Ackerman2021Packt Publishing
969Corporate Cybersecurity: Identifying Risks and the Bug Bounty ProgramJohn Jackson2021Wiley-IEEE Press
970Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995)Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop2021Springer
971Advanced Smart Computing Technologies in Cybersecurity and ForensicsKeshav Kaushik (editor), Shubham Tayal (editor), Akashdeep Bhardwaj (editor), Manoj Kumar (editor)2021CRC Press
972Cyber ForensicsRobert Karamagi2021
973Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-SuiteHelen E. Patton2021Wiley
974Cyberwars in the Middle EastAhmed Al-Rawi2021Rutgers University Press
975Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0Vikram Bali, Vishal Bhatnagar, Deepti Aggarwal, Shivani Bali, Mario José Diván2021CRC Press
976Types of CyberbullyingHerbert Scheithauer, Anja Schultze-Krumbholz, Jan Pfetsch, Markus Hess2021Wiley Blackwell
977Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-SuiteHelen E. Patton2021Wiley
978Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science)Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor)2021Springer
979Self-organising Multi-agent Systems: Algorithmic Foundations Of Cyber-anarcho-socialismJeremy Pitt2021WSPC (EUROPE)
980Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity (The Human Element in Smart and Intelligent Systems)Abbas Moallem (editor)2021CRC Press
981Cybermedia: Explorations in Science, Sound, and VisionJonathan Leal (editor), Selmin Kara (editor)2021Bloomsbury Academic
982Cyber Security Defense with Microsoft DefenderKawula, Dave; O'Neill Sr, John; Kawula, Cristal; Cabot, Emile; Sun, Cary2021
983Networking for Beginners: Simple Guide to Study Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber SecurityMathew, Jack2021
984Artificial Intelligence and Blockchain for Future Cybersecurity Applications (Studies in Big Data, 90)Yassine Maleh (editor), Youssef Baddi (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor)2021Springer
985Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business DisruptionsDaniel Lohrmann, Shamane Tan2021Wiley
986How Cybersecurity Really WorksSam Grubb2021
987Cybersecurity in the COVID-19 PandemicKenneth Okereafor2021CRC Press
988Cybersecurity Lessons from CoVID-19Robert Slade2021CRC Press
989Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidentsGlen D. Singh2021Packt Publishing
990Confronting Cyber Risk: An Embedded Endurance Strategy for CybersecurityGregory J. Falco, Eric Rosenbach2021Oxford University Press
991Cyber Forensics: Examining Emerging and Hybrid TechnologiesAlbert J. Marcella (editor)2021CRC Press
992Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor)2021Springer
993Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or OpportunitiesSanjay Misra (editor), Amit Kumar Tyagi (editor)2021Springer
994Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or OpportunitiesSanjay Misra (editor), Amit Kumar Tyagi (editor)2021Springer
995IT Governance and Information Security: Guides, Standards and Frameworks (Advances in Cybersecurity Management)Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui2021CRC Press
996Cyber Litigation: The Legal PrinciplesDean Armstrong, Fergus McCombie, Ceri Davis2021Bloomsbury Professional
997Data Analytics: Systems Engineering - Cybersecurity - Project ManagementChristopher Greco2021Mercury Learning and Information
998Cyber Litigation: The Legal PrinciplesDean Armstrong QC, Fergus McCombie, Ceri Davis2021Bloomsbury Professional
999Cybersecurity Lessons from COVID-19Robert Slade2021CRC Press
1000Advances in Cybersecurity ManagementKevin Daimi (editor), Cathryn Peoples (editor)2021Springer
1001Cybersecurity for Connected Medical DevicesArnab Ray2021Academic Press
1002Cybersecurity and Third-Party Risk: Third Party Threat HuntingGregory C. Rasner2021John Wiley & Sons
1003Cybersecurity for Connected Medical DevicesArnab Ray2021Academic Press
1004The Two Michaels: Innocent Canadian Captives and High Stakes Espionage in the US-China Cyber WarMike Blanchfield; Fen Osler Hampson2021
1005Process Operational Safety and Cybersecurity. A Feedback Control ApproachZhe Wu, Panagiotis D. Christofides2021Springer
1006Process Operational Safety and Cybersecurity: A Feedback Control Approach (Advances in Industrial Control)Zhe Wu, Panagiotis D. Christofides2021Springer
1007Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)Andrew A. Bochman, Sarah Freeman2021CRC Press
1008Cyber Crisis Management: The Practical Handbook On Crisis Management And Crisis CommunicationHolger Kaschner2021Springer
1009International Law As We Know It: Cyberwar Discourse and the Construction of Knowledge in International Legal ScholarshipLianne J. M. Boer2021Cambridge University Press
1010Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2021Apress
1011Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2021Apress
1012Research Handbook on International Law and CyberspaceNicholas Tsagourias (editor), Russell Buchan (editor)2021Edward Elgar Publishing Ltd
1013Advanced Cybersecurity TechnologiesRalph Moseley2021CRC Press
1014Advanced Cybersecurity TechnologiesRalph Moseley2021CRC Press
1015Strategies for e-Service, e-Governance, and Cyber Security: Challenges and Solutions for Efficiency and SustainabilityBhaswati Sahoo, Ranbindra Narayana Behera, Sasmita Rani Samanta, Prasant Kumar Pattnaik2021Apple Academic Press
1016CyRM: Mastering the Management of Cybersecurity (Internal Audit and IT Audit)David X Martin2021CRC Press
1017Research Anthology on Business Aspects of CybersecurityInformation Reso Management Association2021Information Science Reference
1018Exploring Malicious Hacker Communities: Toward Proactive Cyber-DefenseEricsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian2021Cambridge University Press
1019Cybersecurity: Ethics, Legal, Risks, and PoliciesIshaani Priyadarshini, Chase Cotton2021Apple Academic Press
1020Handbook of Research on Cyberchondria, Health Literacy, and the Role of Media in Society's Perception of Medical InformationHacer Aker, Mary Aiken2021Information Science Reference
1021Cyberspace in Peace and WarMartin Libicki2021Naval Institute Press
1022Cyberspace in Peace and WarMartin Libicki2021Naval Institute Press
1023Dynamically Enabled Cyber DefenseLin Yang, Quan Yu2021World Scientific Publishing Company
1024IEEE Systems, Man, & Cybernetics Magazine2021
1025IEEE Systems, Man, & Cybernetics Magazine2021
1026IEEE Systems, Man, & Cybernetics Magazine2021
1027Handbook of Research on Advancing Cybersecurity for Digital TransformationKamaljeet Sandhu (editor)2021Information Science Reference
1028Handbook of Research on Advancing Cybersecurity for Digital TransformationKamaljeet Sandhu (editor)2021Information Science Reference
1029Ethical Hacking Techniques and Countermeasures for Cybercrime PreventionNabie Y. Conteh2021IGI Global
10302021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 103)Mohammed Atiquzzaman (editor), Neil Yen (editor), Zheng Xu (editor)2021Springer
1031RUSSIA’S STRATEGY IN CYBERSPACEJanne Hakala, Jazlyn Melnychuk2021NATO StratCom COE and NATO Cooperative Cyber Defence COE
1032Agricultural CyberneticsYanbo Huang, Qin Zhang2021Springer
1033Bitskrieg: The New Challenge of CyberwarfareJohn Arquilla2021Polity
1034Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security ManagersAaron Roberts2021
1035Security Risk Models for Cyber InsuranceDavid Rios Insua, Caroline Baylon, Jose Vila2021
1036Modern Cryptography for Cybersecurity Professionals: Learn How You Can Use Encryption to Better Secure Your Organization's DataLisa Bock2021Packt Publishing
1037Cybersecurity Management: An Organizational and Strategic ApproachNir Kshetri2021University of Toronto Press
1038Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber WarfareA.J. Jenkinson2021CRC Press
1039The Cyber Security Body of Knowledge 1.1.0Cybok2021Cybok.org
1040How to get a job in cybersecurity earning over six figures : Zero to Cyber HeroLina Lau2021
1041Cyber-Physical Systems: AI and COVID-19Ramesh Poonia, Basant Agarwal, Sandeep Kumar, Mohammad Khan, Goncalo Marques, Janmenjoy Nayak2021Academic Press
10428 Steps to Better Security: A Simple Cyber Resilience Guide for BusinessKim Crawley2021Wiley
1043Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business DisruptionsDaniel Lohrmann; Shamane Tan2021Wiley
1044The Smartest Person in the Room: The Root Cause and New Solution for CybersecurityChristian Espinosa2021BookBaby
1045Cyber Crisis: Protecting Your Business from Real Threats in the Virtual WorldEric Cole2021BenBella Books
1046Heterogeneous Cyber Physical Systems of SystemsIoannis Papaefstathiou, Alkis Hatzopoulos2021River Publishers
1047Strategic Foresight and the EU Cyber Threat Landscape in 2025 : A Workshop ReportValentin Weber, Victoria Cygne Lara Toriser2021Deutsche Gesellschaft für Auswärtige Politik
1048Heterogeneous Cyber Physical Systems of SystemsIoannis Papaefstathiou, Alkis Hatzopoulos2021River Publishers
1049Self-organising Multi-agent Systems: Algorithmic Foundations Of Cyber-anarcho-socialismJeremy Pitt2021WSPC (EUROPE)
1050The Smartest Person in the Room: The Root Cause and New Solution for CybersecurityChristian Espinosa2021Lioncrest Publishing
1051Introduction to Cybersemiotics: A Transdisciplinary PerspectiveCarlos Vidales, Søren Brier2021Springer
1052CybersecurityDuane Wilson2021MIT Press
1053Cyberspies: Inside the World of Hacking, Online Privacy, and CyberterrorismMichael Miller2021Lerner Publishing Group
1054Cybercrime and Preventive Measures: A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition)Priyanka Tomar, Sanjay Gautam2021BPB Publications
1055Heterogeneous Cyber Physical Systems of SystemsAmara Amara, Yen-Kuang Chen, Yoshifumi Nishio2021Routledge. Taylor & Francis Group
1056Cyberphysical Infrastructures in Power Systems: Architectures and VulnerabilitiesMagdi S. Mahmoud, Haris M. Khalid, Mutaz M. Hamdan2021Academic Press
1057Cyberwarfare: Information Operations in a Connected WorldMike Chapple, David Seidl2021Jones & Bartlett Learning
1058Cyber Touch Class - 7Picture Book2021
1059Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International ContextR.V. Gundur, Michael Levi2021
1060Data Analytics: Systems Engineering - Cybersecurity - Project ManagementChristopher Greco2021Mercury Learning and Information
1061Cyber Risks and Insurance: The Legal PrinciplesDean Armstrong; Thomas Steward; Shyam Thakerar2021Bloomsbury Professional
1062Concerning Stephen Willats and the Social Function of Art: Experiments in Cybernetics and SocietySharon Irish2021Bloomsbury Visual Arts
1063Cyber Litigation: The Legal PrinciplesDean Armstrong; Fergus McCombie; Ceri Davis2021Bloomsbury Professional
1064Cyber Crime and Forensic Computing: Modern Principles, Practices, and AlgorithmsGulshan Shrivastava (editor); Deepak Gupta (editor); Kavita Sharma (editor)2021De Gruyter
1065Cyber Crime and Forensic Computing: Modern Principles, Practices, and AlgorithmsGulshan Shrivastava (editor); Deepak Gupta (editor); Kavita Sharma (editor)2021De Gruyter
1066Cyberspies: Inside the World of Hacking, Online Privacy, and CyberterrorismMichael Miller2021Twenty-First Century Books ™
1067Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile DevicesAlex Alexandrou2021CRC Press
1068Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile DevicesAlex Alexandrou2021CRC Press
1069Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile DevicesAlex Alexandrou2021CRC Press
1070The Cybersecurity Manager's Guide: The Art of Building Your Security ProgramTodd Barnum2021O'Reilly Media
1071The Cybersecurity Manager's Guide: The Art of Building Your Security ProgramTodd Barnum2021O'Reilly Media
1072The Cybersecurity Manager's Guide: The Art of Building Your Security ProgramTodd Barnum2021O'Reilly Media
1073Backdoor: Bypassing the Gatekeepers in CybersecurityFemi Reis2021Oluwafemi Reis
1074Cyberspace and Security: A fundamentally New ApproachVictor Sheymov2021163541
1075Cyberspace and Security: A fundamentally New ApproachVictor Sheymov2021163541
1076Cyberspace and Security: A fundamentally New ApproachVictor Sheymov2021163541
1077Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems, and the Internet of ThingsPeter Marwedel2021Springer Nature
1078I Am Being Cyberbullied...What's Next?C. R. McKay2021The Rosen Publishing Group, Inc
1079Be Cyber Secure : Tales, Tools and ThreatsJonathan Reuvid2021Legend Business Books
1080From City Space to Cyberspace: Art, Squatting, and Internet Culture in the NetherlandsAmanda Wasielewski2021Amsterdam University Press
1081Cyberflashing: Recognising Harms, Reforming LawsClare McGlynn; Kelly Johnson2021Bristol University Press
1082The Politics of Cybersecurity in the Middle EastJames Shires2021Hurst Publishers
1083Cyber Threats and Nuclear WeaponsHerbert Lin2021Stanford University Press
1084Cyberwars in the Middle EastAhmed Al-Rawi2021Rutgers University Press
1085The Cybernetic Theory of Decision: New Dimensions of Political AnalysisJohn D. Steinbruner2021Princeton University Press
1086Quantum Computing in CybersecurityRomil Rawat, Rajesh Kumar, Chakrawarti Sanjaya, Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, Hitesh Rawat2021Wiley
1087Cyber Intelligence: Actors, Policies, PracticesConstance S. Uthoff2021Lynne Rienner Publishers, Inc.
1088The Two Michaels: Innocent Canadian Captives and High Stakes Espionage in the US-China Cyber WarFen Hampson, Mike Blanchfield2021Sutherland House Books
1089Game Theory and Machine Learning for Cyber SecurityCharles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor)2021Wiley-IEEE Press
1090Cybernetic Architectures: Informational Thinking and Digital Design (Routledge Research in Architecture)Camilo Andrés Cifuentes Quin2021Routledge
1091Cybernetic Architectures: Informational Thinking and Digital Design (Routledge Research in Architecture)Camilo Andrés Cifuentes Quin2021Routledge
1092Adversary-Aware Learning Techniques and Trends in CybersecurityPrithviraj Dasgupta (editor), Joseph B. Collins (editor), Ranjeev Mittu (editor)2021Springer
1093Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (Lecture Notes in Networks and Systems)Matteo Zallio (editor), Carlos Raymundo Ibañez (editor), Jesus Hechavarria Hernandez (editor)2021Springer
1094Adolescent Risk Behavior and Self-Regulation: A Cybernetic PerspectiveFranz Resch, Peter Parzer2021Springer
1095Cyber ForensicsKaramagi, Robert2021Hewlett-Packard Company
1096Biocybernetics and Biomedical Engineering – Current Trends and Challenges: Proceedings of the 22nd Polish Conference on Biocybernetics and Biomedical ... 2021 (Lecture Notes in Networks and Systems)Dorota G. Pijanowska (editor), Krzysztof Zielinski (editor), Adam Liebert (editor), Janusz Kacprzyk (editor)2021Springer
1097Cybersecurity Risk of IoT on Smart CitiesRoberto O. Andrade, Luis Tello-Oquendo, Iván Ortiz2021Springer
1098Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks)Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra2021Springer
1099Cyber Security, Artificial Intelligence, Data Protection & the LawRobert Walters, Marko Novak2021Springer
1100Cyber Physical, Computer and Automation System: A Study of New Technologies (Advances in Intelligent Systems and Computing)Endra Joelianto (editor), Arjon Turnip (editor), Augie Widyotriatmo (editor)2021Springer
1101Cybercrime in Context: The human factor in victimization, offending, and policing (Crime and Justice in Digital Society, I)Marleen Weulen Kranenbarg (editor), Rutger Leukfeldt (editor)2021Springer
1102Cyber-Physical Systems: Modelling and Intelligent Control (Studies in Systems, Decision and Control, 338)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor)2021Springer
1103Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and ... and Technologies for Security Applications)Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor)2021Springer
1104Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies)Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor)2021Springer
1105Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Communications in Computer and Information Science)Wei Lu (editor), Qiaoyan Wen (editor), Yuqing Zhang (editor), Bo Lang (editor), Weiping Wen (editor), Hanbing Yan (editor), Chao Li (editor), Li Ding (editor), Ruiguang Li (editor)2021Springer
1106Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science)Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor)2021Springer
1107Cyber-Physical MicrogridsYan Li2021Springer
1108Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020 (Algorithms for Intelligent Systems)Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor)2021Springer
1109Data-Centric Business and Applications: ICT Systems—Theory, Radio-Electronics, Information Technologies and Cybersecurity (Lecture Notes on Data Engineering and Communications Technologies)Dmytro Ageyev (editor), Tamara Radivilova (editor), Natalia Kryvinska (editor)2021Springer
1110Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, ... Papers (Lecture Notes in Computer Science)Habtamu Abie (editor), Silvio Ranise (editor), Luca Verderame (editor), Enrico Cambiaso (editor), Rita Ugarelli (editor), Gabriele Giunta (editor), Isabel Praça (editor), Federica Battisti (editor)2021Springer
1111Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995)Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop2021Springer
1112Cyber-Physical Systems: Design and Application for Industry 4.0 (Studies in Systems, Decision and Control, 342)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor)2021Springer
1113Cyber-Physical Systems: Digital Technologies and Applications (Studies in Systems, Decision and Control, 350)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim V. Shcherbakov (editor)2021Springer
1114Digital Convergence in Contemporary Newsrooms: Media Innovation, Content Adaptation, Digital Transformation, and Cyber Journalism (Studies in Systems, Decision and Control, 370)Benedito Medeiros Neto (editor), Inês Amaral (editor), George Ghinea (editor)2021Springer
1115Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, ProceedingsSanjay Goel (editor), Pavel Gladyshev (editor), Daryl Johnson (editor), Makan Pourzandi (editor), Suryadipta Majumdar (editor)2021Springer
1116Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber ProgramRyan Leirvik2021Apress
11172021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 103)Mohammed Atiquzzaman (editor), Neil Yen (editor), Zheng Xu (editor)2021Springer
11182021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) ... and Communications Technologies, 81)Jemal Abawajy (editor), Zheng Xu (editor), Mohammed Atiquzzaman (editor), Xiaolu Zhang (editor)2021Springer
1119Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and TrendsGurdip Kaur; Ziba Habibi Lashkari; Arash Habibi Lashkari2021Springer Nature
11202021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 1Mohammed Atiquzzaman; Neil Yen; Zheng Xu2021Springer Nature
11212020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems: DPTA 2020Chuanchao Huang; Yu-Wei Chan; Neil Yen2021Springer Nature
11222021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1Jemal Abawajy; Zheng Xu; Mohammed Atiquzzaman; Xiaolu Zhang2021Springer Nature
1123Cyberspace Safety and Security: 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, ProceedingsJieren Cheng; Xiangyan Tang; Xiaozhang Liu2021Springer
1124Eingebettete Systeme: Grundlagen Eingebetteter Systeme in Cyber-Physikalischen Systemen (German Edition)Peter Marwedel2021Springer Vieweg
1125Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications)Jeffrey Pawlick, Quanyan Zhu2021Birkhäuser
1126Further Advances in Internet of Things in Biomedical and Cyber Physical Systems (Intelligent Systems Reference Library, 193)Valentina E. Balas (editor), Vijender Kumar Solanki (editor), Raghvendra Kumar (editor)2021Springer
1127Information Security Education for Cyber Resilience: 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22–24, 2021, Proceedings (IFIP ... and Communication Technology, 615)Lynette Drevin (editor), Natalia Miloslavskaya (editor), Wai Sze Leung (editor), Suné von Solms (editor)2021Springer
1128Outer Space and Cyber Space: Similarities, Interrelations and Legal Perspectives (Studies in Space Policy, 33)Annette Froehlich (editor)2021Springer
1129National Cyber Summit (NCS) Research Track 2021 (Lecture Notes in Networks and Systems)Kim-Kwang Raymond Choo (editor), Tommy Morris (editor), Gilbert Peterson (editor), Eric Imsand (editor)2021Springer
1130Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks)Kwangjo Kim, Harry Chandra Tanuwidjaja2021Springer
1131Researching Cybercrimes: Methodologies, Ethics, and Critical ApproachesAnita Lavorgna (editor), Thomas J. Holt (editor)2021Palgrave Macmillan
1132Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing)Akashdeep Bhardwaj (editor), Varun Sapra (editor)2021Springer
1133Society 5.0: Cyberspace for Advanced Human-Centered Society (Studies in Systems, Decision and Control, 333)Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor)2021Springer
1134Security in Cyber-Physical Systems: Foundations and Applications (Studies in Systems, Decision and Control, 339)Ali Ismail Awad (editor), Steven Furnell (editor), Marcin Paprzycki (editor), Sudhir Kumar Sharma (editor)2021Springer
1135Recent Advances in Soft Computing and Cybernetics (Studies in Fuzziness and Soft Computing, 403)Radek Matoušek (editor), Jakub Kudela (editor)2021Springer
1136Safety, Security and Privacy for Cyber-Physical Systems (Lecture Notes in Control and Information Sciences, 486)Riccardo M.G. Ferrari (editor), André M. H. Teixeira (editor)2021Springer
1137Proceedings of Second International Conference on Computing, Communications, and Cyber-Security: IC4S 2020 (Lecture Notes in Networks and Systems, 203)Pradeep Kumar Singh (editor), Slawomir T. Wierzchon (editor), Sudeep Tanwar (editor), Maria Ganzha (editor), Joel J. P. C. Rodrigues (editor)2021Springer
1138Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Security and Cryptology)Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor)2021Springer
1139Using Science in CybersecurityLeigh Metcalf, Jonathan Spring2021World Scientific
1140HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII ... Applications, incl. Internet/Web, and HCI)Abbas Moallem (editor)2021Springer
1141Cybersecurity For DummiesSteinberg, Joseph2020Wiley;For Dummies
1142Cybersecurity: Politics, Governance and Conflict in CyberspaceDamien Van Puyvelde, Aaron F. Brantly2020Wiley
1143The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber ThreatsRichard A. Clarke, Robert K. Knake2020Penguin Press
1144Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command LinePaul Troncone, Carl Albing2020O’Reilly Media
1145The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from CybercrimeScott Augenbaum2020Forefront Books
1146The Cybernetic Brain: Sketches of Another FutureAndrew Pickering2020University of Chicago Press
1147Cyber Security Intelligence and AnalyticsZheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh2020Springer International Publishing
1148Embedded, Cyber-Physical, and IoT Systems: Essays Dedicated to Marilyn Wolf on the Occasion of Her 60th BirthdayShuvra S. Bhattacharyya, Miodrag Potkonjak, Senem Velipasalar2020Springer International Publishing
1149Secure and Trustworthy Cyberphysical Microfluidic Biochips: A practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochipsJack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty, Ramesh Karri2020Springer International Publishing
1150Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USATareq Ahram, Waldemar Karwowski2020Springer International Publishing
1151Cyber-physical Systems and Digital Twins: Proceedings of the 16th International Conference on Remote Engineering and Virtual InstrumentationMichael E. Auer, Kalyan Ram B.2020Springer International Publishing
1152A Handbook of Internet of Things in Biomedical and Cyber Physical SystemValentina E. Balas, Vijender Kumar Solanki, Raghvendra Kumar, Md. Atiqur Rahman Ahad2020Springer International Publishing
1153Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics – 2019Gheorghe Ion Gheorghe2020Springer International Publishing
1154Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2017Jürgen Beyerer, Alexander Maier, Oliver Niggemann2020Springer Berlin Heidelberg; Springer Vieweg
1155Cybercrime Investigators HandbookGraeme Edwards2020John Wiley & Sons
1156Cyber Security: The Lifeline Of Information And Communication TechnologyRamjee Prasad, Vandana Rohokale2020Springer
1157New Paradigm Of Industry 4.0: Internet Of Things, Big Data & Cyber Physical SystemsSrikanta Patnaik2020Springer
1158Cyberspace Mimic Defense: Generalized Robust Control And Endogenous SecurityJiangxing Wu2020Springer
1159Machine Learning Approaches In Cyber Security AnalyticsTony Thomas, Athira P Vijayaraghavan, Sabu Emmanuel2020Springer
1160Handbook Of Computer Networks And Cyber Security: Principles And ParadigmsBrij Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta2020Springer
1161The Routledge Companion To Cyberpunk CultureAnna McFarlane, Lars Schmeink, Graham Murphy2020Routledge/Taylor & Francis Group
1162The Human Factor of CybercrimeRutger Leukfeldt; Thomas J. Holt2020Routledge
1163Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and TechniquesVinny Troia2020Wiley
1164International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber IntelligenceJemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman2020Springer International Publishing
1165Safe and Secure Cyber-Physical Systems and Internet-of-Things SystemsMarilyn Wolf, Dimitrios Serpanos2020Springer International Publishing
1166Current Trends in Biomedical Engineering and Bioimages Analysis: Proceedings of the 21st Polish Conference on Biocybernetics and Biomedical EngineeringJózef Korbicz, Roman Maniewski, Krzysztof Patan, Marek Kowal2020Springer International Publishing
1167Future Trends in Biomedical and Health Informatics and Cybersecurity in Medical Devices: Proceedings of the International Conference on Biomedical and Health Informatics, ICBHI 2019, 17-20 April 2019, Taipei, TaiwanKang-Ping Lin, Ratko Magjarevic, Paulo de Carvalho2020Springer International Publishing
1168National Cyber Summit (NCS) Research TrackKim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L. Peterson2020Springer International Publishing
1169Cyber-Physical Systems: Advances in Design & ModellingAlla G. Kravets, Alexander A. Bolshakov, Maxim V. Shcherbakov2020Springer International Publishing
1170Cyber-Physical Systems: Industry 4.0 ChallengesAlla G. Kravets, Alexander A. Bolshakov, Maxim V. Shcherbakov2020Springer International Publishing
1171Cyber-Physical Systems and ControlDmitry G. Arseniev, Ludger Overmeyer, Heikki Kälviäinen, Branko Katalinic2020Springer International Publishing
1172Reliable Communications within Cyber-Physical Systems Using the Internet (RC4CPS)Mohammad Elattar2020Springer Berlin Heidelberg;Springer Vieweg
1173ICCCE 2019: Proceedings of the 2nd International Conference on Communications and Cyber Physical EngineeringAmit Kumar, Stefan Mozar2020Springer Singapore
1174Cyber-Physical Energy and Power Systems: Modeling, Analysis and ApplicationYijia Cao, Yong Li, Xuan Liu, Christian Rehtanz2020Springer Singapore
1175The Ethics Of CybersecurityMarkus Christen, Bert Gordijn, Michele Loi2020Springer
1176Data Science In Cybersecurity And Cyberthreat IntelligenceLeslie F. Sikos, Kim-Kwang Raymond Choo2020Springer
1177Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and TechniquesVinny Troia2020Wiley
1178Human Dimensions of CybersecurityTerry Bossomaier; Steven D'Alessandro; Roger Bradbury2020CRC Press
1179Cybercrime investigators handbookEdwards, Graeme2020John Wiley & Sons
1180Mastering Linux Security And Hardening: Protect Your Linux Systems From Intruders, Malware Attacks, And Other Cyber ThreatsDonald A. Tevault2020Packtpub
1181Secrets of a Cyber Security ArchitectBrook S. E. Schoenfield2020CRC Press
1182Cybersecurity Attacks - Red Team Strategies: A practical guide to building a penetration testing program having homefield advantageJohann Rehberger2020Packt Publishing
1183The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber AttackWest, Levi2020
1184The Hacker and the State: Cyber Attacks and the New Normal of GeopoliticsBen Buchanan2020Harvard University Press
1185A Tangled Web: A Cyberstalker, a Deadly Obsession, and the Twisting PathLeslie Rule2020
1186The Cybernetic HypothesisTiqqun, Robert Hurley2020Semiotext(e)
1187Cybersecurity Fundamentals: A Real-World PerspectiveKutub Thakur; Al-Sakib Khan Pathan2020CRC Press
1188Cybersecurity Fundamentals: A Real-World PerspectiveKutub Thakur, Al-Sakib Khan Pathan2020CRC Press/Taylor & Francis Group
118925 Myths About Bullying And CyberbullyingElizabeth Kandel Englander2020Wiley-Blackwell
1190Distributed Control Methods and Cyber Security Issues in MicrogridsWenchao Meng (editor), Xiaoyu Wang (editor), Shichao Liu (editor)2020Academic Press
1191Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147)Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)2020Springer
1192Cyber-Physical Vehicle Systems: Methodology and Applications (Synthesis Lectures on Advances in Automotive Technology)Chen Lv, Yang Xing, Junzhi Zhang2020MORGAN & CLAYPOOL
1193Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)Padmavathi Ganapathi (editor), D. Shanmugapriya (editor)2020Information Science Reference
1194Cyber Operations and International LawFrançois Delerue2020Cambridge University Press
1195Cyber Threat Intelligence for the Internet of ThingsElias Bou-Harb; Nataliia Neshenko2020Springer Nature
1196Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacksTim Rains2020Packt Publishing
1197Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacksTim Rains2020Packt Publishing
1198The Palgrave Handbook Of International Cybercrime And CyberdevianceThomas J. Holt, Adam M. Bossler2020Palgrave Macmillan
1199Privileged Attack Vectors: Building Effective Cyber-defense Strategies to Protect OrganizationsMorey J. Haber2020Apress
1200Cyber Operations And International LawFrançois Delerue2020Cambridge University Press
1201Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual RiskGorecki2020Wiley
1202COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration TestingDylan Mach2020
1203COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration TestingMach, Dylan2020
1204COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration TestingMach, Dylan2020
1205Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual RiskAndrew Gorecki2020John Wiley & Sons Inc
1206Cybercrime Investigations: A Comprehensive Resource For EveryoneJohn Bandler, Antonia Merzon2020CRC Press/Routledge/Taylor & Francis Group
1207Adaptive Autonomous Secure Cyber SystemsSushil Jajodia (editor), George Cybenko (editor), V.S. Subrahmanian (editor), Vipin Swarup (editor), Cliff Wang (editor), Michael Wellman (editor)2020Springer
1208Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu2020Springer
1209Cyber-security in Critical Infrastructures: A Game-theoretic ApproachStefan Raß, Stefan Schauer, Sandra König, Quanyan Zhu2020Springer-Nature New York Inc
1210Cybercrime Investigations: A Comprehensive Resource for EveryoneJohn Bandler, Antonia Merzon2020CRC Press
1211The Hacker And The State: Cyber Attacks And The New Normal Of GeopoliticsBen Buchanan2020Harvard University Press
1212The Hacker and the State: Cyber Attacks and the New Normal of GeopoliticsBen Buchanan2020Harvard University Press
1213The Hacker and the State: Cyber Attacks and the New Normal of GeopoliticsBen Buchanan2020Harvard University Press
1214Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threatsMark Dunkerley, Matt Tumbarello2020Packt Publishing - ebooks Account
1215Cyberwarfare: An Introduction To Information-Age ConflictIsaac R. Porche III2020Artech House
1216Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threatsMark Dunkerley; Matt Tumbarello2020Packt Publishing Ltd
1217Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threatsMark Dunkerley; Matt Tumbarello2020Packt Publishing Ltd
1218Security And Law: Legal And Ethical Aspects Of Public Security, Cyber Security And Critical Infrastructure SecurityAnton Vedder , Jessica Schroers , Charlotte Ducuing , Peggy Valcke2020Intersentia
1219Cyber Arms: Security in CyberspaceStanislav Abaimov, Maurizio Martellini2020CRC Press
1220Cyber Arms: Security in CyberspaceStanislav Abaimov, Maurizio Martellini2020CRC Press
1221Cybersecurity for Information Professionals: Concepts and ApplicationsSuliman Hawamdeh (editor), Hsia-Ching Chang (editor)2020Auerbach Publications
1222Cyber Strategy: Risk-Driven Security and ResiliencyCarol A. Siegel, Mark Sweeney2020Auerbach Publications
1223Cyber And Digital Forensic Investigations: A Law Enforcement Practitioner’s PerspectiveNhien An Le Khac, Kim-Kwang Raymond Choo2020Springer
1224Cyber and Digital Forensic Investigations: A Law Enforcement Practitioner’s Perspective (Studies in Big Data (74))Nhien-An Le-Khac (editor), Kim-Kwang Raymond Choo (editor)2020Springer
1225The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in CybersecurityDan Shoemaker; Anne Kohnke; Ken Sigler2020CRC Press
1226CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed EditionTroy McMillan2020Pearson
1227Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at NightMcHale, David2020
1228The Pocket Guide to Cyber SecurityH, James; D, Usha2020Usha D & James H
1229Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity LeadershipMarcus J. Carey; Jennifer Jin2020John Wiley & Sons
1230Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)Gautam Kumar (editor), Dinesh Kumar Saini (editor), Nguyen Ha Huy Cuong (editor)2020CRC Press
1231Blockchain for Cybersecurity and Privacy (Internal Audit and IT Audit)Yassine Maleh (editor)2020CRC Press
1232Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial IntelligenceCallaway, Jason2020
1233Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial IntelligenceCallaway, Jason2020
1234Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber HackerBladen, Brian2020Zepp Media
1235Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber HackerBladen, Brian2020Zepp Media
1236ethical Hacking; Learn Penetration Testing, Cybersecurity with Advanced Ethical Hacking Techniques and MethodsGrant, Joe2020
1237Tribe of Hackers Blue Team: Tribal Knowledge from the best in Defensive CybersecurityMarcus J. Carey, Jennifer Jin2020Wiley
1238THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and businessMcKINNON, GUY2020UNKNOWN
1239The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber AttackLevi West2020
1240Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threatsGerard Johansen2020
1241Secure Beyond Breach: A Practical Guide: Building a Defense-in-Depth Cybersecurity Strategy Through Micro-SegmentationJonathan Reiber et al.2020Illumio
1242Distributed Blackness: African American CyberculturesAndré Brock, Jr.2020NYU Press
1243Cyber-Physical Systems: A Model-Based ApproachWalid M. Taha, Abd-Elhamid M. Taha, Johan Thunberg2020Springer
1244Cyber-Physical Systems: A Model-Based ApproachWalid M. Taha, Abd-Elhamid M. Taha, Johan Thunberg2020Springer
1245Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security ThreatsKiser, Quinn2020
1246Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Certification Guide)Omar Santos2020Cisco Press
1247Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Certification Guide)Omar Santos2020Cisco Press
1248Constitution and Production of Mathematics in the Cyberspace: A Phenomenological ApproachMaria Aparecida Viggiani Bicudo2020Springer International Publishing;Springer
1249Cyber Republic: Reinventing Democracy in the Age of Intelligent MachinesGeorge Zarkadakis2020MIT Press
1250Practical Vulnerability Management: A Strategic Approach to Managing Cyber RiskAndrew Magnusson2020No Starch Press
1251Cyber Security Handbook: Protect Yourself Against Cyber CrimeGreenwood, W. Muse2020
1252Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1Knowles, John; Knowles, John2020
1253Tribe of hackers blue team: tribal knowledge from the best in defensive cybersecurityCarey, Marcus J.; Jin, Jennifer2020Wiley
1254From Lambda calculus to cybersecurity through program analysis2020Springer
1255Cybercrime: An Encyclopedia Of Digital CrimeNancy E. Marion, Jason Twede2020ABC-CLIO
1256Cyber SecurityJocelyn O. Padallan2020Arcler Press
1257Cybersecurity In Humanities And Social Sciences: A Research Methods ApproachHugo Loiseau, Daniel Ventre, Hartmut Aden2020John Wiley & Sons/ISTE
1258Behind the Enigma: The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence AgencyJohn Ferris2020Bloomsbury Publishing
1259Cyber PrivacyApril Falcon Doss2020BenBella Books, Inc.
1260Cybersecurity for Beginners: How to prevent Phishing & Social Engineering AttacksMiller, Mike; Miller, Mike2020
1261Cybersecurity for Beginners : Incident Management Best PracticesMiller, Mike; Miller, Mike2020
1262Cybersecurity Law, Standards And RegulationsTari Schreider2020Rothstein Publishing
1263Cybersecurity Law, Standards and RegulationsSchreider Tari2020Rothstein Publishing
1264The ABC of Cybersecurity: How to prevent Phishing & Social Engineering Attacks, Incident Management Best Practices and Cybersecurity Awareness for EmployeesMiller, Mike; Miller, Mike2020
1265Gaian Systems: Lynn Margulis, Neocybernetics, and the End of the AnthropoceneBruce Clarke2020University of Minnesota Press
1266Detection of False Data Injection Attacks in Smart Grid Cyber-Physical SystemsBeibei Li, Rongxing Lu, Gaoxi Xiao2020Springer
1267Simulation for Cyber-Physical Systems Engineering: A Cloud-Based ContextJosé L. Risco Martín, Saurabh Mittal, Tuncer Ören2020Springer
1268CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide (2nd Edition) (Certification Guide)Troy McMillan2020Pearson IT Certification
1269CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide (2nd Edition) (Certification Guide)Troy McMillan2020Pearson IT Certification
1270First Line of Defense: The Beginners Book of Cyber SecurityNelson, Christopher2020
1271Model-driven Simulation and Training Environments for Cybersecurity Second International Workshop, MSTEC 2020.pdf2020Springer
1272Cyber-Physical-Social Intelligence: On Human-Machine-Nature SymbiosisHai Zhuge2020Springer Singapore
1273Handbook of Integration of Cloud Computing, Cyber Physical Systems and Internet of ThingsRajiv Ranjan, Karan Mitra, Prem Prakash Jayaraman, Lizhe Wang, Albert Y. Zomaya2020Springer
1274The Cyber Security Network GuideFiedelholtz2020Springer
1275Artificial Intelligence and the Law: Cybercrime and Criminal LiabilityDennis J. Baker, Paul H. Robinson2020Routledge
1276Machine Learning Approaches in Cyber Security AnalyticsTony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel2020Springer
1277Practical Cybersecurity ArchitectureEd Moyle, Diana Kelley2020Packt Publishing Pvt Ltd
1278Valuations of Early-Stage Companies and Disruptive Technologies: How to Value Life Science, Cybersecurity and ICT Start-ups, and their TechnologiesTiran Rothman2020Palgrave Macmillan
1279Artificial Intelligence, Cybersecurity and Cyber DefenceDaniel Ventre2020Wiley-ISTE
1280Artificial Intelligence, Cybersecurity and Cyber Defence BookDaniel Ventre2020
1281LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERSDARWIN, TYE2020GVS PUBLICATIONS
1282Transdisciplinary Perspectives on Risk Management and Cyber IntelligenceLuisa Dall'Acqua, Irene Maria Gironacci2020Information Science Reference
1283Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAMRegner Sabillon2020
1284Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020): 149 (Lecture Notes in Networks and Systems)Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar2020Springer Singapore
1285Cybersecurity and Information Security Analysts: A Practical Career GuideKezia Endsley2020Rowman & Littlefield
1286Cybersecurity for EveryoneDavid B. Skillicorn2020CRC Press
1287A Tangled Web: A Cyberstalker, a Deadly Obsession, and the Twisting Path to JusticeRule, Leslie2020Citadel Press; Kensington Publishing Corp
1288Quantum Cryptography and the Future of Cyber SecurityNirbhay Kumar Chaubey, Bhavesh B. Prajapati2020Information Science Reference
1289Rational Cybersecurity for Business: The Security Leaders' Guide to Business AlignmentDan Blum2020Apress
1290Cyber-Physical Systems in the Built EnvironmentChimay J. Anumba, Nazila Roofigari-Esfahan2020Springer International Publishing;Springer
1291Big Data Analytics for Cyber-Physical SystemsShiyan Hu, Bei Yu2020Springer International Publishing;Springer
1292Open Source Intelligence and Cyber Crime: Social Media AnalyticsMohammad A. Tayebi, Uwe Glässer, David B. Skillicorn2020Springer International Publishing;Springer
1293Security of Cyber-Physical Systems: Vulnerability and ImpactHadis Karimipour, Pirathayini Srikantha, Hany Farag, Jin Wei-Kocsis2020Springer International Publishing;Springer
1294Automotive Cyber Security: Introduction, Challenges, and StandardizationShiho Kim, Rakesh Shrestha2020Springer Singapore;Springer
1295Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected PapersSuresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar2020Springer Singapore;Springer
1296Frontiers in Cyber Security: Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, ProceedingsGuangquan Xu, Kaitai Liang, Chunhua Su2020Springer Singapore;Springer
1297Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2020 Cyberspace Congress, CyberDI/CyberLife 2020, Beijing, China, December 10–12, 2020, ProceedingsHuansheng Ning, Feifei Shi2020Springer Singapore;Springer
1298Cyber-Physical-Social Intelligence: On Human-Machine-Nature SymbiosisHai Zhuge2020Springer Singapore;Springer
1299Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-EspionageTimo Steffens2020Springer Berlin Heidelberg;Springer Vieweg
1300Machine Learning for Authorship Attribution and Cyber ForensicsFarkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung2020Springer International Publishing;Springer
1301Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part IXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang2020Springer International Publishing;Springer
1302Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part IIXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang2020Springer International Publishing;Springer
1303Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part IIIXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang2020Springer International Publishing;Springer
1304Getting Rid of Cybersickness: In Virtual Reality, Augmented Reality, and SimulatorsAndras Kemeny, Jean-Rémy Chardonnet, Florent Colombet2020Springer International Publishing;Springer
1305Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic ApproachQuanyan Zhu, Zhiheng Xu2020Springer International Publishing;Springer
1306Cybersecurity in Digital Transformation: Scope and ApplicationsDietmar P.F. Möller2020Springer International Publishing;Springer
1307The Palgrave Handbook of International Cybercrime and CyberdevianceThomas J. Holt, Adam M. Bossler2020Springer International Publishing;Palgrave Macmillan
1308Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USAIsabella Corradini, Enrico Nardelli, Tareq Ahram2020Springer International Publishing;Springer
1309Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, ProceedingsTouhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali2020Springer International Publishing;Springer
1310Proceedings of the International Conference of Mechatronics and Cyber- MixMechatronics - 2020Gheorghe Ion Gheorghe2020Springer International Publishing;Springer
1311Countering Cyber Threats to Financial Institutions: A Private and Public Partnership Approach to Critical Infrastructure ProtectionPierre-Luc Pomerleau, David L. Lowery2020Springer International Publishing;Palgrave Macmillan
1312Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, ProceedingsShlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss2020Springer International Publishing;Springer
1313Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of the 9th Computer Science On-line Conference 2020, Volume 3Radek Silhavy2020Springer International Publishing;Springer
1314Innovations in Cybersecurity EducationKevin Daimi, Guillermo Francia III2020Springer International Publishing;Springer
1315HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, ProceedingsAbbas Moallem2020Springer International Publishing;Springer
1316CyberKnife NeuroRadiosurgery : A practical GuideAlfredo Conti, Pantaleo Romanelli, Evangelos Pantelis, Scott G. Soltys, Young Hyun Cho, Michael Lim2020Springer International Publishing;Springer
1317Cyber-Security in Critical Infrastructures: A Game-Theoretic ApproachStefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu2020Springer International Publishing;Springer
1318Digitalisation and Human Security: A Multi-Disciplinary Approach to Cybersecurity in the European High NorthMirva Salminen, Gerald Zojer, Kamrul Hossain2020Springer International Publishing;Palgrave Macmillan
1319FICTION Cyberpunk RED: Digital Edition (v1.24)Mike Pondsmith, James Hutt, Cody Pondsmith, Jay Parker, J Gray, David Ackerman, Jaye Kovach2020R. Talsorian Games Inc.
1320Information Warfare in the Age of Cyber ConflictChristopher Whyte, A. Trevor Thrall, Brian M. Mazanec2020Routledge
1321Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threatsGerard Johansen2020
1322The Digital War: How China’s Tech Power Shapes the Future of AI, Blockchain, and CyberspaceWinston Ma; Anthony Scaramucci2020
1323The Book of Random Tables: CyberpunkMatt Davids2020dicegeeks.com
1324Cybersecurity LawJeff Kosseff2020John Wiley & Sons
1325EMBEDDED SYSTEM DESIGN embedded systems foundations of cyber-physical systems, and the... internet of things.PETER MARWEDEL2020SPRINGER NATURE
1326Cyberethics: Morality and Law in CyberspaceRichard A. Spinello2020Jones & Bartlett Publishers
1327Big Breaches: Cybersecurity Lessons for EveryoneNeil Daswani; Moudy Elbayadi2020Apress
1328Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity LeadershipMarcus J. Carey, Jennifer Jin2020John Wiley & Sons
1329Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity LeadershipJennifer Jin and Marcus J. Carey2020
1330Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive CybersecurityMarcus J. Carey, Jennifer Jin2020John Wiley & Sons Inc
1331Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity LeadershipMarcus J. Carey, Jennifer Jin2020John Wiley & Sons
1332Real-Time and Retrospective Analyses of Cyber SecurityDavid Anthony Bird2020IGI Global
1333Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threatsAditya Mukherjee2020Packt Publishing Ltd
1334Practical Vulnerability Management: A Strategic Approach to Managing Cyber RiskAndrew Magnusson2020No Starch Pr
1335Anarchist Cybernetics: Control and Communication in Radical PoliticsThomas Swann2020Bristol University Press
1336Routledge Handbook Of International CybersecurityEneken Tikk, Mika Kerttunen2020Routledge/Taylor & Francis Group
1337Cybersecurity AnalyticsRakesh M. Verma; David J. Marchette2020CRC Press
1338Governing Cyberspace: Behavior, Power, and DiplomacyDennis Broeders (editor), Bibi van den Berg (editor)2020Rowman & Littlefield
1339CybersecurityLewis, Elijah2020
1340The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied ResearchOpen Source Researchers2020The Open Source Research Society
1341Myths and Realities of Cyber Warfare: Conflict in the Digital RealmNicholas Michael Sambaluk2020Praeger
1342Russian Cyber Operations: Coding the Boundaries of ConflictScott Jasper2020Georgetown University Press
1343Cyberwarfare: An Introduction To Information-Age ConflictPorsche I.2020
1344Constructing cybersecurity: Power, expertise and the internet security industry (Manchester University Press)Andrew Whiting2020Manchester University Press
1345Confluence of AI, Machine, and Deep Learning in Cyber ForensicsSanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (editor)2020Information Science Reference
1346Artificial Intelligence Paradigms for Smart Cyber-Physical SystemsAshish Kumar Luhach (editor), Atilla Elçi (editor)2020Engineering Science Reference
1347A Closer Look at Cybersecurity and CryptanalysisC. Rupa (editor), Sirajuddin (editor)2020Nova Science Pub Inc
1348Distributed Blackness: African American Cybercultures: 9 (Critical Cultural Communication)Jr. André Brock2020NYU Press
1349Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision MakingHamid Jahankhani, Liam M. O’Dell, Gordon Bowen, Daniel Hagan, Arshad Jamal2020Academic Press
1350Governing New Frontiers In The Information Age: Toward Cyber PeaceScott J. Shackelford2020Cambridge University Press
1351Concerning Stephen Willats and the Social Function of Art: Experiments in Cybernetics and SocietySharon Irish2020Bloomsbury Visual Arts
1352Cyber Risks and Insurance: The Legal PrinciplesDean Armstrong; Thomas Steward; Shyam Thakerar2020Bloomsbury Professional
1353Drone Visions: A Brief Cyberpunk History of Killing MachinesNaief Yehya2020Hyperbole Books Digital
1354Multi-Paradigm Modelling Approaches for Cyber-Physical SystemsBedir Tekinerdogan (editor), Dominique Blouin (editor), Hans Vangheluwe (editor), Miguel Goulão (editor), Paulo Carreira (editor), Vasco Amaral (editor)2020Academic Press
1355Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based EnvironmentsRic Messier2020McGraw-Hill Education
1356Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit SourcesUS Department of Justice2020US Department of Justice
1357Distributed Blackness: African American Cybercultures: 9 (Critical Cultural Communication)Jr. André Brock2020NYU Press
1358Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Advances in Information Security, Privacy, and Ethics)Natalie Sjelin (editor)2020IGI Global
1359Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threatsAditya Mukherjee2020Packt Publishing
1360Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architectsEd Moyle, Diana Kelley2020Packt Publishing
1361Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse: and Everything in Between | 2020 Paperback | Identify Theft | Bitcoin | ... Online Security | Fake News (Survival Series)Heather Vescent, Nick Selby2020Weldon Owen
1362Hacking with Kali Linux: A beginner’s guide to learning all the basic of Kali Linux and cybersecurity. Includes network defense strategies, penetration testing and hacking tools for computerLaurence, Norman2020
1363Artificial Intelligence, Cybersecurity and Cyber DefenceDaniel Ventre2020Wiley-ISTE
1364Cyber WarfareChase Cunningham2020Packt Publishing
1365Medical Device Cybersecurity for Engineers and ManufacturersAxel Wirth, Christopher Gates, Jason Smith2020Artech House
1366Developing a Cybersecurity Immune System for Industry 4.0Sergei Petrenko (author)2020River Publishers
1367Tackling Cyberbullying and Related Problems. Innovative Usage of Games, Apps and MangaYuichi Tod, Insoo Oh (eds.)2020Taylor & Francis
1368The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacksAlan Calder2020IT Governance Publishing Ltd
1369The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber AttacksAlan Calder2020IT Governance Ltd
1370Manipulated: Inside the Cyberwar to Hijack Elections and Distort the TruthTheresa Payton2020Rowman & Littlefield Publishers
1371Cyber security A national priority of BangladeshMd. Shariful Islam2020Routledge
1372Cyber Strategy: Risk-Driven Security and ResiliencyCarol A. Siegel, Mark Sweeney2020Auerbach Publications
1373Successful Cybersecurity Professionals: How To Change Your Behavior to Protect Your OrganizationSteven Brown2020Business Expert Press
1374Cyber Warfare: A Documentary And Reference GuidePaul J. Springer2020Greenwood | ABC-CLIO
1375Cybersecurity for Small and Midsize BusinessesMarlon Bermudez2020BookBaby
1376IEEE Systems, Man, & Cybernetics Magazine2020
1377IEEE Systems, Man, & Cybernetics Magazine2020
1378IEEE Systems, Man, & Cybernetics Magazine2020
1379IEEE Systems, Man, & Cybernetics Magazine2020
1380Cybersecurity for Space: Protecting the Final FrontierJacob G. Oakley2020Apress
1381Cybersecurity and Decision Makers: Data Security and Digital TrustMarie De Fréminville2020Wiley-ISTE
1382Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safeShira Rubinoff2020Packt Publishing
1383A Visual History of CybersecurityOptiv (firm)2020optiv.com
1384AI in the Age of Cyber-Disorder. Actors, Trends, and ProspectsFabio Rugge2020Ledizioni
1385Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your OrganizationPascal Ackerman2020BPB Publications
1386Cyber Security Practitioner's GuideHamid Jahankhani (editor)2020WSPC
1387Cyber Security Practitioner's GuideHamid Jahankhani (editor)2020WSPC
1388Cyber Security Practitioner's GuideHamid Jahankhani (editor)2020WSPC
1389Artificial Intelligence, Cybersecurity and Cyber DefenceDaniel Ventre2020Wiley-ISTE
1390Ramble: An Irregular Cyberpunk Journey into the Musical HeartD. B. Goodin2020David Goodin Author
1391Cyber Security ABCs: Delivering Awareness, Behaviours and Culture ChangeJessica Barker; Adrian Davis; Bruce Hallas; Ciarán Mc Mahon2020BCS, The Chartered Institute for IT
1392A Short & Happy Guide to Privacy and Cybersecurity LawJon M. Garon2020West Academic Publishing
1393Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected PapersHein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha2020Springer
1394Security Risk Models for Cyber InsuranceCaroline Baylon, Jose Vila, David Rios Insua2020CRC Press/Chapman & Hall
1395Psycho-Cybernetics and Self-FulfillmentMaxwell Maltz2020BN Publishing
1396Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your CareerJessica Barker2020Kogan Page
1397Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and TechniquesVinny Troia2020Wiley
1398Cybersecurity and Resilience in the ArcticBenjamin D. Trump, Kamrul Hossain, Igor Linkov2020IOS Press
1399Handbook of Computer Networks and Cyber Security. Principles and ParadigmsBrij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta2020Springer
1400Cyber Warfare – Truth, Tactics, and StrategiesDr. Chase Cunningham2020Packt
1401Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfareDr. Chase Cunningham2020Packt Publishing
1402Developing a Cybersecurity Immune System for Industry 4.0Sergei Petrenko;2020CRC Press (Unlimited)
1403Cyber Risk, Intellectual Property Theft and Cyberwarfare: Asia, Europe and the USARuth Taplin2020Routledge
1404Cybercrimes: Critical Issues in a Global Context2020Red Globe Press
1405CYBERSECURITY RISKS, PROGRESS, AND THE WAY FORWARD IN LATIN AMERICA AND THE CARIBBEANcoll.2020Cybersecurity Report
1406Cyber Security Report 2020.coll.2020CPR
1407Cybercrime: Current Threats and Responses A review of the research literatureSheelagh Brady & Caitríona Heinl2020SAR Consultancy & EXEDEC
1408Cybernetic Psychology and Mental Health: A Circular Logic Of Control Beyond The Individual (Concepts for Critical Psychology)Timothy J. Beck2020Routledge
1409Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202Richard Medlin; Nitin Sharma; Justin Casey2020Independently Published
1410Privacy, Security, and Cyberspace, Revised EditionRobert Plotkin2020Infobase Holdings, Inc
1411Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect OrganizationsMorey J. Haber2020Apress
1412Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing AttacksTrust Genics2020Thomas William
1413Cyber Security: Essential Principles to Secure Your OrganisationAlan Calder; Archie (Male Synthesized Voice)2020IT Governance Ltd
1414The Projected and Prophetic: Humanity in Cyberculture, Cyberspace, and Science FictionJordan J. Copeland2020BRILL
1415Visions of the Human in Science Fiction and CyberpunkMarcus Leaning; Birgit Pretzsch2020BRILL
1416Distributed Blackness: African American CyberculturesAndré Brock, Jr.2020New York University Press
1417Global Obscenities: Patriarchy, Capitalism, and the Lure of CyberfantasyZillah Eisenstein2020New York University Press
1418Anarchist Cybernetics: Control and Communication in Radical PoliticsThomas Swann2020Bristol University Press
1419The Hacker and the State: Cyber Attacks and the New Normal of GeopoliticsBen Buchanan2020Harvard University Press
1420Constructing cybersecurity: Power, expertise and the internet security industryAndrew Whiting2020Manchester University Press
1421The Risk Business: What CISOs Need to Know about Risk-Based CybersecurityLevi Gundert2020
1422Mastering Core Essentials Cyber Hacking Point of Sale and Credit Card PaymentsBaig Mohsin2020
1423Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (Lecture Notes in Electrical Engineering, 643)Vinit Kumar Gunjan (editor), Sabrina Senatore (editor), Amit Kumar (editor), Xiao-Zhi Gao (editor), Suresh Merugu (editor)2020Springer
1424Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)Shishir K. Shandilya (editor), Neal Wagner (editor), Atulya K. Nagar (editor)2020Springer
1425Blockchain Cybersecurity, Trust and Privacy (Advances in Information Security, 79)Kim-Kwang Raymond Choo (editor), Ali Dehghantanha (editor), Reza M. Parizi (editor)2020Springer
1426Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code FingerprintingSaed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna2020Springer
1427Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threatsDonald A. Tevault2020Packt
1428Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Series on Asian Criminology and Criminal Justice Research)Balsing Rajput2020Springer
1429Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2019 (Algorithms for Intelligent Systems)Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor), Balasubramanian Raman (editor)2020Springer
1430Data-Driven Modeling of Cyber-Physical Systems using Side-Channel AnalysisSujit Rokka Chhetri, Mohammad Abdullah Al Faruque2020Springer
1431Cyber Physical Systems. Model-Based Design: 9th International Workshop, CyPhy 2019, and 15th International Workshop, WESE 2019, New York City, NY, ... Applications, incl. Internet/Web, and HCI)Roger Chamberlain (editor), Martin Edin Grimheden (editor), Walid Taha (editor)2020Springer
1432Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982)Jaideep Vaidya (editor), Xiao Zhang (editor), Jin Li (editor)2020Springer
1433Cyber Security in India: Education, Research and Training (IITK Directions, 4)Sandeep Kumar Shukla (editor), Manindra Agrawal (editor)2020Springer
1434Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications)Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Nishan Chelvachandran (editor), Jaime Ibarra (editor)2020Springer
1435Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers (Security and Cryptology)Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens (editor), Costas Lambrinoudakis (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor), Frank Pallas (editor)2020Springer
1436The NICE Cyber Security Framework: Cyber Security ManagementIzzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh2020Springer
1437Transactions on Computational Science XXXVI: Special Issue on Cyberworlds and CybersecurityMarina L. Gavrilova (editor), C.J. Kenneth Tan (editor), Alexei Sourin (editor)2020Springer
1438Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147)Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)2020Springer
1439Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019) (Advances in Intelligent Systems and Computing, 1088)Chuanchao Huang (editor), Yu-Wei Chan (editor), Neil Yen (editor)2020Springer
1440Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146)Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor)2020Springer
1441Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part II (Security and Cryptology)Jaideep Vaidya (editor), Xiao Zhang (editor), Jin Li (editor)2020Springer
1442Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2019, 28-29 December 2019, Shenyang, China (Advances in Intelligent Systems and Computing, 1117)Mohammed Atiquzzaman (editor), Neil Yen (editor), Zheng Xu (editor)2020Springer
1443Hypno-Cybernetics: Helping Yourself to a Rich New LifeRobert B. Stone; Sidney Petrie2020Dennis A. Stone
1444Foundations of Multi-Paradigm Modelling for Cyber-Physical SystemsPaulo Carreira (editor), Vasco Amaral (editor), Hans Vangheluwe (editor)2020Springer
1445Information and Cyber Security: 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Communications in Computer and Information Science, 1166)Hein Venter (editor), Marianne Loock (editor), Marijke Coetzee (editor), Mariki Eloff (editor), Jan Eloff (editor)2020Springer
1446Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) (Lecture Notes in Networks and Systems, 121)Pradeep Kumar Singh (editor), Wieslaw Pawlowski (editor), Sudeep Tanwar (editor), Neeraj Kumar (editor), Joel J. P. C. Rodrigues (editor), Mohammad Salameh Obaidat (editor)2020Springer
1447For the Love of Cybernetics: Personal Narratives by CyberneticiansJocelyn Chapman2020Routledge
1448Open Source Intelligence and Cyber Crime: Social Media AnalyticsMohammad A. Tayebi, Uwe Glässer, David B. Skillicorn2020Springer International Publishing
1449Understanding cyber warfare: politics, policy and strategyMazanec, Brian M.; Whyte, Christopher2019Routledge
1450Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking ConceptsEthem Mining2019Independently published
1451Cyber Crisis Management: Overcoming the Challenges in CyberspaceRodney D Ryder, Ashwin Madhavan2019Bloomsbury India
1452Cyber Resilience of Systems and NetworksAlexander Kott, Igor Linkov2019Springer International Publishing
1453Cybernetics and Algorithms in Intelligent SystemsRadek Silhavy2019Springer International Publishing
1454Pathology of Learning in Cyber SpaceSayed Hadi Sadeghi2019Springer International Publishing
1455Advances in Human Factors in CybersecurityTareq Z. Ahram, Denise Nicholson2019Springer International Publishing
1456CyberGIS for Geospatial Discovery and InnovationShaowen Wang, Michael F. Goodchild2019Springer Netherlands
1457Networked Predictive Control of Systems with Communication Constraints and Cyber AttacksZhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun2019Springer Singapore
1458Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThingsEhab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang2019Springer
1459Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and InstitutionsPaul Rohmeyer, Jennifer L. Bayuk2019Apress
1460Intelligent Systems in Cybernetics and Automation Control TheoryRadek Silhavy, Petr Silhavy, Zdenka Prokopova2019Springer International Publishing
1461Preparing for the Next Cyber Revolution: How Our World Will Be Radically Transformed—Again!Joseph N. Pelton2019Springer International Publishing
1462Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, ProceedingsFrank Breitinger, Ibrahim Baggili2019Springer International Publishing
1463Cybercryptography: Applicable Cryptography for Cyberspace SecuritySong Y. Yan2019Springer International Publishing
1464Cyber-Physical Systems: Architecture, Security and ApplicationSong Guo, Deze Zeng2019Springer International Publishing
1465Biometric-Based Physical and Cybersecurity SystemsMohammad S. Obaidat, Issa Traore, Isaac Woungang2019Springer International Publishing
1466International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and IntelligenceJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman2019Springer International Publishing
1467Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2018Jürgen Beyerer, Christian Kühnert, Oliver Niggemann2019Springer Berlin Heidelberg,Springer Vieweg
1468ICCCE 2018: Proceedings of the International Conference on Communications and Cyber Physical Engineering 2018Amit Kumar, Stefan Mozar2019Springer Singapore
1469Social Network Forensics, Cyber Security, and Machine LearningP. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat2019Springer Singapore
1470Advances in Cyber Security: Principles, Techniques, and ApplicationsKuan-Ching Li, Xiaofeng Chen, Willy Susilo2019Springer Singapore
1471Intellectual Property Rights in CyberspaceAkash kamal Mishra2019Cyberlekh
1472Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the WorldMarcus J Carey2019Threatcare Press
1473Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O’Leary2019Apress
1474Cyber Security: Threats and Responses for Government and BusinessJack Caravelli, Nigel Jones2019Praeger Security International
1475Professional Red Teaming: Conducting Successful Cybersecurity EngagementsJacob G. Oakley2019Apress
1476Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber OperationsHerbert Lin; Amy Zegart2019Brookings Institution Press
1477Resilience of Cyber-Physical Systems: From Risk Modelling to Threat CounteractionFrancesco Flammini2019Springer
1478An introduction to cyber modeling and simulationCouretas, Jerry M2019Wiley
1479Human-computer interaction and cybersecurity handbookMoallem, Abbas2019CRC Press
1480Deviance in Social Media and Social Cyber Forensics: Uncovering Hidden Relations Using Open Source Information (OSINF)Samer Al-khateeb, Nitin Argawal2019Springer
1481The NICE Cyber Security Framework: Cyber Security Intelligence and AnalyticsIzzat Alsmadi2019Springer International Publishing
1482Narratives in Research and Interventions on Cyberbullying among Young PeopleHeidi Vandebosch, Lelia Green2019Springer International Publishing
1483Cyberdiplomacy : managing security and governance onlineRiordan, Shaun2019Polity Press
1484Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected PapersSokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis2019Springer International Publishing
1485CyberParks – The Interface Between People, Places and Technology: New Approaches and PerspectivesCarlos Smaniotto Costa, Ina Šuklje Erjavec, Therese Kenna, Michiel de Lange, Konstantinos Ioannidis, Gabriela Maksymiuk, Martijn de Waal2019Springer International Publishing
1486Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital CrimeAamo Iorliam2019Springer International Publishing
1487Drones as Cyber-Physical Systems: Concepts and Applications for the Fourth Industrial RevolutionJung-Sup Um2019Springer Singapore
1488Internet Addiction Among Cyberkids in China: Risk Factors and Intervention StrategiesQiaolei Jiang2019Springer Singapore
1489Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected PapersXiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou2019Springer Singapore
1490Emerging Trends in Cyber Ethics and EducationAshley Blackburn, Irene Linlin Chen2019IGI Global
1491Cyberdanger: Understanding and Guarding Against CybercrimeEddy Willems2019Springer
1492The Cyber Plumber’s Handbook: The definitive guide to SSH tunneling, port redirection, and bending traffic like a boss.Brennon Thomas2019Opsdisk LLC
1493Understanding Cyberrisks in IoT: When Smart Things Turn Against YouCarolina A. Adaros Boye2019Business Expert Press
1494Kingdom of Lies: Unnerving Adventures in the World of CybercrimeKate Fazzini2019St. Martin’s Press
1495Practical Cyber Forensics. An Incident-based Approach to Forensic InvestigationsNiranjan Reddy2019Apress
1496Cybersecurity of Industrial SystemsJean-Marie Flaus2019ISTE, John Wiley & Sons
1497Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal BehaviorCarbon Black2019Carbon Black
1498Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive CybersecurityMarcus J. Carey, Jennifer Jin2019Wiley
1499The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of CybersecurityPhil Quade2019John Wiley & Sons
1500Cyber Enigma: Unravelling the Terror in the Cyber WorldE. Dilipraj2019Routledge
1501Deviant Security - The Technical Computer Security Practices of Cyber CriminalsEric Van De Sandt2019University of Bristol
1502Rewired: The Past, Present, and Future of CybersecurityRyan Ellis; Vivek Mohan2019Wiley
1503Practical Cyber Forensics: An Incident-Based Approach to Forensic InvestigationsNiranjan Reddy2019Apress
1504Design Automation of Cyber-Physical SystemsMohammad Abdullah Al Faruque, Arquimedes Canedo2019Springer International Publishing
1505Big Data Privacy Preservation for Cyber-Physical SystemsMiao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han2019Springer International Publishing
1506Navigating New Cyber Risks: How Businesses Can Plan, Build and Manage Safe Spaces in the Digital AgeGanna Pogrebna, Mark Skilton2019Springer International Publishing; Palgrave Macmillan
1507Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart EnvironmentsAboul Ella Hassanien, Mohamed Elhoseny2019Springer International Publishing
1508Cyber Physical Systems. Design, Modeling, and Evaluation: 7th International Workshop, CyPhy 2017, Seoul, South Korea, October 15-20, 2017, Revised Selected PapersRoger Chamberlain, Walid Taha, Martin Törngren2019Springer International Publishing
1509Proceedings of the 12th International Conference on Measurement and Quality Control - Cyber Physical Issue: IMEKO TC 14 2019Vidosav D. Majstorovic, Numan Durakbasa2019Springer International Publishing
1510Human Activity Recognition and Behaviour Analysis: For Cyber-Physical Systems in Smart EnvironmentsLiming Chen, Chris D. Nugent2019Springer International Publishing
1511Cybernetics and Automation Control Theory Methods in Intelligent Algorithms: Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3Radek Silhavy2019Springer International Publishing
1512Simplicity is Complex: Foundations of Cyber-Physical System DesignHermann Kopetz2019Springer International Publishing
1513Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, ProceedingsShlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung2019Springer International Publishing
1514HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, ProceedingsAbbas Moallem2019Springer International Publishing
1515Cyber Physical Systems. Model-Based Design: 8th International Workshop, CyPhy 2018, and 14th International Workshop, WESE 2018, Turin, Italy, October 4–5, 2018, Revised Selected PapersRoger Chamberlain, Walid Taha, Martin Törngren2019Springer International Publishing
1516Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and ApplicationsDietmar P.F. Möller, Roland E. Haas2019Springer International Publishing
1517Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Third International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP)Yang Xu, Hong Xia, Feng Gao, Weihua Chen, Zheming Liu, Pengfei Gu2019Springer Singapore
1518Cyberwar and Revolution: Digital Subterfuge in Global CapitalismNick Dyer-Witheford; Svitlana Matviyenko2019University of Minnesota Press
1519Cybersecurity Blue Team ToolkitNadean H. Tanner2019Wiley
1520Behavioral Cybersecurity: Applications of Personality Psychology and Computer ScienceWayne Patterson, Cynthia E. Winston-Proctor2019Taylor & Francis;CRC
1521CISO compass: navigating cybersecurity leadership challenges with insights from pioneersFitzgerald, Todd2019CRC Press
1522Computer and cyber security: principles, algorithm, applications, and perspectivesAgrawal, Dharma Prakash; Gupta, Brij; Wang, Haoxiang2019CRC Press
1523Cybersecurity and Privacy in Cyber–Physical SystemsYassine Maleh, Shojafar Mohammad, Darwish Ashraf, Haqiq Abdelkrim2019CRC Press
1524Cybersecurity awareness among students and facultyMoallem, Abbas2019CRC Press/Taylor & Francis Group
1525Machine learning for computer and cyber security: principles, algorithms, and practicesGupta, Brij; Sheng, Quan Z2019CRC Press
1526Weapons Systems: Annual Assessment and CybersecurityDale R. Cople2019Nova Science Publishers
1527Rewired: Cybersecurity GovernanceRyan Ellis, Vivek Mohan2019Wiley & Sons
1528A Leader’s Guide to Cybersecurity: Why Boards Need to Lead–and How to Do ItThomas J. Parenty, Jack J. Domet2019Harvard Business Review Press
1529Cybersecurity Law 2nd EditionJeff Kosseff2019Wiley
1530The Cyber Patient: Navigating Virtual InformaticsRebecca Mendoza Saltiel Busch2019Taylor and Francis
1531Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous HackersAndy Greenberg2019Doubleday Books
1532System Administration Ethics: Ten Commandments For Security And Compliance In A Modern Cyber WorldIgor Ljubuncic, Tom Litterer2019Springer/Apress
1533Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous HackersAndy Greenberg2019Doubleday Books
1534Cyber-Security And Information WarfareNicholas J. Daras2019Nova Science Publishers
1535Cybercrime Prevention: Theory And ApplicationsRussell Brewer, Melissa De Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, David Maimon2019Palgrave Pivot
1536Analyzing Human Behavior In CyberspaceZheng Yan2019IGI Global Information Science Reference/IGI Global
1537Machine Learning for Cybersecurity CookbookEmmanuel Tsukerman2019Packt Publishing
1538Tribe Of Hackers: Cybersecurity Advice From The Best Hackers In The WorldMarcus J. Carey, Jennifer Jin2019John Wiley & Sons
1539The Cyber Economy: Opportunities And Challenges For Artificial Intelligence In The Digital WorkplaceVladimir Filippov, Alexander Chursin, Julia Ragulina, Elena G. Popkova2019Springer
1540CyBok: The Cyber Security Body of KnowledgeAwais Rashid; Howard Chivers; George Danezis; Emil Lupu; Andrew Martin2019National Cyber Security Centre
1541Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic SecurityErickson Karnel2019
1542Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using PythonEmmanuel Tsukerman2019Packt Publishing
1543Cyber-Risk And Youth: Digital Citizenship, Privacy And SurveillanceMichael C. Adorjan, Rosemary Ricciardelli2019Routledge/Taylor & Francis Group
1544Cyber Espionage And International LawRussell Buchan2019HART Publishing/Bloomsbury Publishing
1545Waging Cyber WarJacob G. Oakley2019Apress
1546The Privacy, Data Protection And Cybersecurity Law ReviewAlan Charles Raul2019Law Business Research
1547The Crime Of Aggression: The Quest For Justice In An Age Of Drones, Cyberattacks, Insurgents, And AutocratsNoah Weisbord2019Princeton University Press
1548Waging Cyber War: Technical Challenges and Operational ConstraintsJacob G. Oakley2019Apress
1549Deep Learning Applications for Cyber SecurityMamoun Alazab, MingJian Tang2019Springer International Publishing
1550Design Cybernetics: Navigating the NewThomas Fischer, Christiane M. Herr2019Springer International Publishing
1551Cybersecurity in the Electricity Sector: Managing Critical InfrastructureRafal Leszczyna2019Springer International Publishing
1552Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom GilbStefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar Weippl2019Springer International Publishing
1553Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, ProceedingsXiaofeng Chen, Xinyi Huang, Jun Zhang2019Springer International Publishing
1554Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber SecuritySushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman2019Springer International Publishing
1555From Reactive Systems to Cyber-Physical Systems: Essays Dedicated to Scott A. Smolka on the Occasion of His 65th BirthdayEzio Bartocci, Rance Cleaveland, Radu Grosu, Oleg Sokolsky2019Springer International Publishing
1556Science of Cyber Security: Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected PapersFeng Liu, Jia Xu, Shouhuai Xu, Moti Yung2019Springer International Publishing
1557Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IAuhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki2019Springer International Publishing
1558Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IIAuhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki2019Springer International Publishing
1559Trustworthy Cyber-Physical Systems: A Systematic Framework towards Design and Evaluation of Trust and TrustworthinessNazila Gol Mohammadi2019Springer Fachmedien Wiesbaden;Springer Vieweg
1560Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, ProceedingsBazhong Shen, Baocang Wang, Jinguang Han, Yong Yu2019Springer Singapore
1561Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part IHuansheng Ning2019Springer Singapore
1562Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part IIHuansheng Ning2019Springer Singapore
1563Behavioral cybersecurity : applications of personality psychology and computer sciencePatterson, Wayne; Winston-Proctor, Cynthia E2019CRC Press
1564Reinforcement learning for cyber-physical systems with cybersecurity case studiesLi, Chong; Qiu, Meikang2019CRC Press
1565The cyber patient : navigating virtual informaticsBusch, Rebecca S2019CRC Press
1566Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoTTounsi, Wiem2019ISTE
1567Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the WorldMarcus J. Carey, Jennifer Jin2019Wiley
1568Developing Cybersecurity Programs And PoliciesOmar Santos2019Pearson Education
1569Understanding Cyber Warfare: Politics, Policy And StrategyChristopher Whyte, Brian Mazanec2019Routledge/Taylor & Francis Group
1570Cybernetics, or Control and Communication in the Animal and the MachineNorbert Wiener2019MIT Press
1571Advances in Cyber Security: Principle, Techniques, and ApplicationsKuan-Ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor)2019Springer Verlag, Singapore
1572Advances in Cyber Security: Principle, Techniques, and ApplicationsKuan-ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor)2019Springer-Nature New York Inc
1573Embedded System Interfacing: Design for the Internet-of-things Iot and Cyber-physical Systems CpsMarilyn Wolf2019Morgan Kaufmann Publishers In
1574Cybersecurity law /Jeff Kosseff.2019John Wiley & Sons
1575Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breachesErdal Ozkaya, Milad Aslaner2019Packt Publishing
1576Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics)Padmavathi Ganapathi (editor), D. Shanmugapriya (editor)2019Information Science Reference
1577Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd EditionYuri Diogenes, Erdal Ozkaya2019Packt Publishing
1578Cybercrime and SocietyMajid Yar; Kevin F. Steinmetz2019SAGE Publications
1579Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity FundamentalsZach Codings2019
1580Internet Governance And Regulations In Latin America: Analysis Of infrastructure, Privacy, Cybersecurity And Technological Developments In Honor Of The Tenth Anniversary Of The South School On Internet GovernanceLuca Belli, Olga Cavalli2019FGV Direito Rio
1581Human Dimensions of CybersecurityTerry Bossomaier, Steven D'Alessandro, Roger Bradbury2019Auerbach Publications
1582Cybersecurity For Dummies (For Dummies (Computer/Tech))Joseph Steinberg2019For Dummies
1583The MANTIS book : cyber physical system based proactive collaborative maintenanceMichele Albano (editor)2019
1584Computer Security Fundamentals Fourth Edition (Pearson IT Cybersecurity Curriculum (ITCC))Dr. Chuck Easttom2019Pearson IT Certification
1585Computer and cyber security: principles, algorithm, applications, and perspectivesAgrawal, Dharma Prakash;Gupta, Brij;Wang, Harry Haoxiang2019CRC Press
1586Gray day: my undercover mission to expose America's first cyber spyHanssen, Robert;O'Neill, Eric2019Crown;Archetype
1587Cyberwar and revolution: digital subterfuge in global capitalismDyer-Witheford, Nick;Matviyenko, Svitlana2019University of Minnesota Press
1588Kingdom of lies: unnerving adventures in the world of cybercrimeFazzini, Kate2019St. Martin's Publishing Group;St. Martin's Press
1589The secret to cybersecurity: a simple plan to protect your family and business from cybercrimeAugenbaum, Scott E2019Forefront Books
1590Cyberbullying and the Wild, Wild Web What You Need to KnowHitchcock, J. A2019Rowman & Littlefield Publishers
1591CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners)STEVEN, MICHAEL; STEVEN, MICHAEL2019
1592The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of SecurityAllison Cerra2019Wiley
1593Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command LinePaul Troncone, Carl Albing2019O'Reilly Media
1594Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the WorldCarey, Marcus J.;Jin, Jennifer2019John Wiley & Sons
1595Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples to Test Infrastructure Security with Kali Linux Learning ... Basics of CyberSecurity and Ethical HackingNowak, Grzegorz2019
1596Last Tango in CyberspaceKotler, Steven2019St. Martin's Publishing Group;St. Martin's Press
1597The fifth domain: defending our country, our companies, and ourselves in the age of cyber threatsClarke, Richard Alan;Knake, Robert K2019Penguin Random House LLC;Penguin Press
1598Professional Red Teaming: Conducting Successful Cybersecurity EngagementsOakley, Jacob G2019Apress, Imprint, Apress
1599The Cyber ShadowLopez, Vincent2019Lulu Publishing Services
1600Cybersecurity For DummiesJoseph Steinberg2019Wiley
1601Biometric-Based Physical and Cybersecurity SystemsObaidat, Mohammad S.;Traore, Issa;Woungang, Isaac2019Springer International Publishing
1602Cybersecurity Blue Team ToolkitTanner, Nadean H2019Wiley
1603Building an Effective Cybersecurity ProgramTari Schreider2019Rothstein Publishing
1604Building an effective cybersecurity program.TARI SCHREIDER2019ROTHSTEIN Publishing
1605Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomaliesAlessandro Parisi2019Packt Publishing
1606Cyber Operations Building, Defending, and Attacking Modern Computer NetworksO'Leary, Mike2019Apress
1607Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomaliesParisi, Alessandro2019Packt Publishing
1608Hands-on cybersecurity for finance: identify vulnerabilities and secure your financial services from security breachesOzkaya, Erdal;Aslaner, Milad2019Packt Publishing
1609Mastering malware analysis: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and loT attacksKleymenov, Alexey;Thabet, Amr2019Packt Publishing
1610The secret to cybersecurity: a simple plan to protect your family and business from cybercrimeAugenbaum, Scott E2019Forefront Books
1611Cybersecurity and secure information systems: challenges and solutions in smart environmentsHassanien, Aboul Ella(Editor);Elhoseny, Mohamed(Editor)2019Springer
1612The Cybersecurity Playbook: Practical Steps for Every Leader and Employee--To Make Your Organization More SecureYoung, Christopher;Allison Cerra2019Wiley
1613Tribe of hackers: cybersecurity advice from the best hackers in the worldCarey, Marcus J;Jin, Jennifer2019John Wiley & Sons
1614Cybersecurity blue team toolkitTanner, Nadean H2019Wiley
1615Cyber Security comprehensive beginners guide to learn the basics and effective methods of cybersecurityWalker, Brian2019
1616Kesan and Hayes's Cybersecurity and Privacy Law in a Nutshell (Nutshells)Kesan, Jay P;Hayes, Carol Mullins2019West Academic Publishing
1617Secure Cyber-Physical Systems for Smart CitiesRiaz Ahmed Shaikh2019Engineering Science Reference
1618Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001)Maymi, Fernando;Chapman, Brent;Parker, Jeff T2019McGraw-Hill Education
1619Cyber Security: Threats and Responses for Government and BusinessCaravelli, Jack;Jones, Nigel;Kozup, John C2019Praeger
1620Cybersecurity: The Beginner's GuideOzkaya, Erdal2019
1621Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identityCox, Christopher2019
1622Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identityCox, Christopher2019
1623Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration TestingBradley, Peter2019Independently published
1624Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration TestingBradley, Peter2019
1625Cyborg Mind: What Brain-Computer and Mind-Cyberspace Interfaces Mean for CyberneuroethicsCalum Mackellar2019Berghahn Books
1626Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous HackersGreenberg, Andy2019Doubleday Books;Penguin Random House LLC; Knopf Doubleday Publishing Group
1627Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive CybersecurityCarey, Marcus J;Jin, Jennifer2019Wiley
1628Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and PerformanceSteve Dixon2019Routledge
1629Cybersecurity: The Beginner's GuideErdal Ozkaya2019Packt Publishing
1630Cybernetics or Control and Communication in the Animal and the Machine, Reissue of the 1961Norbert Wiener2019MIT Press
1631From Cyber-Nationalism to Fandom Nationalism: The Case of Diba Expedition In ChinaLiu Hailong (editor)2019Routledge
1632Next Level Cybersecurity: Detect the Signals, Stop the HackHuda, Sai2019Leaders Press
1633Global Crime: An Encyclopedia of Cyber Theft, Weapons Sales, and Other Illegal Activities [2 volumes]Philip Reichel (editor)2019ABC-CLIO
1634Global Crime: an Encyclopedia of Cyber Theft, Weapons Sales, and Other Illegal Activities [2 Volumes]Reichel, Philip L.2019ABC-CLIO, LLC
1635Cyber & You: The impact of technology on our livesMaureen Kendal2019Legend Business
1636Cyber & You: The impact of technology on our livesMaureen Kendal2019Legend Business
1637Cyberspace and International Relations: The Co-Evolution DilemmaNazli Choucri, David D. Clark2019MIT Press
1638Cyber Influence and Cognitive ThreatsVladlena Benson, John Mcalaney2019Academic Press
1639Cybercartography in a Reconciliation Community: Engaging Intersecting Perspectives: Volume 8 (Modern Cartography Series)Stephanie Pyne (editor), D. R. Fraser Taylor (editor)2019Elsevier
1640Cybercartography in a Reconciliation Community: Engaging Intersecting PerspectivesStephanie Pyne (editor), D. R. Fraser Taylor (editor)2019Elsevier
1641Cybersecurity Law: Protect Yourself and Your CustomersShimon Brathwaite (author)2019Business Expert Press
1642Conversations in CyberspaceGiulio D'Agostino (author)2019Business Expert Press
1643The Business of Cybersecurity: Foundations and IdeologiesAshwini Sathnur (author)2019Business Expert Press
1644Cyber Crimes Prevention: Promising Organisational Practices Information Technology & People.Mahmood Shah.2019Emerald
1645The Oxford Handbook of CyberpsychologyAlison Attrill-Smith, Chris Fullwood, Melanie Keep and Daria J. Kuss2019Oxford University Press
1646Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applicationsEl-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk2019Institution of Engineering and Technology
1647Global Crime: An Encyclopedia of Cyber Theft, Weapons Sales, and Other Illegal Activities [2 Volumes]Philip L. Reichel;2019ABC-CLIO
1648Cyber Sufis: Virtual Expressions of the American Muslim ExperienceRobert Rozehnal2019Oneworld Publications
1649The Politics and Technology of CyberspaceDanny Steed2019Routledge
1650Ethical Challenges In Digital Psychology And CyberpsychologyThomas D. Parsons2019Cambridge University Press
1651Cybersecurity Ops with bashPaul Troncone; Carl Albing Ph. D.2019O'Reilly Media
1652Cyberbullying in Schools, Workplaces, and Romantic Relationships: The Many Lenses and Perspectives of Electronic MistreatmentGary W. Giumetti (editor), Robin M. Kowalski (editor)2019Routledge
1653Confessions of an Illuminati Vol. 6.66: The Age of Cyber Satan, Artificial Intelligence, and RoboticsLeo Lyon Zagami2019Independently Published
1654Tools and Technologies for the Development of Cyber-Physical SystemsSergey Balandin (editor), Ekaterina Balandina (editor)2019Engineering Science Reference
1655Critical Concepts, Standards, and Techniques in Cyber Forensics (Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT))Mohammad Zunnun Khan (editor)2019IGI Global
1656Cyberpunk in a Transnational ContextTakayuki Tatsumi (editor)2019MDPI AG
1657Confessions of an Illuminati Volume 6.66: The Age of Cyber Satan, Artificial Intelligence, and RoboticsLeo L. Zagami2019Cursum Perficio
1658Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case StudiesGia Nhu Nguyen; Dac-Nhuong Le; Raghvendra Kumar; Jyotir Moy Chatterjee; Manju Khari2019Wiley-Scrivener
1659State–Society Relations to Prevent Radicalism and Violent Extremism in the Cyberspace of IndonesiaMuhaimin Zulhair Achsin2019EUDL EAI
1660Constructing the Cyberterrorist: Critical Reflections on the UK CaseGareth Mott2019Routledge
1661Last Tango in CyberspaceKotler, Steven2019St. Martin's Press
1662The Threat Hunt Process (THP) Roadmap: A Pathway for Advanced Cybersecurity Active MeasuresMARK A RUSSO CISSP-ISSAP CEH IFPC2019Independently published
1663Cyber Attacks and International Law on the Use of ForceSamuli Haataja2019Routledge
1664Constructing the Cyberterrorist: Critical Reflections on the UK CaseGareth Mott2019Routledge
1665Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and BeyondSean T. Lawson2019Routledge
1666Predicting Cyberbullying: Research, Theory, and InterventionChristopher Paul Barlett2019Academic Press
1667Dealing with CyberbullyingDerek Miller2019Cavendish Square Publishing, LLC
1668Cybersecurity: Current Writings on Threats and ProtectionJoaquin Jay Gonzalez III2019McFarland & Company, Inc., Publishers
1669Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applicationsEl-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk2019The Institution of Engineering and Technology
1670CCNA Cyber Ops SECOPS – Certification Guide 210-255: Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associateAndrew Chu2019Packt Publishing
1671Linux Essentials for Cybersecurity (for True EPUB)William “Bo” Rothwell; Denise Kinsey2019Pearson Education
1672Cyber ResilienceSergei Petrenko2019River Publishers
1673Cybercrime Through an Interdisciplinary LensThomas J. Holt2019Taylor & Francis
1674Digital Media and the Greek Crisis: Cyberconflicts, Discourses and NetworksIoanna Ferra2019Emerald Group Publishing
1675The International Dimensions of Cyberspace LawBruno De Padirac2019Taylor & Francis
1676Commercial and Cyber Fraud: A Legal Guide to Justice for BusinessesIan Smith; David Shepherd2019Bloomsbury Professional
1677Cyber Espionage and International LawRussell Buchan2019Hart Publishing
1678Advancing Software Security in the EU: The role of the EU cybersecurity certification frameworkENISA2019ENISA
1679Cyber Security in Parallel and Distributed ComputingDacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee2019Scrivener Publishing
1680Russian Cyber Warfare: The History of Russia’s State-Sponsored Attacks across the WorldCharles River Editors2019Charles River Editors
1681Cybersecurity: The Insights You Need from Harvard Business ReviewHarvard Business Review; Alex Blau; Andrew Burt; Boris Groysberg; Roman V. Yampolskiy2019Harvard Business Press
1682Movement and Time in the Cyberworld: Questioning the Digital Cast of BeingMichael Eldred2019De Gruyter
1683Movement and Time in the Cyberworld: Questioning the Digital Cast of BeingMichael Eldred2019De Gruyter
1684Handbook of Computer Networks and Cyber Security: Principles and ParadigmsBrij B. Gupta; Gregorio Martinez Perez; Dharma P. Agrawal; Deepak Gupta2019Springer Nature
1685CyberParks – The Interface Between People, Places and Technology: New Approaches and PerspectivesCarlos Smaniotto Costa; Ina Šuklje Erjavec; Therese Kenna; Michiel de Lange; Konstantinos Ioannidis; Gabriela Maksymiuk; Martijn de Waal2019Springer
1686Cyber-Physical Systems: Advances in Design & ModellingAlla G. Kravets; Alexander A. Bolshakov; Maxim V. Shcherbakov2019Springer Nature
1687Cybercrime Prevention: Theory and ApplicationsRussell Brewer; Melissa de Vel-Palumbo; Alice Hutchings; Thomas Holt; Andrew Goldsmith; David Maimon2019Springer Nature
1688How Cyber Security Can Protect Your Business : A Guide for All StakeholdersChristopher Wright; Archie (Male Synthesized Voice)2019IT Governance Ltd
1689The (un)Certain Future of Empathy in Posthumanism, Cyberculture and Science FictionElsa Bouet2019BRILL
1690Navigating CyberculturesNicholas van Orden2019BRILL
1691The Crime of Aggression: The Quest for Justice in an Age of Drones, Cyberattacks, Insurgents, and AutocratsNoah Weisbord2019Princeton University Press
1692Gray Day: My Undercover Mission to Expose America's First Cyber SpyEric O'Neill2019Crown Publishing Group (NY)
1693Preventing and Combating Cybercrime in East Africa: Lessons from Europe's Cybercrime FrameworksMwiburi, Abel Juma2019Duncker & Humblot
1694Confessions of an Illuminati 06.66 The Age of Cyber Satan, Artificial Intelligence, and RoboticsZagami Leo-Lyon2019Cursum Perficio
1695Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and BeyondMatt Reyes2019Independently Published
1696Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and BeyondMatt Reyes2019Independently Published
1697Cyber smart: five habits to protect your family, money, and identity from cyber criminalsMcDonough, Bart R2018John Wiley & Sons
1698Listening in: cybersecurity in an insecure ageLandau, Susan Eva2018Yale University Press
1699Information Fusion for Cyber-Security AnalyticsAleroud, Ahmed;Alsmadi, Izzat M.;Karabatis, George2018Springer International Publishing
1700Industrial Internet of Things Cybermanufacturing SystemsBrecher, Christian;Jeschke, Sabina;Rawat, Danda B.;Song, Houbing2018Springer International Publishing
1701Security-Aware Design for Cyber-Physical Systems A Platform-Based ApproachLin, Chung-Wei;Sangiovanni-Vincentelli, Alberto2018Springer International Publishing
1702Cybercrime and digital forensics: an introductionBossler, Adam M.; Holt, Thomas J.; Seigfried-Spellar, Kathryn C2018Routledge
1703Embedded System Design : Embedded Systems, Foundations of Cyber-Physical Systems, and the Internet of ThingsMarwedel, Peter2018Springer International Publishing : Imprint: Springer
1704Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17–21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USADenise Nicholson (editor)2018Springer
1705Towards analytical techniques for optimizing knowledge acquisition, processing, propagation, and use in cyberinfrastructure and big dataKreinovich, Vladik; Lerma, Leonardo Octavio2018Springer
1706Trends in cyber-physical multi-agent systems : the PAAMS collection -- 15th International Conference, PAAMS 2017Antunes, Luis; Campbell, Andrew; De la Prieta, Fernando; Julian, Vicente; Moreno, María N.; Neves, Antonio J. R.; Pinto, Tiago; Vale, Zita2018Springer
1707Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics - 2017Gheorghe, Gheorghe I2018Springer International Publishing : Imprint: Springer
1708Recent Developments and Achievements in Biocybernetics and Biomedical Engineering : Proceedings of the 20th Polish Conference on Biocybernetics and Biomedical Engineering, Krako´w, Poland, September 20-22, 2017Augustyniak, Piotr; Maniewski, Roman; Tadeusiewicz, Ryszard2018Springer International Publishing : Imprint: Springer
1709International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and IntelligenceJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.)2018Edizioni della Normale
1710Cloud-Based Cyber-Physical Systems in ManufacturingLihui Wang, Xi Vincent Wang2018Springer International Publishing
1711Surveillance in Action: Technologies for Civilian, Military and Cyber SurveillancePanagiotis Karampelas, Thirimachos Bourlai (eds.)2018Springer International Publishing
1712Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national levelFlorian Skopik2018Auerbach Publications;CRC Press
1713Security and privacy in cyber-physical systems : foundations, principles, and applicationsFink, Glenn A.; Jeschke, Sabina; Song, Houbing2018
1714Cybernetics Approaches in Intelligent Systems : Computational Methods in Systems and Software 2017, vol. 1Prokopova, Zdenka; Silhavy, Petr; Silhavy, Radek2018Springer
1715 Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect OrganizationsMorey J. Haber,Brad Hibbert (auth.)2018Apress
1716 Cyber-Archaeology and Grand Narratives: Digital Technology and Deep-Time Perspectives on Culture Change in the Middle EastThomas E. Levy,Ian W. N. Jones (eds.)2018Springer International Publishing
1717 Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected PapersSokratis K. Katsikas,Frédéric Cuppens,Nora Cuppens,Costas Lambrinoudakis,Christos Kalloniatis,John Mylopoulos,Annie Antón,Stefanos Gritzalis (eds.)2018Springer International Publishing
1718 Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, ProceedingsPetr Matoušek,Martin Schmiedecker (eds.)2018Springer International Publishing
1719 Compensated Dating: Buying and Selling Sex in CyberspaceCassini Sai Kwan Chu (auth.)2018Palgrave Macmillan
1720 Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantYang Xu,Feng Gao,Weihua Chen,Zheming Liu,Pengfei Gu (eds.)2018Springer Singapore
1721 Intercultural Communicative Competence for Global Citizenship: Identifying cyberpragmatic rules of engagement in telecollaborationMarina Orsini-Jones,Fiona Lee (auth.)2018Palgrave Macmillan UK
1722Artificial Intelligence Tools for Cyber AttributionEric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef2018Springer
1723Bishop Fox Cybersecurity Style GuideBishop Fox2018Bishop Fox
1724Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical SystemsMoamar Sayed-Mouchaweh2018Springer
1725Contesting Cyberspace in China: Online Expression and Authoritarian ResilienceRongbin Han2018Columbia University Press
1726 Cyber Physical Computing for IoT-driven Services Vladimir Hahanov (auth.)2018Springer International Publishing
1727 Artificial Intelligence Tools for Cyber AttributionEric Nunes,Paulo Shakarian,Gerardo I. Simari,Andrew Ruef (auth.)2018Springer International Publishing
1728 Cyber Security for Cyber Physical SystemsSaqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.)2018Springer International Publishing
1729The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart CitiesTermanini, Rocky2018Chapman and Hall/CRC
1730Cyber Sexy: Rethinking PornographyRicha Kaul Padte2018Penguin Viking
1731Smart Water Grids A Cyber-physical Systems ApproachMontestruque et al.2018CRC Press
1732Cybersecurity Program Development for Business: The Essential Planning GuideMoschovitis, Christos J. P2018John Wiley & Sons
1733The Perfect Weapon: War, Sabotage, and Fear in the Cyber AgeDavid E. Sanger2018Crown
1734Cybersecurity Policy Framework : A practical guide to the development of national cybersecurity policyKaja Ciglic2018Microsoft
1735Enterprise Cybersecurity Study GuideScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam2018Apress
1736Logical Foundations of Cyber-Physical SystemsAndré Platzer2018Springer International Publishing
1737Cybersecurity in ChinaGreg Austin2018Springer International Publishing
1738International Perspectives on CyberbullyingAnna Costanza Baldry, Catherine Blaya, David P. Farrington2018Springer International Publishing;Palgrave Macmillan
1739Cyber Threat IntelligenceAli Dehghantanha, Mauro Conti, Tooska Dargahi2018Springer International Publishing
1740Cyber WeaponryHenry Prunckun2018Springer International Publishing
1741Cyber Security: Power and TechnologyMartti Lehto, Pekka Neittaanmäki2018Springer International Publishing
1742Cyber-Physical Laboratories in Engineering and Science EducationMichael E. Auer, Abul K.M. Azad, Arthur Edwards, Ton de Jong2018Springer International Publishing
1743Cybersecurity in GermanyMartin Schallbruch, Isabel Skierka2018Springer International Publishing
1744Multisensor Fusion and Integration in the Wake of Big Data, Deep Learning and Cyber Physical SystemSukhan Lee, Hanseok Ko, Songhwai Oh2018Springer International Publishing
1745Cyber Security Cryptography and Machine LearningItai Dinur, Shlomi Dolev, Sachin Lodha2018Springer International Publishing
1746Cybersecurity Best PracticesMichael Bartsch, Stefanie Frey2018Springer Fachmedien Wiesbaden;Springer Vieweg
1747Cyber SecurityM. U. Bokhari, Namrata Agrawal, Dharmendra Saini2018Springer Singapore
1748Cyberspace SovereigntyBinxing Fang2018Springer Singapore
1749Cyberpsychology as Everyday Digital Experience across the LifespanDave Harley, Julie Morgan, Hannah Frith2018Palgrave Macmillan UK
1750Cybersecurity EssentialsCharles J. Brooks; Philip R. Craig; Donald Short2018Sybex
1751AI in CybersecurityLeslie F. Sikos (Editor)2018Springer
1752Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from IncidentsEric C. Thompson2018Apress
1753Hands-On Cybersecurity for ArchitectsNeil Rerup, Milad Aslaner2018Packt Publishing
1754Business Continuity in a Cyber World: Surviving CyberattacksDavid Sutton2018Business Expert Press
1755Linux Essentials for CybersecurityWilliam Rothwell; Denise Kinsey2018Pearson Education
1756The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States InterestsDennis F. Poindexter2018McFarland & Company
1757Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect OrganizationsMorey J. Haber, Brad Hibbert2018Apress
1758Cybersecurity Incident Response How to Contain, Eradicate, and Recover from IncidentsEric C. Thompson2018Apress
1759Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber ThreatJohn P. Carlin; Garrett M. Graff2018PublicAffairs
1760Cyberwar. How Russian hackers and trolls helped elect a president - what we don’t, can’t, and do know.Jamieson, Kathleen Hall2018Oxford University Press
1761Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using BlockchainRajneesh Gupta2018Packt Publishing
1762A CISO’s Guide to Bolstering Cybersecurity PostureSean Atkinson2018Center for Internet Security
1763Hands-On Cybersecurity with BlockchainRajneesh Gupta [Rajneesh Gupta]2018Packt Publishing
1764Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tacticsYuri Diogenes; Erdal Ozkaya2018Packt Publishing
1765Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidentsWilson Bautista2018Packt Publishing
1766Cybernetic modeling for bioreaction engineeringRamkrishna, Doraiswami; Song, Hyun-Seob2018Cambridge University Press
1767Hashtag Islam: How Cyber-Islamic Environments Are Transforming Religious AuthorityGary R Bunt2018University of North Carolina Press
1768Solving Cyber Risk Protecting Your Company and SocietyAndrew Coburn, Eireann Leverett, Gordon Woo2018Wiley
1769Cyberspace Safety and Security: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, ProceedingsArcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri2018Springer International Publishing
1770Science of Cyber Security: First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected PapersFeng Liu, Shouhuai Xu, Moti Yung2018Springer International Publishing
1771Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected PapersMohadeseh Ganji, Lida Rashidi, Benjamin C. M. Fung, Can Wang2018Springer International Publishing
1772From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th BirthdayPierangela Samarati, Indrajit Ray, Indrakshi Ray2018Springer International Publishing
1773Handbook of Cyber-Development, Cyber-Democracy, and Cyber-DefenseElias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos2018Springer International Publishing
1774Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference: Science as the first countermeasure for CBRNE and Cyber threatsAndrea Malizia, Marco D'Arienzo2018Springer International Publishing
1775Cyber CriminologyHamid Jahankhani2018Springer International Publishing
1776Handbook of Smart Cities: Software Services and Cyber InfrastructureMuthucumaru Maheswaran, Elarbi Badidi2018Springer International Publishing
1777Versatile CybersecurityMauro Conti, Gaurav Somani, Radha Poovendran2018Springer International Publishing
1778Cyber-Physical Systems SecurityÇetin Kaya Koç2018Springer International Publishing
1779Information Security Education – Towards a Cybersecure Society: 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, ProceedingsLynette Drevin, Marianthi Theocharidou2018Springer International Publishing
1780Frontiers of Cyberlearning: Emerging Technologies for Teaching and LearningJ. Michael Spector, Vivekanandan Kumar, Alfred Essa, Yueh-Min Huang, Rob Koper, Richard A. W. Tortorella, Ting-Wen Chang, Yanyan Li, Zhizhen Zhang2018Springer Singapore
1781Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, ProceedingsGeetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan2018Springer Singapore
1782Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, ProceedingsFagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang2018Springer Singapore
1783Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using BlockchainRajneesh Gupta2018Packt
1784PG Certificate Programme in Cyber Laws (PGCCL)IGNOU2018Indira Gandhi National Open University (IGNOU)
1785White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of CybercrimeOsterman Research2018Osterman Research, Inc.
1786Cybersecurity Best Practices Guide For IIROC Dealer MembersIIROC / OCRCVM2018IIROC / OCRCVM
1787Notes from Cyberground: Trumpland and My Old Soviet FeelingMikhail Iossel2018New Europe Books
1788Managing Cybersecurity Risk: Cases Studies and SolutionsJonathan Reuvid (ed.)2018Legend Times Group
1789Cyber Mercenaries: The State, Hackers, and PowerTim Maurer2018Cambridge University Press
1790Understanding Cyber Risk: Protecting Your Corporate AssetsThomas R. Koehler2018Routledge
1791Handbook Of Research On Information And Cyber Security In The Fourth Industrial RevolutionZiska Fields2018IGI Global/IRMA
1792How to Build a Cyber-Resilient OrganizationKohnke, Anne; Shoemaker, Dan; Sigler, Ken2018Auerbach Publications;CRC
1793Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystemSoma Halder, Sinan Ozdemir2018Packt Publishing
1794Cashing In On Cyberpower: How Interdependent Actors Seek Economic Outcomes In A Digital WorldMark T. Peters II2018Potomac Books/University Of Nebraska Press
1795Cyber Ethics 4.0: Serving Humanity With ValuesChristoph Stückelberger, Pavan Duggal2018Globethics.net
1796Framework for Improving Critical Infrastructure CybersecurityNational Institute of Standards and Technology2018National Institute of Standards and Technology - NIST
1797Hands-on Machine Learning for Cyber SecuritySoma Halder2018Packt Publishing
1798Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network ForensicsNik Alleyne2018
1799Art, Cybernetics, and Pedagogy in Post-War Britain: Roy Ascott's GroundcourseKate Sloan2018Routledge
1800Cyberformalism : histories of linguistic forms in the digital archiveDaniel Shore2018Johns Hopkins University Press
1801Cybersecurity EssentialsCharles J. Brooks, Christopher Grow, Philip Craig, Donald Short2018Sybex
1802Engineering Trustworthy Systems: Get Cybersecurity Design Right the First TimeO Sami Saydjari2018McGraw-Hill Education
1803Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidentsWilson Bautista Jr.2018Packt Publishing
1804Smart Cities Cybersecurity and PrivacyDanda B. Rawat (editor), Kayhan Zrar Ghafoor (editor)2018Elsevier
1805AI in CybersecurityLeslie F. Sikos (editor)2018Springer
1806CyberwarKathleen Hall Jamieson2018Oxford University Press
1807Hands-on cybersecurity with blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchainRajneesh Gupta2018
1808Developing Cybersecurity Programs and Policies (Pearson IT Cybersecurity Curriculum (ITCC))Omar Santos2018Pearson IT Certification
1809Cyber security innovation for the digital economy : a case study of the Russian FederationSergei Petrenko2018
1810Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD MethodologyAndrea Fiaschetti (editor), Josef Noll (editor), Paolo Azzoni (editor), Roberto Uribeetxeberria (editor)2018CRC Press
1811Exploding Data: Reclaiming Our Cyber Security in the Digital AgeChertoff, Michael2018Grove Atlantic;Grove Press
1812Cyber-Physical Systems for Next-Generation Networks (Advances in Computer and Electrical Engineering (ACEE))Amjad Gawanmeh (editor)2018IGI Global
1813Enterprise cybersecurity study guide: how to build a successful cyberdefense program against advanced threatsAslam, Abdul;Donaldson, Scott E.;Siegel, Stanley G.;Williams, Chris K2018Apress
1814Hands-on cybersecurity for architects plan and design robust security architecturesAslaner, Milad;Rerup, Neil2018Packt Publishing
1815Hands-on cybersecurity for architects plan and design robust security architecturesAslaner, Milad;Rerup, Neil2018Packt Publishing
1816Contesting Cyberspace in China: Online Expression and Authoritarian ResilienceRongbin Han2018Columbia University Press
1817Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using BlockchainGupta, Rajneesh2018Packt Publishing
1818Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using BlockchainGupta, Rajneesh2018Packt Publishing
1819Effective Cybersecurity: A Guide to Using Best Practices and StandardsWilliam Stallings2018Addison-Wesley Professional
1820Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect OrganizationsHaber, Morey J.;Hibbert, Brad2018Apress, Imprint
1821Contesting cyberspace in China: online expression and authoritarian resilienceHan, Rongbin2018Columbia University Press
1822The decision to attack: military and intelligence cyber decision-makingBrantly, Aaron Franklin2018
1823Digital World War: Islamists, Extremists, and the Fight for Cyber SupremacyHaroon K. Ullah2018Yale University Press
1824Practical cyber intelligence how action-based intelligence can be an effective response to incidentsWilson Bautista Jr2018Packt Publishing
1825Practical cyber intelligence how action-based intelligence can be an effective response to incidentsWilson Bautista Jr2018Packt Publishing
1826Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxticsYuri Diogenes,Erdal Ozkaya2018Packt Publishing
1827Deconstruction machines: writing in the age of cyberwarJoque, Justin;Malabou, Catherine2018University of Minnesota Press
1828Hacking with Kali Linux: a step by step guide for you to learn the basics of cybersecurity & hackingNastase, Ramon2018CreateSpace Independent Publishing Platform
1829Business continuity in a cyber world: surviving cyberattackesPower, Daniel J.;Sutton, David2018Business Expert Press
1830The Perfect Weapon War, Sabotage, and Fear in the Cyber AgeSanger, David E2018Crown;Archetype;Crown Pub
1831Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical SystemsSayed-Mouchaweh, Moamar2018Springer
1832Diagnosability, security and safety of hybrid dynamic and cyber-physical systemsSayed-Mouchaweh, Moamar2018Springer
1833Queer art camp superstar: decoding the cinematic cyberworld of Ryan TrecartinTrecartin, Ryan;Zulueta, Ricardo Estanislao2018
1834Hashtag Islam: How Cyber-Islamic Environments Are Transforming Religious AuthorityGary R Bunt2018University of North Carolina Press
1835Transportation Cyber-Physical SystemsLipika Deka, Mashrur Chowdhury2018Elsevier
1836The Perfect Weapon: War, Sabotage and Fear in the Cyber AgeDavid Sanger2018
1837Hands-on cybersecurity with blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchainGupta, Rajneesh2018Packt Publishing Limited
1838Practical cyber intelligence how action-based intelligence can be an effective response to incidentsjr_, Wilson Bautista2018Packt Publishing
1839Fractional Order Crowd Dynamics: Cyber-Human System Modeling and ControlKecai Cao, YangQuan Chen2018De Gruyter
1840Exploding Data: Reclaiming Our Cyber Security in the Digital AgeChertoff, Michael2018Atlantic Monthly Press;Grove Atlantic; Grove/Atlantic, Incorporated
1841Automatic Cyberbullying Detection: Emerging Research and OpportunitiesMichal E. Ptaszynski, Fumito Masui2018Information Science Reference
1842Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxticsDiogenes, Yuri;Ozkaya, Erdal2018Packt Publishing
1843Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxticsDiogenes, Yuri;Ozkaya, Erdal2018Packt Publishing
1844Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxticsDiogenes, Yuri;Ozkaya, Erdal2018Packt Publishing
1845Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxticsDiogenes, Yuri;Ozkaya, Erdal2018Packt Publishing
1846Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxticsDiogenes, Yuri;Ozkaya, Erdal2018Packt Publishing
1847Comptia Cysa+ Cybersecurity Analyst Certification Practice Exams (Exam Cs0-001)Rogers, Bobby E2018McGraw-Hill Education
1848Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tacticsDiogenes, Yuri;Ozkaya, Erdal2018
1849Linux Essentials for CybersecurityRothwell, William J2018Pearson It Certification
1850Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber CriminalsBart R. McDonough2018Wiley
1851Confronting Cyberespionage Under International LawOguz Kaan Pehlivan2018Routledge
1852New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering)Howard Shrobe, David L. Shrier, Alex Pentland2018MIT Press
1853You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy)Josephine Wolff, Sandra Braman, Paul T. Jaeger2018MIT Press
1854New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering)Howard Shrobe, David L. Shrier, Alex Pentland2018MIT Press
1855Cyberbullying at University in International ContextsWanda Cassidy, Chantal Faucher, Margaret Jackson2018Routledge
1856The Chinese Information War; Espionage, Cyberwar, Communications Control and Related ThreatsDennis Poindexter2018
1857Model Checking (Cyber Physical Systems Series)Edmund M. Clarke Jr., Orna Grumberg, Daniel Kroening, Doron Peled, Helmut Veith2018The MIT Press
1858Effective Cybersecurity: A Guide to Using Best Practices and StandardsWilliam Stallings2018Addison-Wesley Professional
1859TIME Cybersecurity: Hacking, the Dark Web and YouThe Editors of TIME2018Time Inc. Books
1860The Cyber Plumber's Handbook : The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a bossBrennon Thomas2018
1861Linux Essentials for CybersecurityWilliam Rothwell; Denise Kinsey2018Pearson It Certification
1862Cybersecurity in Finance: Getting the Policy Mix RightSylvain Bouyon; Simon Krause2018Rowman & Littlefield
1863Hacking The Bomb: Cyber Threats and Nuclear WeaponsAndrew Futter2018Georgetown University Press
1864Combating Cyber ThreatP. K. Singh2018Vij Books India
1865Confronting an Axis of Cyber?: China, Iran, North Korea, Russia in CyberspaceFabio Rugge2018Ledizioni
1866Cyber Attacks and International Law on the Use of Force: The Turn to Information EthicsSamuli Haataja2018Routledge
1867Hacking the Bomb: Cyber Threats and Nuclear WeaponsAndrew Futter2018Georgetown University Press
1868Reducing Cyberbullying in Schools: International Evidence-Based Best PracticesMarilyn Campbell; Sheri Bauman2018Academic Press
1869International perspectives on cyberbullying: prevalence, risk factors and interventionsAnna Costanza Baldry; Catherine Blaya; David P. Farrington.2018Palgrave Macmillan
1870Reducing cyberbullying in schools: international evidence-based best practicesMarilyn Campbell & Sheri Bauman2018Cambridge, MA : Academic Press
1871Cyberspace Sovereignty: Reflections on building a community of common future in cyberspaceBinxing Fang2018Springer
1872Cyberbullying: A Deadly TrendThe New York Times Editorial Staff2018The Rosen Publishing Group, Inc
1873Cyber heaven harem 2200 part 1 out of the noob zoneLogan Link2018Blazing little Books
1874Cybernetics in C++Avi Bhattacharyya2018River Publishers
1875Male Alienation at the Crossroads of Identity, Culture and CyberspaceRobert Tyminski2018Routledge
1876Male Alienation at the Crossroads of Identity, Culture and CyberspaceTyminski, Robert;2018Taylor & Francis Group
1877CyberbullyingJuan Moises De La Serna2018Babelcube Inc.
1878Matter Transmission: Mediation in a Paleocyber AgeNicolás Salazar Sutil2018Bloomsbury Academic
1879Surveillance in Action. Technologies for Civilian, Military and Cyber SurveillancePanagiotis Karampelas, Thirimachos Bourlai2018Springer
1880Digimon Story Cyber Sleuth Hackers Memory, Mods, APK, PC, Xbox, Controls, Download, Tips, VSYNC, Cheats, Game Guide UnofficialThe Yuw2018HSE Games
1881GDPR and Cyber Security for Business Information SystemsAntoni Gobeo, Connor Fowler, William J. Buchanan2018River Publishers
1882Matter Transmission: Mediation in a Paleocyber AgeNicolás Salazar Sutil2018Bloomsbury Publishing
1883Matter Transmission: Mediation in a Paleocyber AgeNicolás Salazar Sutil2018Bloomsbury Academic
1884Cyber Security: Law and GuidanceHelen Wong (editor)2018Bloomsbury Professional
1885Fractional Order Crowd Dynamics: Cyber-Human System Modeling and ControlKecai Cao; YangQuan Chen2018De Gruyter
1886Fractional Order Crowd Dynamics: Cyber-Human System Modeling and ControlKecai Cao; YangQuan Chen2018De Gruyter
1887CYBERSECURITY EssentialsCharles J . Brooks, Christopher Grow, Philip Craig, Donald Short2018
1888Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystemSoma Halder; Sinan Ozdemir2018Packt Publishing Ltd
1889Cyber-Physical Laboratories in Engineering and Science EducationMichael E. Auer; Abul K.M. Azad; Arthur Edwards; Ton de Jong2018Springer
1890Cybersecurity for Commercial VehiclesGloria D'Anna2018SAE International
1891Rethinking Cybersecurity : Strategy, Mass Effect, and StatesJames Andrew Lewis2018Center for Strategic & International Studies
1892Queer Art Camp Superstar: Decoding the Cinematic Cyberworld of Ryan TrecartinRicardo E. Zulueta2018State University of New York Press
1893Contesting Cyberspace in China: Online Expression and Authoritarian ResilienceRongbin Han2018Columbia University Press
1894Postmodern Sublime: Technology and American Writing from Mailer to CyberpunkJoseph Tabbi2018Cornell University Press
1895Industry of Anonymity: Inside the Business of CybercrimeJonathan Lusthaus2018Harvard University Press
1896A Life in Cybernetics: Ex-Prodigy: My Childhood and Youth and I Am a Mathematician: The Later Life of a ProdigyNorbert Wiener2018The MIT Press
1897Cyber Harassment and Policy Reform in the Digital Age: Emerging Research and OpportunitiesRamona S. McNeal, Susan M. Kunkle, Mary Schmeida2018IGI Global
1898Cyberlaw : Problems of Policy and Jurisprudence in the Information AgePatricia Bellia, Paul Schiff Berman, Brett Frischmann, David Post2018West Academic Publishing
1899Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks)Darren Quick, Kim-Kwang Raymond Choo2018Springer
1900The GCHQ Puzzle Book II: From WWI ciphers to modern cyber security, pit your wits against 100 years of codebreaking geniusGCHQ2018Penguin Books Ltd
1901The plot to hack America: how Putin's cyberspies and WikiLeaks tried to steal the 2016 electionAssange, Julian;Clinton, Hillary Rodham;Nance, Malcolm W.;Putin, Vladimir Vladimirovic;Putin, Vladimir Vladimirovich;Trump, Donald2017Skyhorse Publishing
1902Dark Territory: The Secret History of Cyber WarKaplan, Fred M2017Simon & Schuster Paperbacks
1903Digital Cop: A Digital Cop's Guide to Cyber SecurityBaghla, Sahil;Soni, Arun2017Notion Press
1904Digital rebellion: the birth of the cyber leftWolfson, Todd2017University of Illinois Press
1905The Basics of Cyber Safety. Computer and Mobile Device Safety Made EasyJohn Sammons, Michael Cross2017Syngress
1906Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical SystemsEdward Griffor2017Syngress
1907Cyber-Physical Systems. Foundations, Principles and ApplicationsHoubing Song, Danda B Rawat, Sabina Jeschke, Christian Brecher2017Academic Press
1908Multilayer Control of Networked Cyber-Physical Systems: Application to Monitoring, Autonomous and Robot SystemsSabato Manfredi (auth.)2017Springer International Publishing
1909Industrial Internet of Things: Cybermanufacturing SystemsSabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat (eds.)2017Springer International Publishing
1910Cyberemotions: Collective Emotions in CyberspaceJanusz A. Holyst (eds.)2017Springer International Publishing
1911Information Fusion for Cyber-Security AnalyticsIzzat M Alsmadi, George Karabatis, Ahmed Aleroud (eds.)2017Springer International Publishing
1912Vehicular Cyber Physical Systems: Adaptive Connectivity and SecurityDanda B. Rawat, Chandra Bajracharya (auth.)2017Springer International Publishing
1913Cyber-Physical SystemsRaj Rajkumar, Dionisio de Niz, Mark Klein2017Addison-Wesley Professional
1914Security-Aware Design for Cyber-Physical Systems A Platform-Based ApproachChung-Wei Lin, Alberto Sangiovanni Vincentelli2017Springer
1915Personal Cybersecurity. How to avoid and recover from CybercrimeMarvin Waschke2017Apress
1916Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence InitiativeMariarosaria Taddeo, Ludovica Glorioso (eds.)2017Springer International Publishing
1917Model-Implementation Fidelity in Cyber Physical System DesignAnca Molnos, Christian Fabre (eds.)2017Springer International Publishing
1918Cyber Physical Systems. Design, Modeling, and Evaluation: 6th International Workshop, CyPhy 2016, Pittsburgh, PA, USA, October 6, 2016, Revised Selected PapersChristian Berger, Mohammad Reza Mousavi, Rafael Wisniewski (eds.)2017Springer International Publishing
1919Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016Jürgen Beyerer, Oliver Niggemann, Christian Kühnert (eds.)2017Springer Vieweg
1920Trustworthy cyber-physical systems engineeringIshikawa, Fuyuki; Romanovsky, Alexander2017Chapman and Hall/CRC
1921Cybersecurity LawJeff Kosseff2017Wiley
1922Cognitive Hack. The New Battleground in Cybersecurity ... the Human MindJames Bone2017CRC Press
1923CCNA Cyber Ops SECFND #210-250 Official Cert GuideOmar Santos, Joseph Muniz, Stefano De Crescenzo2017Cisco Press
1924CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001Michael J. Chapple, David Seidl2017Sybex
1925CCNA Cyber Ops SECFND #210-250 Official Cert GuideOmar Santos, Joseph Muniz, Stefano De Crescenzo2017Cisco Press
1926Tallinn Manual 2.0 on the International Law Applicable to Cyber OperationsMichael N. Schmitt2017Cambridge University Press
1927Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local LevelRobert M. Clark, Simon Hakim (eds.)2017Springer International Publishing
1928Personal Cybersecurity: How to Avoid and Recover from CybercrimeMarvin Waschke (auth.)2017Apress
1929Cybercrime, Organized Crime, and Societal Responses: International ApproachesEmilio C. Viano (eds.)2017Springer International Publishing
1930Public International Law of CyberspaceKriangsak Kittichaisaree (auth.)2017Springer International Publishing
1931Cognitive hack : the new battleground in cybersecurity... the human mindBone, James2017Auerbach Publications, CRC Press
1932Cybersecurity: Geopolitics, Law, and PolicyAmos N. Guiora2017CRC Press
1933CCNA Cyber Ops SECOPS 210-255 Official Cert GuideOmar Santos, Joseph Muniz2017Cisco Press
1934The Cyber Risk Handbook. Creating and Measuring Effective Cybersecurity CapabilitiesDomenic Antonucci2017Springer
1935Cyber Security. Simply. Make it HappenFerri Abolhassan (ed.)2017Springer
1936Cybersecurity for Industry 4.0: Analysis for Design and ManufacturingLane Thames, Dirk Schaefer (eds.)2017Springer International Publishing
1937Cybernetics, Warfare and Discourse : The Cybernetisation of Warfare in Britain Anthimos Alexandros Tsirigotis (auth.)2017Palgrave Macmillan
1938Security-Aware Design for Cyber-Physical Systems: A Platform-Based ApproachChung-Wei Lin, Alberto Sangiovanni-Vincentelli (auth.)2017Springer International Publishing
1939Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and TechnologyNicholas J. Daras, Themistocles M. Rassias (eds.)2017Springer International Publishing
1940Privacy, Data Protection and Cybersecurity in EuropeWolf J. Schünemann, Max-Otto Baumann (eds.)2017Springer International Publishing
1941Cyberspace: Risks and Benefits for Society, Security and DevelopmentJ. Martín Ramírez, Luis A. García-Segura (eds.)2017Springer International Publishing
1942Multi-Disciplinary Engineering for Cyber-Physical Production Systems: Data Models and Software Solutions for Handling Complex Engineering ProjectsStefan Biffl, Arndt Lüder, Detlef Gerhard (eds.)2017Springer International Publishing
1943Cybernetics and Mathematics Applications in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 2Radek Silhavy, Roman Senkerik, Zuzana Kominkova Oplatkova, Zdenka Prokopova, Petr Silhavy (eds.)2017Springer International Publishing
1944Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection: 15th International Conference, PAAMS 2017, Porto, Portugal, June 21-23, 2017, ProceedingsYves Demazeau, Paul Davidsson, Javier Bajo, Zita Vale (eds.)2017Springer International Publishing
1945Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, ProceedingsShlomi Dolev, Sachin Lodha (eds.)2017Springer International Publishing
1946Highlights of Practical Applications of Cyber-Physical Multi-Agent Systems: International Workshops of PAAMS 2017, Porto, Portugal, June 21-23, 2017, ProceedingsJavier Bajo, Zita Vale, Kasper Hallenborg, Ana Paula Rocha, Philippe Mathieu, Pawel Pawlewski, Elena Del Val, Paulo Novais, Fernando Lopes, Nestor D. Duque Méndez, Vicente Julián, Johan Holmgren (eds.)2017Springer International Publishing
1947Security of Industrial Control Systems and Cyber-Physical Systems: Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected PapersNora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.)2017Springer International Publishing
1948Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantYang Xu (eds.)2017Springer Singapore
1949Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan MeetingsShin Nakajima, Jean-Pierre Talpin, Masumi Toyoshima, Huafeng Yu (eds.)2017Springer Singapore
1950CompTIA Cybersecurity Analyst (CSA+) Cert GuideTroy McMillan2017Pearson IT Certification
1951Research Methods for Cyber SecurityThomas Edgar and David Manz (Auth.)2017 Syngress
1952Cyber-Physical and Gentelligent Systems in Manufacturing and Life Cycle. Genetics and Intelligence - Keys to Industry 4.0Berend Denkena and Tobias Morke (Eds.)2017 Academic Press
1953Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security CenterMarshall Copeland (auth.)2017Apress
1954The Nature of the Machine and the Collapse of Cybernetics: A Transhumanist Lesson for Emerging TechnologiesAlcibiades Malapi-Nelson (auth.)2017Springer International Publishing
1955A history of cybersecurity attacks : 1980 to presentBruce Middleton2017Auerbach Publications;CRC Press
1956Threat Level Red: Cybersecurity Research Programs of the U.S. GovernmentMichael Erbschloe2017Auerbach Publications;Taylor & Francis
1957Inside the Enemy's Computer: Identifying Cyber AttackersClement Guitton2017Oxford University Press USA : Oxford University Press
1958CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam GuideFernando Maymi, Brent Chapman2017McGraw-Hill Education
1959Introduction to embedded systems: a cyber-physical systems approachEdward Ashford Lee, Sanjit Arunkumar Seshia2017MIT Press
1960Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and TechnologyNicholas J. Daras, Themistocles M. Rassias (eds.)2017Springer
1961New Perspectives on Cybercrime2017Noble, Wayne, Owen, Tim, Palgrave Macmillan, Speed, Faye
1962Cybersecurity in FranceBaumard, Philippe2017Springer International Publishing
1963Data analytics and decision support for cybersecurity : trends, methodologies and applicationsHuang, Yan; Kalutarage, Harsha Kumara; Palomares Carrascosa, Iván2017Springer International Publishing
1964Cyber justice : human rights and good governance for the internetMihr, Anja2017Springer
1965Theory and models for cyber situation awarenessJajodia, Sushil; Liu, Peng; Wang, Cliff2017Springer
1966Cyber-assurance for the internet of thingsBrooks, Tyson T2017
1967Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National LevelFlorian Skopik2017Auerbach Publications
1968Encyclopedia of Cyber WarfarePaul Springer2017ABC-CLIO
1969 Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health InformationEric C. Thompson (auth.)2017Apress
1970 Inhabiting Cyberspace and Emerging Cyberplaces: The Case of Siena, ItalyTobias Boos (auth.)2017Palgrave Macmillan
1971Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter EffortsMaurizio Martellini, Andrea Malizia (eds.)2017Springer International Publishing
1972Cyber Racism and Community Resilience: Strategies for Combating Online Race HateAndrew Jakubowicz et al.2017Palgrave Macmillan
1973Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, ProceedingsSheng Wen, Wei Wu, Aniello Castiglione (eds.)2017Springer International Publishing
1974Transactions on Computational Science XXX: Special Issue on Cyberworlds and CybersecurityMarina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin (eds.)2017Springer-Verlag Berlin Heidelberg
1975Resilience and Risk: Methods and Application in Environment, Cyber and Social DomainsIgor Linkov, José Manuel Palma-Oliveira (eds.)2017Springer Netherlands
1976 Secure and Trustworthy Transportation Cyber-Physical SystemsYunchuan Sun,Houbing Song (eds.)2017Springer Singapore
1977Social Interactions and Networking in Cyber SocietyFord Lumban Gaol, Fonny Dameaty Hutagalung (eds.)2017Springer Singapore
1978 Crime, Genes, Neuroscience and CyberspaceTim Owen (auth.)2017Palgrave Macmillan UK
1979Cyberspace and CybersecurityGeorge Kostopoulos2017Auerbach Publications
1980Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD MethodologyAndrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria2017CRC Press
1981A practical introduction to human-in-the-loop cyber-physical systemsBoavida, Fernando; Nunes, David; Silva, Jorge Sá2017John Wiley & Sons
1982Reporting on an entity's cybersecurity risk management program and controls : SOC for cybersecurity2017American Institute of Certified Public Accountants
1983Cybercrime and Its VictimsElena Martellozzo; Emma A Jane; (eds.)2017Routledge
1984The Friendly Orange Glow: The Untold Story of the PLATO System and the Dawn of CybercultureBrian Dear2017Pantheon
1985Darkweb cyber threat intelligence miningRobertson, John2017
1986Listening In: Cybersecurity in an Insecure AgeSusan Landau2017Yale University Press
1987Metadata: The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta WarJames Scott2017
1988Handbook of Research on Applied Cybernetics and Systems ScienceSnehanshu Saha et al.2017IGI Global
1989Cyber Frauds, Scams and their VictimsMark Button, Cassandra Cross2017Routledge
1990Big Data Analytics in CybersecurityDeng, Julia; Savas, Onur2017Taylor and Francis
1991Biomedical Odysseys: Fetal Cell Experiments from Cyberspace to ChinaPriscilla Song2017Princeton University Press
1992New Cyber Strategy of China and the Alterations in the FieldNurkulov Nurshod Olimovich2017Journal of Political Sciences & Public Affairs
1993Encyclopedia of Cyber WarfarePaul J. Springer2017ABC-Clio
1994Understanding Cyber Conflict: 14 AnalogiesGeorge Perkovich; Ariel E. Levite2017Georgetown University Press
1995Personal Cybersecurity: How to Avoid and Recover from CybercrimeMarvin Waschke2017Apress
1996Research agenda. The human factor in cybercrime and cybersecurity.Eric Rutger Leukfeldt2017Eleven International Publishing
1997Industrial Cybersecurity Efficiently secure critical infrastructure systemsPascal Ackerman2017
1998Cyberspace, Cybersecurity, and CybercrimeJanine Kremling; Amanda M Sharp Parker2017Sage Publications, Inc
1999Cybercrime and Digital Forensics: An IntroductionThomas J. Holt; Adam M Bossler; Kathryn Seigfried-Spellar2017Routledge
2000Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidentsGerard Johansen2017Packt Publishing
2001Comptia Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001Michael J. Chapple; David Seidl2017Sybex
2002Cyber security : A practitioner’s guideDavid Sutton2017Swindon, United Kingdom BCS, the Chartered Institute for IT
2003Cybersecurity Ethics: An IntroductionMary Manjikian2017Routledge/Taylor & Francis
2004Cybersecurity Ethics: An IntroductionMary Manjikian2017Routledge/Taylor & Francis
2005Protecting Children Online? Cyberbullying Policies Of Social Media CompaniesTijana Milosevic, Sonia Livingstone2017The MIT Press
2006Cyber dragon : inside China's information warfare and cyber operationsDean Cheng2017Praeger, an imprint of ABC-CLIO, LLC
2007Hacking: The No-Nonsense Guide: Learn Ethical Hacking Within 12 Hours! (Including FREE "Pro Hacking Tips" Infographic) (Cyberpunk Programming Series)Cyberpunk University2017Cyberpunk University
2008The Science Of CybersecurityAlan Radley2017
2009RASPBERRY PI & HACKING: 2 Books in 1: THE BLUEPRINT: Everything You Need To Know (CyberPunk Blueprint Series)CyberPunk Architects2017Cyberpunk Books
2010Big Data Analytics in Cybersecurity and IT ManagementOnur Savas (editor), Julia Deng (editor)2017Auerbach Publications
2011Industrial Cybersecurity: Efficiently secure critical infrastructure systemsPascal Ackerman2017Packt Publishing Ltd
2012Industrial Cybersecurity: Efficiently secure critical infrastructure systems (English Edition)Pascal Ackerman2017Packt Publishing
2013Cyber Racism and Community Resilience: Strategies for Combating Online Race HateAndrew Jakubowicz; Kevin Dunn; Gail Mason; Yin Paradies; Ana-Maria Bliuc; Nasya Bahfen; Andre Oboler; Rosalie Atie; Karen Connelly2017Springer
2014Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidentsGerard Johansen2017Packt Publishing
2015Information Fusion for Cyber-Security AnalyticsAleroud, Ahmed;Alsmadi, Izzat M.;Karabatis, George2017Imprint: Springer, Springer International Publishing
2016Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantXu, Yang2017Springer Singapore
2017Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power PlantXu, Yang2017Springer
2018Industrial cybersecurity: efficiency secure critical infrastructure systemsAckerman, P2017Packt Publishing
2019The darkening web: the war for cyberspaceKlimburg, Alexander2017Penguin Publishing Group;Penguin Press
2020CCNA Cyber Ops SECFND 210-250 official cert guideDe Crescenzo, Stefano;Muniz, Joseph;Santos, Omar2017Pearson Education Limited (US titles);Cisco Press
2021The Basics of Cyber Safety Computer and Mobile Device Safety Made EasyCross, Michael;Sammons, John2017Elsevier Science and Technology Books, Inc
2022CCNA Cyber Ops SECFND 210-250 official cert guideDe Crescenzo, Stefano;Muniz, Joseph;Santos, Omar2017Cisco Press
2023The cybernetics moment: or why we call our age the information ageKline, Ronald R2017Johns Hopkins university press., [Maryland]
2024Industrial Internet of Things: Cybermanufacturing SystemsBrecher, Christian.;Jeschke, Sabina.;Rawat, Danda B.;Song, Houbing2017Springer International Publishing : Imprint : Springer
2025Personal Cybersecurity: How to Avoid and Recover from CybercrimeWaschke, Marvin2017Apress
2026Digital rebellion: the birth of the cyber leftWolfson, Todd2017University of Illinois Press
2027Cyber security engineering: a practical approach for systems and software assuranceMead, Nancy R.;Woody, Carol C2017Addison-Wesley
2028CCNA cyber ops SECOPS #210-255 official cert guideMuniz, Joseph;Santos, Omar2017Cisco Press
2029Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan MeetingsNakajima, Shin.;Talpin, Jean-Pierre.;Toyoshima, Masumi.;Yu, Huafeng2017Springer Singapore : Imprint : Springer
2030Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan MeetingsNakajima, Shin.;Talpin, Jean-Pierre.;Toyoshima, Masumi.;Yu, Huafeng2017Springer Singapore : Imprint : Springer
2031Hacking isis: the war to kill the cyber jihadNance, Malcolm2017Skyhorse;W W Norton
2032Cyberpsychology and the BrainParsons, Thomas D2017Cambridge University Press
2033Digital defense: a cybersecurity primerPelton, Joseph N.;Singh, Indu Bhushan2017Springer International Publishing;Springer Science+Business Media
2034Striking power: how cyber, robots, and space weapons change the rules for warRabkin, Jeremy A.;Yoo, John2017Encounter Books
2035CCNA cyber ops SECOPS #210-255 official cert guideSantos, Omar;Joseph Muniz;Stefano De Crescenzo2017Pearson Education Limited (US titles);Cisco Press
2036Cyber Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in BetweenSelby, Nick;Vescent, Heather2017Weldon Owen
2037Encyclopedia of Cyber WarfareSpringer, Paul J2017ABC-CLIO, LLC
2038Virtual Terror: 21st Century Cyber WarfareWagner, Daniel2017Daniel Wagner
2039Industrial CybersecurityAckerman, Pascal2017Packt Publishing Limited
2040Cybersecurity for beginnersMeeuwisse, Raef2017Cyber Simplicity Ltd
2041CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)Walker, Matt2017McGraw-Hill Education
2042Comptia Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001Chapple, Michael J;Seidl, David2017Sybex
2043Plugged in: Cybersecurity in the Modern AgeJon Silman2017Gatorbytes
2044New Horizons for Second-Order CyberneticsAlexander Riegler, Karl H. Müller, Stuart A. Umpleby2017World Scientific
2045Systems, Cybernetics, Control, and Automation: Ontological, Epistemological, Societal, and Ethical Issues (River Publishers Series in Automation, Control, and Robotics)Spyros G. Tzafestas2017River Publishers
2046Cyber security and policy : a substantive dialogueAnuradha Mathrani (editor); Julian Jang-Jaccard (editor); Andrew M. Colarik (editor)2017
2047Understanding Cyber Conflict: Fourteen AnalogiesGeorge Perkovich, Ariel E. Levite, E2017Georgetown University Press
2048China's Cyber Warfare: The Evolution of Strategic DoctrineJason R. Fritz2017Lexington Books
2049Cyber Society, Big Data, and Evaluation: Comparative Policy EvaluationJonathan D. Breul2017Transaction Publishers
2050Industrial Cyber Security for Dummies.David Meltzer and Jeff Lund2017John Wiley & Sons, Inc.
2051Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign CyberattacksRobert Mandel2017Georgetown University Press
2052Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, ProceedingsShlomi Dolev; Sachin Lodha2017Springer
2053US National Cybersecurity: International Politics, Concepts and OrganizationDamien van Puyvelde; Aaron F. Brantly2017Routledge
2054International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government SectorsU. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation2017e-artnow
2055Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred KaplanWorth Books2017Worth Books
2056Cyberpunk and Visual CultureGraham Murphy, Lars Schmeink2017Routledge
2057Facing Cyber Threats Head on: Protecting Yourself and Your BusinessBrian Minick2017Rowman & Littlefield Publishers
2058Everything You Need to Know about Trolls and CybermobsSabrina Adams2017The Rosen Publishing Group, Inc
2059Power Down & Parent Up!: Cyber Bullying, Screen Dependence & Raising Tech-Healthy Children!Holli Kenley2017Loving Healing Press
2060Cinema, Trance and CyberneticsUte Holl2017Amsterdam University Press
2061Cybercognition: Brain, Behaviour and the Digital WorldLee Hadlington2017SAGE Publications
2062Cyber TerrorGadish, Orna2017OGM
2063Cyber Terror: How It Happens And What We Can DoOrna Gadish2017
2064Cyber Terror: How It Happens And What We Can DoOrna Gadish2017OGM
2065Cyber Law: A Legal Arsenal for Online BusinessBrett J. Trout2017M. Stefan Strozier
2066Cybersecurity: Protecting Your Identity and DataMary-Lane Kamberg2017The Rosen Publishing Group, Inc
2067Coping with CyberbullyingJeff Mapua2017The Rosen Publishing Group, Inc
2068Cyberdualism in China: The Political Implications of Internet Exposure of Educated YouthShiru Wang2017Routledge
2069Combatting Cybercrime Tools and Capacity Building for Emerging Economiescoll.2017The World Bank
2070Introduction to Cyber SecurityJeetendra Pande2017Uttarakhand Open University
2071Listening In: Cybersecurity in an Insecure AgeSusan Landau2017Yale University Press
2072Digital World War: Islamists, Extremists, and the Fight for Cyber SupremacyHaroon K. Ullah2017Yale University Press
2073Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factorAndreas Von Grebmer2017Books on Demand
2074A 21st Century Cyber-Physical Systems Educationand Medicine Engineering National Academies of Sciences; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Committee on 21st Century Cyber-Physical Systems Education2017National Academies Press
2075Embedded Systems, Cyber-Physical Systems, and ApplicationsHamid R. Arabnia2017C. S. R. E. A.
2076The Manager's Guide to Cybersecurity Law : Essentials for Today's BusinessTari Schreider; Kristen Noakes-Fry2017Rothstein Associates, Incorporated
2077Embedded Systems, Cyber-Physical Systems, and ApplicationsHamid R. Arabnia; Leonidas Deligiannidis; Fernando G. Tinetti2017C. S. R. E. A.
2078Cyber Mobs : Destructive Online CommunitiesAllison Krumsiek2017Greenhaven Publishing LLC
2079Foundational Cybersecurity Research: Improving Science, Engineering, and Institutionsand Medicine Engineering National Academies of Sciences; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Peter J. Weinberger; Baruch Fischhoff; Lynette I. Millett2017National Academies Press
2080Investigating CybercrimeAngie Timmons; Sara L. Latta2017Enslow Publishing, LLC
2081Biomedical Odysseys: Fetal Cell Experiments from Cyberspace to ChinaPriscilla Song2017Princeton University Press
2082Understanding Cyber Conflict: Fourteen AnalogiesGeorge Perkovich (editor), Ariel E. Levite (editor)2017Georgetown University Press
2083Embracing the Machines: Robots, Cyber, and New Rules for WarJeremy A. Rabkin; John Yoo2017Encounter Books
2084Hacking ISIS: How to Destroy the Cyber JihadMalcolm W. Nance2017Skyhorse
2085Cybercognition: Brain, Behaviour and the Digital WorldLee Hadlington2017SAGE
2086Cyber Law in the NetherlandsArno R. Lodder;Mark G.A. Egeler;Wanda E.L. van Kerkvoorden;2017Kluwer Law International
2087Cyber Law in the NetherlandsArno R. Lodder;Mark G.A. Egeler;Wanda E.L. van Kerkvoorden;2017Kluwer Law International
2088An Introduction to CyberpsychologyIrene Connolly, Marion Palmer, Hannah Barton, Gráinne Kirwan2017Routledge
2089Cyber Warfare Building the Scientific FoundationJajodia, Sushil;Shakarian, Paulo;Subrahmanian, V. S.;Swarup, Vipin;Wang, Cliff2016Springer International Publishing
2090Hamlet on the holodeck: the future of narrative in cyberspaceMurray, Janet H2016Free Press
2091Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.)2016Springer Singapore
2092From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 yearsHans-Joachim Heintze, Pierre Thielbo¨rger (editors)2016Springer International Publishing
2093Cybernetics: From Past to FutureD.A. Novikov2016Springer
2094The Global Cyber-Vulnerability ReportV.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash2016Springer
2095Cyber-physical systems : a computational perspectiveDeka, Ganesh Chandra; Patnaik, L. M.; Siddesh, Gaddadevara Matt; Srinivasa, Krishnarajanagar Gopalalyengar2016CRC Press LLC
2096Essential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsJosiah Dykstra2016O'Reilly Media
2097Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and ApplicationsAntonio Guerrieri, Valeria Loscri, Anna Rovella, Giancarlo Fortino (eds.)2016Springer International Publishing
2098Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL ApproachRoman Gumzej (auth.)2016Springer International Publishing
2099Cybersecurity Investments: Decision Support Under Economic AspectsStefan Beissel (auth.)2016Springer International Publishing
2100Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2015Oliver Niggemann, Jürgen Beyerer (eds.)2016Springer Vieweg
2101Transactions on Computational Science XXVI: Special Issue on Cyberworlds and CybersecurityMarina L. Gavrilova, C.J. Kenneth Tan, Andrés Iglesias, Mikio Shinya, Akemi Galvez, Alexei Sourin (eds.)2016Springer-Verlag Berlin Heidelberg
2102Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.)2016Springer Singapore
2103Cybersecurity in the European Union: Resilience and Adaptability in Governance PolicyGeorge Christou (auth.)2016Palgrave Macmillan UK
2104From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 yearsHans-Joachim Heintze, Pierre Thielbo¨rger (editors)2016Springer International Publishing
2105Dark Territory: The Secret History of Cyber WarFred Kaplan2016Simon & Schuster
2106Dark Territory: The Secret History of Cyber WarFred Kaplan2016Simon & Schuster
2107From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 yearsHans-Joachim Heintze, Pierre Thielbo¨rger (editors)2016Springer International Publishing
2108Cybernetics: From Past to FutureD.A. Novikov2016Springer
2109The Global Cyber-Vulnerability ReportV.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash2016Springer
2110Cyber-physical systems : a computational perspectiveDeka, Ganesh Chandra; Patnaik, L. M.; Siddesh, Gaddadevara Matt; Srinivasa, Krishnarajanagar Gopalalyengar2016CRC Press LLC
2111Essential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsJosiah Dykstra2016O'Reilly Media
2112Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and ApplicationsAntonio Guerrieri, Valeria Loscri, Anna Rovella, Giancarlo Fortino (eds.)2016Springer International Publishing
2113Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL ApproachRoman Gumzej (auth.)2016Springer International Publishing
2114Cybersecurity Investments: Decision Support Under Economic AspectsStefan Beissel (auth.)2016Springer International Publishing
2115Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2015Oliver Niggemann, Jürgen Beyerer (eds.)2016Springer Vieweg
2116Transactions on Computational Science XXVI: Special Issue on Cyberworlds and CybersecurityMarina L. Gavrilova, C.J. Kenneth Tan, Andrés Iglesias, Mikio Shinya, Akemi Galvez, Alexei Sourin (eds.)2016Springer-Verlag Berlin Heidelberg
2117Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.)2016Springer Singapore
2118Cybersecurity in the European Union: Resilience and Adaptability in Governance PolicyGeorge Christou (auth.)2016Palgrave Macmillan UK
2119From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 yearsHans-Joachim Heintze, Pierre Thielbo¨rger (editors)2016Springer International Publishing
2120Dark Territory: The Secret History of Cyber WarFred Kaplan2016Simon & Schuster
2121Dark Territory: The Secret History of Cyber WarFred Kaplan2016Simon & Schuster
2122A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)Kohnke, Anne; Shoemaker, Dan; Sigler, Kenneth2016CRC Press/Auerbach
2123The complete guide to cybersecurity risks and controlsKohnke, Anne; Shoemaker, Dan; Sigler, Kenneth2016CRC Press
2124Cyber security for industrial control systems : from the viewpoint of close-loopChen, Jiming; Cheng, Peng; Zhang, Heng2016CRC Press
2125Cyber Security Awareness for CEOs and ManagementDalziel, Henry; Willson, David2016Syngress is an imprint of Elsevier
2126Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response GuideLuis Ayala2016Apress
2127Rise of the Machines: A Cybernetic HistoryThomas Rid2016W. W. Norton & Company
2128Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response GuideLuis Ayala (auth.)2016Apress
2129Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected PapersKristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.)2016Springer International Publishing
2130Technological Innovation for Cyber-Physical Systems: 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, Costa de Caparica, Portugal, April 11-13, 2016, ProceedingsLuis M. Camarinha-Matos, António J. Falcão, Nazanin Vafaei, Shirin Najdi (eds.)2016Springer International Publishing
2131Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected PapersAdrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, Costas Lambrinoudakis (eds.)2016Springer International Publishing
2132Applied Cyberpsychology: Practical Applications of Cyberpsychological Theory and ResearchAlison Attrill, Chris Fullwood (eds.)2016Palgrave Macmillan UK
2133Cyberspies: The Secret History of Surveillance, Hacking, and Digital EspionageGordon Corera2016Pegasus Books
2134Cyberspies: The Secret History of Surveillance, Hacking, and Digital EspionageGordon Corera2016Pegasus Books
2135Cyberspies: The Secret History of Surveillance, Hacking, and Digital EspionageGordon Corera2016Pegasus Books
2136The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes OnlineMary Aiken2016Spiegel & Grau
2137Communications for Control in Cyber Physical Systems. Theory, Design and Applications in Smart GridsHusheng Li2016Morgan Kaufmann
2138Cybersecurity and Applied MathematicsLeigh Metcalf, William Casey2016Syngress
2139Cyber GuerillaJelle Van Haaster, Rickey Gevers, Martijn Sprengers2016Syngress
2140Cyber Security Engineering A Practical Approach for Systems and Software AssuranceCarol Woody, Nancy R. Mead2016Addison-Wesley Professional
2141Cybersecurity LexiconLuis Ayala (auth.)2016Apress
2142Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and PreventionLuis Ayala (auth.)2016Apress
2143The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity WarSteve Grobman, Allison Cerra (auth.)2016Apress
2144Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and ApplicationsDietmar P.F. Möller (auth.)2016Springer International Publishing
2145The "Dematerialized" Insurance: Distance Selling and Cyber Risks from an International PerspectivePierpaolo Marano, Ioannis Rokas, Peter Kochenburger (eds.)2016Springer International Publishing
2146Cyber-security of SCADA and Other Industrial Control SystemsEdward J. M. Colbert, Alexander Kott (eds.)2016Springer International Publishing
2147Cyber Deception: Building the Scientific FoundationSushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (eds.)2016Springer International Publishing
2148Combatting Cybercrime and Cyberterrorism: Challenges, Trends and PrioritiesBabak Akhgar, Ben Brewster (eds.)2016Springer International Publishing
2149The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major EconomiesNir Kshetri (auth.)2016Springer International Publishing
2150Introduction to CyberdeceptionNeil C. Rowe, Julian Rrushi (auth.)2016Springer International Publishing
2151Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USADenise Nicholson (eds.)2016Springer International Publishing
2152Automation, Communication and Cybernetics in Science and Engineering 2015/2016Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.)2016Springer International Publishing
2153Transactions on Computational Science XXVIII: Special Issue on Cyberworlds and CybersecurityMarina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin (eds.)2016Springer-Verlag Berlin Heidelberg
2154Cyberactivism and Citizen Journalism in Egypt: Digital Dissidence and Political ChangeCourtney C. Radsch (auth.)2016Palgrave Macmillan US
2155Cyberbullying: Approaches, Consequences and InterventionsLucy R. Betts (auth.)2016Palgrave Macmillan UK
2156Political Cyberformance: The Etheatre ProjectChristina Papagiannouli (auth.)2016Palgrave Macmillan UK
2157Cyber GuerillaJelle Van Haaster, Rickey Gevers2016Syngress
2158Cybersecurity and Applied MathematicsLeigh Metcalf, William Casey2016Syngress
2159How to Measure Anything in Cybersecurity RiskDouglas W. Hubbard, Richard Seiersen2016Wiley
2160How to Measure Anything in Cybersecurity RiskDouglas W. Hubbard, Richard Seiersen2016Wiley
2161Machine Learning for Cyber Physical SystemsBeyerer Jürgen, Niggemann Oliver, Kühnert Christian (eds.)2016Springer
2162Cyber-Risk Informatics: Engineering Evaluation with Data ScienceMehmet Sahinoglu2016Wiley
2163Trustworthy Cyber-Physical Systems EngineeringAlexander Romanovsky, Fuyuki Ishikawa (eds,)2016Chapman and Hall / CRC
2164Development of a Cyber Physical System for Fire SafetyRosalie Faith Wills, André Marshall (auth.)2016Springer International Publishing
2165Globalization and Cyberculture: An Afrocentric PerspectiveKehbuma Langmia (auth.)2016Palgrave Macmillan
2166Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS LegacyAndrea Bondavalli, Sara Bouchenak, Hermann Kopetz (eds.)2016Springer International Publishing
2167Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st CenturyJoshua B. Hill, Nancy E. Marion2016Praeger
2168Development Of A Cyber Physical System For Fire SafetyRosalie Faith Wills2016Springer
2169The cybersecurity dilemma : hacking, trust, and fear between nationsBuchanan, Ben2016Oxford University Press
2170Walking Wounded: Inside the U.S. Cyberwar MachineMichael A. VanPutte2016CreateSpace
2171Psychoanalysis, Identity, and the Internet: Explorations into CyberspaceAndrea Marzi2016Karnac Books
2172Binary bullets : the ethics of cyberwarfareAllhoff, Fritz; Henschke, Adam; Strawser, Bradley Jay2016Oxford University Press
2173The Decision to Attack: Military and Intelligence Cyber Decision-MakingAaron Franklin Brantly, William Keller, Scott Jones2016Studies in Security and Intern
2174Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction StrategiesIra Winkler and Araceli Treu Gomes (Auth.)2016 Syngress
2175An introduction to cyberpsychologyConnolly, Irene; Palmer, Marion; Barton, Hannah; Kirwan, Gráinne2016Taylor and Francis;Routledge
2176Cyber Security Engineering: A Practical Approach for Systems and Software AssuranceNancy R. Mead, Carol Woody2016Addison-Wesley Professional
2177Cyber Security: Everything an Executive Needs to KnowPhillip Ferraro2016Phillip J Ferraro LLC
2178Cyber Warfare: Its Implications on National SecuritySanjeev Relia2016Vij Books India
2179Making Passwords Secure - Fixing the Weakest Link in CybersecurityDovell Bonnett2016Access Smart Media
2180Cyberpsychology: The Study of Individuals, Society and Digital TechnologiesMonica T. Whitty, Garry Young2016BPS Blackwell
2181Securing Cyberspace International and Asian PerspectivesCherian Samuel2016Pentagon Press
2182Cyber-Physical System Design with Sensor Networking TechnologiesSherali Zeadally, Nafaa Jabeur2016The Institution of Engineering and Technology
2183Cybercrime in Progress: Theory and prevention of technology-enabled offensesThomas J Holt; Adam M Bossler2016Routledge
2184Cyber Fraud: The Web of LiesBryan Seely2016Krebs on Security
2185Hamlet on the Holodeck: The Future of Narrative in CyberspaceJanet H. Murray2016
2186Essential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsJosiah Dykstra2016O’Reilly Media
2187CyberethicsRichard A. Spinello2016Jones & Bartlett Publishers
2188Islamophobia in Cyberspace: Hate Crimes Go ViralImran Awan (ed.)2016Ashgate
2189Cyberbullies, Cyberactivists, Cyberpredators: Film, TV, and Internet StereotypesLauren Rosewarne2016Praeger
2190National Security and Counterintelligence in the Era of Cyber EspionageEugenie de Silva2016IGI Global
2191Cybersecurity Management Guidelines Ver 1.1Ministry of Economy, Trade and Industry (METI), Independent Administrative Agency Information-technology Promotion Agency (IPA)2016Ministry of Economy, Trade and Industry (METI), Independent Administrative Agency Information-technology Promotion Agency (IPA)
2192Hacked: The Inside Story of America’s Struggle to Secure CyberspaceCharlie Mitchell2016Rowman & Littlefield
2193Ranulph Glanville And How To Live The Cybernetics Of UnknowingPhillip Guddemi, Soren Brier, Louis H. Kauffman2016Imprint Academic
2194Architecture and Adaptation: From Cybernetics to Tangible ComputingSocrates Yiannoudes2016Routledge
2195Architecture and Adaptation: From Cybernetics to Tangible ComputingSocrates Yiannoudes2016Routledge
2196Online Trolling And Its Perpetrators: Under The CyberbridgePnina Fichman, Madelyn R. Sanfilippo2016Rowman & Littlefield Publishers
2197Essential Cyber Security HandbookNam Nguyen2016Nam Nguyen
2198Cybernetics: The Macy Conferences 1946-1953 : The Complete TransactionsClaus Pias (editor)2016Diaphanes
2199Cyber Security And The Politics Of TimeTim Stevens2016Cambridge University Press
2200Science Fiction Writers' Phrase Book: Essential Reference for All Authors of Sci-Fi, Cyberpunk, Dystopian, Space Marine, and Space Fantasy Adventure (Writers' Phrase Books Book 6)Jackson Dean Chase2016Jackson Dean Chase, Inc.
2201Cyber-physical system design with sensor networking technologiesSherali Zeadally (editor); Nafaâ Jabeur (editor)2016
2202Essential cybersecurity science: build, test, and evaluate secure systemsDykstra, Josiah2016O'Reilly Media
2203Cyber-physical attack recovery procedures: a step-by-step preparation and response guideAyala, Luis2016Apress
2204Cybersecurity LexiconAyala, Luis2016Apress
2205Cyberbullying Across the Globe: Gender, Family, and Mental HealthLarrañaga, Elisa.;Navarro, Raúl.;Yubero, Santiago2016Springer International Publishing : Imprint: Springer
2206Cyberbullying Across the Globe: Gender, Family, and Mental HealthLarrañaga, Elisa.;Navarro, Raúl.;Yubero, Santiago2016Springer International Publishing : Imprint: Springer
2207Cybernetics: The Macy Conferences 1946-1953: The Complete TransactionsClaus Pias (editor)2016University of Chicago Press
2208Cyberspies: The Secret History Of Surveillance, Hacking, And Digital EspionageGordon Corera2016Pegasus Books
2209How to measure anything in cybersecurity riskHubbard, Douglas W.;Seiersen, Richard2016Wiley
2210Cybersecurity and Applied MathematicsCasey, William;Metcalf, Leigh;William Casey2016Elsevier Science & Technology Books;Syngress
2211Cyber insecurity: navigating the perils of the next information ageHarrison, Richard M.;Herr, Trey2016Rowman & Littlefield Publishers
2212Rise of the machines: a cybernetic historyRid, Thomas2016W. W. Norton & Company
2213Intelligent Methods for Cyber WarfareRonald R. Yager, Marek Z. Reformat;Naif Alajlan2016Springer International Publishing
2214Cyberbullies, cyberactivists, cyberpredators: film, TV, and internet stereotypesRosewarne, Lauren2016ABC-CLIO;Praeger
2215Cyber-risk informatics: engineering evaluation with data scienceSahinoglu, Mehmet2016John Wiley & Sons, Incorporated
2216Future War: Super-soldiers, Terminators, Cyberspace, and the National Security Strategy for Twenty-First-Century CombatRobert L. Maginnis2016Defender Publishing
2217Cyber GuerillaJelle van Haaster2016Syngress
2218Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital WarfareGeorge Lucas2016Oxford University Press
2219Cyber GuerillaJelle Van Haaster, Rickey Gevers, Martijn Sprengers2016Syngress
2220Deleuze and Baudrillard: From Cyberpunk to BiopunkSean McQueen2016Edinburgh University Press
2221How HIPAA Can Crush Your Medical Practice: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About ItCraig a Petronella2016Createspace Independent Publishing Platform
2222Cyberspace in Peace and WarLibicki, Martin C.;2016Naval Institute Press
2223China's Cyber PowerNigel Inkster2016Routledge
2224From Parchment to Cyberspace: Medieval Literature in the Digital AgeStephen G. Nichols2016Peter Lang Inc., International Academic Publishers
2225Cyber security for industrial control systems : from the viewpoint of close-loopPeng Cheng, Heng Zhang, Jiming Chen (eds.)2016CRC Press
2226Cyber Flame: The invasion of cyberbullying and the motives of bulliesAlexander Bostic2016UNKNOWN
2227Complete CompTIA A+ Guide to IT Hardware and Software (Pearson IT Cybersecurity Curriculum (ITCC))Cheryl A. Schmidt2016Pearson IT Certification
2228From Parchment to Cyberspace: Medieval Literature in the Digital Age (Medieval Interventions)Stephen G. Nichols2016Peter Lang Inc., International Academic Publishers
2229Cyberspies: The Secret History of Surveillance, Hacking, and Digital EspionageGordon Corera2016
2230International Conflict And Cyberspace Superiority: Theory And PracticeWilliam D. Bryant2016Routledge
2231Cybersecurity And Human Rights In The Age Of CyberveillanceJoanna Kulesza, Roy Balleste2016Rowman & Littlefield
2232Conflict in Cyber Space: Theoretical, Strategic and Legal PespectivesKarsten Friis; Jens Ringsmose2016Routledge
2233Cyberbullying Across the GlobeRaúl Navarro, Santiago Yubero and Elisa Larrañaga2016Springer International Publishing, Cham
2234Cyberbullying Across the GlobeRaúl Navarro, Santiago Yubero; Elisa Larrañaga2016Springer International Publishing, Cham
2235Cyberbullying: approaches, consequences and interventionsLucy R Betts2016Springer Nature
2236Hacked: The Inside Story Of America's Struggle To Secure CyberspaceCharlie Mitchell2016Rowman & Littlefield
2237CyberGenetics: Health genetics and new mediaAnna Harris, Susan Kelly, Sally Wyatt2016Routledge
2238The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values—and What We Can Do About ItMary Aiken2016Random House Publishing Group
2239Hamelt on the Holodeck The Future of Narrative in CyberspaceJanet H. Murray2016The Free Press
2240Cybersecurity: Issues of Today, a Path for TomorrowDaniel Reis2016Archway Publishing
2241Cyber Conflicts and Small StatesLech J. Janczewski, William Caelli2016Routledge
2242CyberGenetics: Health genetics and new mediaAnna Harris; Susan Kelly; Sally Wyatt2016Routledge
2243Anonymity, Cybercrime, and the Connection to CryptocurrencyJesse D. Bray2016
2244Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic CompetitionStrategic Studies Institute (U.S.) (editor), Phil Williams (editor), Dighton Fiddner (editor)2016Department of the Army
2245Cyber Security Cyber Attacks and Counter Measures: User Perspective (PGDCS-03)Nihar Ranjan Pande (ed.)2016Uttarakhand Open University
2246Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and ApplicationsAntonio Guerrieri; Valeria Loscri; Anna Rovella; Giancarlo Fortino2016Springer
2247North Korea's Cyber Operations : Strategy and ResponsesJenny Jun; Scott LaFoy; Ethan Sohn2016Center for Strategic & International Studies
2248Deleuze and Baudrillard: From Cyberpunk to BiopunkSean McQueen2016Edinburgh University Press
2249Online Trolling and Its Perpetrators: Under the CyberbridgePnina Fichman, Madelyn Sanfilippo2016Rowman & Littlefield Publishers
2250A Social-ecological Approach to CyberbullyingMichelle F. Wright2016Nova Science
2251Cyberbullying: From Theory to InterventionTrijntje Völlink, Francine Dehue, Conor Mc Guckin2016Routledge
2252Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction StrategiesIra Winkler, Araceli Treu Gomes2016Syngress
2253Cyberbullying in social media within educational institutions: featuring student, employee, and parent informationAmerican Association of School Administrators;Bollinger, Dorothy M.;Horowitz, Merle2015Rowman & Littlefield Publishers
2254A Human Readable Guide to Cyber SecurityDane Christian2015
2255Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki2015Springer International Publishing
2256Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
2257Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
2258Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki (eds.)2015Springer International Publishing
2259Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. ProceedingsHamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.)2015Springer International Publishing
2260Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2015Springer International Publishing
2261Psycho-CyberneticsMaxwell Maltz2015Tarcher Perigee
2262Cyber reconnaissance, surveillance, and defenseRobert Shimonski2015Elsevier/Syngress, Syngress
2263Intelligent Methods for Cyber WarfareRonald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.)2015Springer International Publishing
2264Hardware/Software Co-Design and Optimization for Cyberphysical Integration in Digital Microfluidic BiochipsYan Luo, Krishnendu Chakrabarty, Tsung-Yi Ho (auth.)2015Springer International Publishing
2265Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding PrinciplesRolf H. Weber (auth.)2015Springer-Verlag Berlin Heidelberg
2266Propagation of Interval and Probabilistic Uncertainty in Cyberinfrastructure-related Data Processing and Data FusionChristian Servin, Vladik Kreinovich (auth.)2015Springer International Publishing
2267Cyber Physical Systems Approach to Smart Electric Power GridSiddhartha Kumar Khaitan, James D. McCalley, Chen Ching Liu (eds.)2015Springer-Verlag Berlin Heidelberg
2268China and Cybersecurity: Espionage, Strategy, and Politics in the Digital DomainJon R. Lindsay, Tai Ming Cheung, Derek S. Reveron2015Oxford University Press
2269Cyber Blackout: When the Lights Go Out -- Nation at RiskJohn A. Adams Jr.2015FriesenPress
2270A Human Readable Guide to Cyber SecurityDane Christian2015
2271Cyber Warfare: Building the Scientific FoundationSushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (eds.)2015Springer International Publishing
2272Cybercrime, Digital Forensics and JurisdictionMohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.)2015Springer International Publishing
2273Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee (auth.)2015Springer International Publishing
2274Foundations & Principles of Distributed Manufacturing: Elements of Manufacturing Networks, Cyber-Physical Production Systems and Smart AutomationHermann Kühnle, Günter Bitsch (auth.)2015Springer International Publishing
2275Chinese Cybersecurity and CyberdefenseDaniel Ventre2015Wiley-ISTE
2276Cyber-security Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare2015CRC Pr I Llc, Johnson, Thomas A
2277Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki2015Springer International Publishing
2278The Cybernetics Moment: Or Why We Call Our Age the Information AgeRonald R. Kline2015Johns Hopkins University Press
2279Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber WarfareThomas A. Johnson2015CRC Press
2280Cyber-Physical Attacks: A Growing Invisible ThreatGeorge Loukas2015Butterworth-Heinemann
2281MAC Protocols for Cyber-Physical SystemsFeng Xia, Azizur Rahim (auth.)2015Springer-Verlag Berlin Heidelberg
2282Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
2283Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
2284Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced ThreatsScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam2015Apress
2285Cyber-physical attacks: a growing invisible threatLoukas, George2015Butterworth-Heinemann is an imprint of Elsevier
2286Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced ThreatsScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam (auth.)2015Apress
2287Self- and Co-regulation in Cybercrime, Cybersecurity and National SecurityTatiana Tropina, Cormac Callanan (auth.)2015Springer International Publishing
2288Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki (eds.)2015Springer International Publishing
2289Intelligent Systems in Cybernetics and Automation Theory: Proceedings of the 4th Computer Science On-line Conference 2015 (CSOC2015), Vol 2: Intelligent Systems in Cybernetics and Automation TheoryRadek Silhavy, Roman Senkerik, Zuzana Kominkova Oplatkova, Zdenka Prokopova, Petr Silhavy (eds.)2015Springer International Publishing
2290Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease ManagementNikolaos S. Voros, Christos P. Antonopoulos (eds.)2015Springer International Publishing
2291Formal Modeling and Verification of Cyber-Physical Systems: 1st International Summer School on Methods and Tools for the Design of Digital Systems, Bremen, Germany, September 2015Rolf Drechsler, Ulrich Kühne (eds.)2015Springer Vieweg
2292Cyber Fraud: The Web of LiesBryan Seely, Jonathan David Chicquette, Brian Muchinsky2015Amazon
2293Privacy in a Cyber Age: Policy and PracticeAmitai Etzioni2015Palgrave Macmillan
2294Cyber-Proletariat: Global Labour in the Digital VortexNick Dyer-Witheford2015Pluto Press
2295Cyberphobia: Identity, Trust, Security and the InternetLucas Edward2015Bloomsbury
2296Cyber Warfare: A Multidisciplinary AnalysisJames A. Green2015Routledge
2297Cybercrime Risks and Responses: Eastern and Western PerspectivesRussell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau2015Palgrave Macmillan
2298The Internet Revolution: From Dotcom Capitalism to Cybernetic CommunismRichard Barbrook, Andy Cameron2015Institute of Network Cultures
2299Current and Emerging Trends in Cyber Operations: Policy, Strategy and PracticeFrederic Lemieux2015Palgrave Macmillan
2300Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O'Leary (auth.)2015Apress
2301Cybersecurity in IsraelLior Tabansky, Isaac Ben Israel (auth.)2015Springer International Publishing
2302Digital Defense: A Cybersecurity PrimerJoseph Pelton, Indu B. Singh (auth.)2015Springer International Publishing
2303Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. ProceedingsHamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.)2015Springer International Publishing
2304Cyber-Risk ManagementAtle Refsdal, Bjørnar Solhaug, Ketil Stølen (auth.)2015Springer International Publishing
2305Cyber Physical Systems. Design, Modeling, and Evaluation: 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, October 8, 2015, ProceedingsMohammad Reza Mousavi, Christian Berger (eds.)2015Springer International Publishing
2306Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2015Springer International Publishing
2307Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015, Revised Selected PapersJoshua I. James, Frank Breitinger (eds.)2015Springer International Publishing
2308Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O'Leary2015Apress
2309Proceedings of the 5th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2015D.O. Terletskyi, I.O. Lytvynenko (eds.)2015Bukrek
2310Cyberbullying Across the Globe: Gender, Family, and Mental HealthRaúl Navarro, Santiago Yubero, Elisa Larrañaga (eds.)2015Springer
2311@Heaven: The Online Death of a Cybernetic FuturistHastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard2015OR Books
2312@Heaven: The Online Death of a Cybernetic FuturistHastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard2015OR Books
2313The Cybernetics Moment: Or Why We Call Our Age the Information AgeKline, Ronald R2015Johns Hopkins University Press
2314Cyber warfare : a reference handbookSpringer, Paul J2015ABC-CLIO
2315Cyber warfare : a reference handbookSpringer, Paul J2015ABC-CLIO
2316Securing cyber-physical systemsPathan, Al-Sakib Khan2015CRC Press
2317Terrorism in cyberspace : the next generationWeimann, Gabriel2015Woodrow Wilson Center Press ; New York : Columbia University Press
2318The Cybernetics Moment: Or Why We Call Our Age the Information AgeKline, Ronald R2015Johns Hopkins University Press
2319The real cyber war : the political economy of Internet freedomJablonski, Michael; Powers, Shawn M2015University of Illinois Press
2320Cyber-Physical Systems: From Theory to PracticeDanda B. Rawat, Joel Rodrigues, Ivan Stojmenovic (eds.)2015CRC Press
2321Cyber-Humans: Our Future with MachinesWoodrow Barfield (auth.)2015Copernicus
2322Firebrand Waves of Digital Activism 1994–2014: The Rise and Spread of Hacktivism and CyberconflictAthina Karatzogianni (auth.)2015Palgrave Macmillan UK
2323Current and Emerging Trends in Cyber Operations: Policy, Strategy and PracticeFrederic Lemieux (eds.)2015Palgrave Macmillan UK
2324Cybercrime Risks and Responses: Eastern and Western PerspectivesRussell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau (eds.)2015Palgrave Macmillan UK
2325Deterring Cyber Warfare: Bolstering Strategic Stability in CyberspaceBrian M. Mazanec, Bradley A. Thayer (auth.)2015Palgrave Macmillan UK
2326Russia’s Coercive Diplomacy: Energy, Cyber, and Maritime Policy as New Sources of PowerRyan C. Maness, Brandon Valeriano (auth.)2015Palgrave Macmillan UK
2327Privacy in a Cyber Age: Policy and PracticeAmitai Etzioni (auth.)2015Palgrave Macmillan US
2328Principles of object oriented modeling and simulation with Modelica 3.3 : a cyber-physical approachFritzson, Peter A2015Wiley-IEEE Press
2329Cyber reconnaissance, surveillance, and defenseRobert Shimonski2015Elsevier/Syngress, Syngress
2330Intelligent Methods for Cyber WarfareRonald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.)2015Springer International Publishing
2331Hardware/Software Co-Design and Optimization for Cyberphysical Integration in Digital Microfluidic BiochipsYan Luo, Krishnendu Chakrabarty, Tsung-Yi Ho (auth.)2015Springer International Publishing
2332Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding PrinciplesRolf H. Weber (auth.)2015Springer-Verlag Berlin Heidelberg
2333Propagation of Interval and Probabilistic Uncertainty in Cyberinfrastructure-related Data Processing and Data FusionChristian Servin, Vladik Kreinovich (auth.)2015Springer International Publishing
2334Cyber Physical Systems Approach to Smart Electric Power GridSiddhartha Kumar Khaitan, James D. McCalley, Chen Ching Liu (eds.)2015Springer-Verlag Berlin Heidelberg
2335China and Cybersecurity: Espionage, Strategy, and Politics in the Digital DomainJon R. Lindsay, Tai Ming Cheung, Derek S. Reveron2015Oxford University Press
2336Cyber Blackout: When the Lights Go Out -- Nation at RiskJohn A. Adams Jr.2015FriesenPress
2337A Human Readable Guide to Cyber SecurityDane Christian2015
2338Cyber Warfare: Building the Scientific FoundationSushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (eds.)2015Springer International Publishing
2339Cybercrime, Digital Forensics and JurisdictionMohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.)2015Springer International Publishing
2340Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee (auth.)2015Springer International Publishing
2341Foundations & Principles of Distributed Manufacturing: Elements of Manufacturing Networks, Cyber-Physical Production Systems and Smart AutomationHermann Kühnle, Günter Bitsch (auth.)2015Springer International Publishing
2342Chinese Cybersecurity and CyberdefenseDaniel Ventre2015Wiley-ISTE
2343Cyber-security Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare2015CRC Pr I Llc, Johnson, Thomas A
2344Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki2015Springer International Publishing
2345The Cybernetics Moment: Or Why We Call Our Age the Information AgeRonald R. Kline2015Johns Hopkins University Press
2346Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber WarfareThomas A. Johnson2015CRC Press
2347Cyber-Physical Attacks: A Growing Invisible ThreatGeorge Loukas2015Butterworth-Heinemann
2348MAC Protocols for Cyber-Physical SystemsFeng Xia, Azizur Rahim (auth.)2015Springer-Verlag Berlin Heidelberg
2349Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
2350Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber SecurityUjjwal Sahay2015
2351Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced ThreatsScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam2015Apress
2352Cyber-physical attacks: a growing invisible threatLoukas, George2015Butterworth-Heinemann is an imprint of Elsevier
2353Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced ThreatsScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam (auth.)2015Apress
2354Self- and Co-regulation in Cybercrime, Cybersecurity and National SecurityTatiana Tropina, Cormac Callanan (auth.)2015Springer International Publishing
2355Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmäki (eds.)2015Springer International Publishing
2356Intelligent Systems in Cybernetics and Automation Theory: Proceedings of the 4th Computer Science On-line Conference 2015 (CSOC2015), Vol 2: Intelligent Systems in Cybernetics and Automation TheoryRadek Silhavy, Roman Senkerik, Zuzana Kominkova Oplatkova, Zdenka Prokopova, Petr Silhavy (eds.)2015Springer International Publishing
2357Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease ManagementNikolaos S. Voros, Christos P. Antonopoulos (eds.)2015Springer International Publishing
2358Formal Modeling and Verification of Cyber-Physical Systems: 1st International Summer School on Methods and Tools for the Design of Digital Systems, Bremen, Germany, September 2015Rolf Drechsler, Ulrich Kühne (eds.)2015Springer Vieweg
2359Cyber Fraud: The Web of LiesBryan Seely, Jonathan David Chicquette, Brian Muchinsky2015Amazon
2360Privacy in a Cyber Age: Policy and PracticeAmitai Etzioni2015Palgrave Macmillan
2361Cyber-Proletariat: Global Labour in the Digital VortexNick Dyer-Witheford2015Pluto Press
2362Cyberphobia: Identity, Trust, Security and the InternetLucas Edward2015Bloomsbury
2363Cyber Warfare: A Multidisciplinary AnalysisJames A. Green2015Routledge
2364Cybercrime Risks and Responses: Eastern and Western PerspectivesRussell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau2015Palgrave Macmillan
2365The Internet Revolution: From Dotcom Capitalism to Cybernetic CommunismRichard Barbrook, Andy Cameron2015Institute of Network Cultures
2366Current and Emerging Trends in Cyber Operations: Policy, Strategy and PracticeFrederic Lemieux2015Palgrave Macmillan
2367Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O'Leary (auth.)2015Apress
2368Cybersecurity in IsraelLior Tabansky, Isaac Ben Israel (auth.)2015Springer International Publishing
2369Digital Defense: A Cybersecurity PrimerJoseph Pelton, Indu B. Singh (auth.)2015Springer International Publishing
2370Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. ProceedingsHamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.)2015Springer International Publishing
2371Cyber-Risk ManagementAtle Refsdal, Bjørnar Solhaug, Ketil Stølen (auth.)2015Springer International Publishing
2372Cyber Physical Systems. Design, Modeling, and Evaluation: 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, October 8, 2015, ProceedingsMohammad Reza Mousavi, Christian Berger (eds.)2015Springer International Publishing
2373Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2015Springer International Publishing
2374Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015, Revised Selected PapersJoshua I. James, Frank Breitinger (eds.)2015Springer International Publishing
2375Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O'Leary2015Apress
2376Proceedings of the 5th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2015D.O. Terletskyi, I.O. Lytvynenko (eds.)2015Bukrek
2377Cyberbullying Across the Globe: Gender, Family, and Mental HealthRaúl Navarro, Santiago Yubero, Elisa Larrañaga (eds.)2015Springer
2378@Heaven: The Online Death of a Cybernetic FuturistHastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard2015OR Books
2379@Heaven: The Online Death of a Cybernetic FuturistHastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard2015OR Books
2380The Cybernetics Moment: Or Why We Call Our Age the Information AgeKline, Ronald R2015Johns Hopkins University Press
2381Cyber warfare : a reference handbookSpringer, Paul J2015ABC-CLIO
2382Cyber warfare : a reference handbookSpringer, Paul J2015ABC-CLIO
2383Securing cyber-physical systemsPathan, Al-Sakib Khan2015CRC Press
2384Terrorism in cyberspace : the next generationWeimann, Gabriel2015Woodrow Wilson Center Press ; New York : Columbia University Press
2385The Cybernetics Moment: Or Why We Call Our Age the Information AgeKline, Ronald R2015Johns Hopkins University Press
2386The real cyber war : the political economy of Internet freedomJablonski, Michael; Powers, Shawn M2015University of Illinois Press
2387Cyber-Physical Systems: From Theory to PracticeDanda B. Rawat, Joel Rodrigues, Ivan Stojmenovic (eds.)2015CRC Press
2388Cyber-Humans: Our Future with MachinesWoodrow Barfield (auth.)2015Copernicus
2389Firebrand Waves of Digital Activism 1994–2014: The Rise and Spread of Hacktivism and CyberconflictAthina Karatzogianni (auth.)2015Palgrave Macmillan UK
2390Current and Emerging Trends in Cyber Operations: Policy, Strategy and PracticeFrederic Lemieux (eds.)2015Palgrave Macmillan UK
2391Cybercrime Risks and Responses: Eastern and Western PerspectivesRussell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau (eds.)2015Palgrave Macmillan UK
2392Deterring Cyber Warfare: Bolstering Strategic Stability in CyberspaceBrian M. Mazanec, Bradley A. Thayer (auth.)2015Palgrave Macmillan UK
2393Russia’s Coercive Diplomacy: Energy, Cyber, and Maritime Policy as New Sources of PowerRyan C. Maness, Brandon Valeriano (auth.)2015Palgrave Macmillan UK
2394Privacy in a Cyber Age: Policy and PracticeAmitai Etzioni (auth.)2015Palgrave Macmillan US
2395Principles of object oriented modeling and simulation with Modelica 3.3 : a cyber-physical approachFritzson, Peter A2015Wiley-IEEE Press
2396Cybersecurity policies and strategies for cyberwarfare preventionRichet, Jean-Loup2015Information Science Reference, IGI Global
2397New threats and countermeasures in digital crime and cyber terrorismDawson, Maurice; Omar, Marwan2015Information Science Reference
2398Cyber Physical Systems: Architectures, Protocols and ApplicationsChi (Harold) Liu, Yan Zhang2015CRC Press
2399Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O'Leary2015Apress
2400Cyber Security: Analytics, Technology and AutomationMartti Lehto, Pekka Neittaanmaki2015Springer
2401Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced ThreatsScott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam2015Apress
2402Essential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsJosiah Dykstra2015O'Reilly Media
2403Evolution of Cyber Technologies and Operations to 2035Misty Blowers (eds.)2015Springer International Publishing
2404Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber DefenseKristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow (auth.)2015Springer International Publishing
2405Lights out: a cyberattack, a nation unprepared, surviving the aftermathKoppel, Ted2015Crown Publishers
2406An Introduction to CyberneticsW. Ross Ashby2015Martino Fine Books
2407An Introduction to CyberneticsW. Ross Ashby2015Martino Fine Books
2408Cybersonic Arts: Adventures in American New MusicGordon Mumma2015University of Illinois Press
2409Cyber war versus cyber realities : cyber conflict in the international systemManess, Ryan C.; Valeriano, Brandon2015Oxford University Press
2410Cyber StrategyU S Department of Defense2015
2411A simpler guide to online security for everyone : how to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google servicesClark, Ceri2015Ceri Clark;Lycan Books
2412Cybersecurity and Human Rights in the Age of CyberveillanceKulesza, Joanna; Balleste, Roy2015Rowman & Littlefield Publishers
2413Cybersecurity and Human Rights in the Age of CyberveillanceKulesza, Joanna; Balleste, Roy2015Rowman & Littlefield Publishers
2414Warrior elite : Australia's special forces, Z force to the SAS intelligence operations to cyber warfareMacklin, Robert2015Hachette Australia
2415Warrior elite : Australia's special forces, Z force to the SAS intelligence operations to cyber warfareMacklin, Robert2015Hachette Australia
2416Protecting our future : educating a cybersecurity workforce. Volume 2Jane LeClair, Sherri W Ramsay2015Hudson Whitman/ Excelsior College Press
2417Principles of Cyber-Physical SystemsRajeev Alur2015The MIT Press
2418A Human Readable Guide to Cyber SecurityChristian, Dane2015
2419Master Internet and Computer Security: How to protect yourself from cyber crime, malicious software and data lossWilliamson Steve2015
2420The CIS Critical Security Controls for Effective Cyber Defense, Version 6.0Center for Internet Security2015Center for Internet Security
2421CCFP Certified Cyber Forensics Professional Certification All-in-One Exam GuideChuck Easttom2015McGraw-Hill Education
2422Cyber Security Incident Management GuideCentre For Cyber Security Belgium2015Centre For Cyber Security Belgium
2423Cybernetics and the philosophy of mindSayre, Kenneth M.2015Routledge
2424Book club kit. Lights out: a cyberattack, a nation unprepared, surviving the aftermanthTed Koppel2015Crown Publishers
2425Psycho-Cybernetics: Updated and ExpandedMaxwell Maltz2015Perigee;TarcherPerigee
2426Cybersecurity in our digital livesKeeley, Gregory; LeClair, Jane2015Hudson Whitman
2427Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfareJohnson, Thomas Alfred2015CRC Press
2428CSX Cybersecurity Fundamentals Study GuideISACA2015ISACA
2429Cyber Security Awareness for Corporate Directors and Board MembersWillson, David; Dalziel, Henry2015Elsevier Science
2430Cyber Security Awareness for LawyersDavid Willson, Henry Dalziel2015Syngress
2431Cyber Security Awareness for Accountants and CPAsDavid Willson, Henry Dalziel2015Syngress
2432Computer Law: A Guide to Cyberlaw and Data Privacy LawDavid Bender2015LexisNexis
2433Intelligent Methods for Cyber WarfareAlajlan, Naif;Reformat, Marek Z.;Yager, Ronald R2015Springer International Publishing : Imprint : Springer
2434Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease ManagementAntonopoulos, Christos P.;Voros, Nikolaos S2015Springer International Publishing
2435Cybercrime, digital forensics and jurisdictionChawki, Mohamed;Darwish, Ashraf;Khan, Mohammad Ayoub;Tyagi, Sapna2015Springer
2436CCFP certified cyber forensics professional certification: exam guideEasttom, Chuck2015McGraw-Hill Education
2437Cybernethisms: Aldo Giorgini’s Computer Art LegacyGarca? Bravo, Esteban;Giorgini, Aldo2015Bookmasters Group;Purdue University Press
2438Cybernethisms: Aldo Giorgini's computer art legacyGarca? Bravo, Esteban;Giorgini, Aldo2015Purdue University Press
2439Essential cybersecurity science: build, test, and evaluate secure systemsJosiah Dykstra2015O'Reilly Media
2440Book club kit. Lights out: a cyberattack, a nation unprepared, surviving the aftermanthKoppel, Ted2015Crown;Archetype;Crown Publishers
2441Introduction to US Cybersecurity CareersDalziel, Max2015Elsevier Science;Syngress
2442@heaven: The Online Death of a Cybernetic FuturistHastreiter, Kim;Mandel, Thomas;Van der Leun, Gerard2015OR Books
2443@heaven: The Online Death of a Cybernetic FuturistHastreiter, Kim;Mandel, Thomas;Van der Leun, Gerard2015OR Books
2444Psycho-Cybernetics, Updated And ExpandedRecorded Books, Inc.;Maltz, Maxwell2015Penguin Publishing Group;Perigee
2445Principles Of CybercrimeJonathan Clough2015Cambridge University Press
2446Making your primary school e-safe: whole school cyberbullying and e-safety strategies for meeting Ofsted requirementsGreat Britain. Office for Standards in Education.; Katz, Adrienne2015Jessica Kingsley Publishers
2447Beyond cybersecurity: protecting your digital businessKaplan, James M;Bailey, Tucker;O'Halloran, Derek;Marcus, Alan J2015John Wiley & Sons
2448Bit wars: cyber crime, hacking & information warfareHyslip, Dr Thomas S2015Createspace Independent Publishing Platform
2449Psycho-CyberneticsMaxwell Maltz2015Penguin Publishing Group
2450Cyber War: Law and Ethics for Virtual ConflictsJens David Ohlin (editor), Kevin Govern (editor), Claire Finkelstein (editor)2015Oxford University Press
2451Cybercrime : legislation, cases and commentaryGregor Urbas2015LexisNexis Butterworths
2452Cyber Security Awareness for CEOs and ManagementDavid Willson, Henry Dalziel2015Syngress
2453Cyber-Proletariat: Global Labour in the Digital VortexNick Dyer-Witheford2015Between the Lines
2454International Conflict and Cyberspace Superiority: Theory and PracticeWilliam D. Bryant2015Routledge
2455Cyber Threat: The Rise of Information Geopolitics in U.S. National SecurityChris Bronk2015ABC-CLIO
2456Principles of Cyber-Physical Systems (Complete Instructor's Resources, Solution Manual) (Solutions)Rajeev Alur2015The MIT Press
2457Hackers Wanted: An Examination of the Cybersecurity Labor MarketMartin C. Libicki; David Senty; Julia Pollak2015RAND Corporation
2458Essential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsJosiah Dykstra2015O'Reilly Media
2459Cyber Operations: Building, Defending, and Attacking Modern Computer NetworksMike O'Leary2015Apress
2460A Practical Guide to Coping with CyberstalkingNational Centre for Cyberstalking Research2015Andrews UK
2461The Evolution of Cyber War: International Norms for Emerging-Technology WeaponsBrian M. Mazanec2015Potomac Books
2462Finance: Cloud Computing, Cyber Security and Cyber Heist--Beginners Guide to Help Protect Against Online Theft in the Cyber WorldAlex Nkenchor Uwajeh2015Alex Nkenchor Uwajeh
2463Men Are From Cyberspace: The Single Woman's Guide To Flirting, Dating, & Finding LoveLisa Skriloff; Jodie Gould2015St. Martin's Publishing Group
2464Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate ResponsibilityEmily B. Laidlaw2015Cambridge University Press
2465Cybersecurity and the Internet of Thingscoll.2015
2466Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service AttacksClaude Fachkha2015Concordia University
2467Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber DefenseKristin E. Heckman; Frank J. Stech; Roshan K. Thomas; Ben Schmoker; Alexander W. Tsow2015Springer
2468Evolution of Cyber Technologies and Operations to 2035Misty Blowers2015Springer
2469Cyber Defense and Situational AwarenessAlexander Kott; Cliff Wang; Robert F. Erbacher2015Springer
2470Cyber Spy Hunters!Mari Rich2015National Highlights Inc
2471Cyber-Attacks and the Exploitable Imperfections of International LawYaroslav Radziwill2015BRILL
2472Interim Report on 21st Century Cyber-Physical Systems EducationNational Research Council; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Committee on 21st Century Cyber-Physical Systems Education2015National Academies Press
2473Globalization’s Impact on Cultural Identity Formation : Queer Diasporic Males in CyberspaceAhmet Atay2015Lexington Books
2474Reporting in the MENA Region : Cyber Engagement and Pan-Arab Social MediaMohammad Ayish; Noha Mellor2015Rowman & Littlefield Publishers
2475Perspectives on Bullying : Research on Childhood, Workplace, and CyberbullyingRoland D. Maiuro2015Springer Publishing Company, Incorporated
2476Perspectives on Stalking : Victims, Perpetrators, and CyberstalkingRoland D. Maiuro2015Springer Publishing Company, Incorporated
2477New Media Politics : Rethinking Activism and National Security in CyberspaceBanu Baybars-Hawks; Lemi Baruh2015Cambridge Scholars Publishing
2478Framework for SCADA Cybersecurity ePubRichard Clark2015InduSoft
2479Perspectives on Bullying : Research on Childhood, Workplace, and CyberbullyingRoland D. Maiuro2015Springer Publishing Company
2480HACK-X-CRYPT: A Straight Forward Guide Towards Ethical Hacking and Cyber SecurityUjjwal Sahay2015Ujjwal Sahay
2481The Cybernetic Brain: Sketches of Another FuturePickering, Andrew2014University of Chicago Press
2482Black code: inside the battle for cyberspaceDeibert, Ronald J2014McClelland & Stewart;Signal
2483Cyber Warfare and the Laws of WarHarrison Dinniss, Heather2014Cambridge University Press
2484DarkMarket: Cyberthieves, Cybercops and YouGlenny, Misha2014Vintage;House of Anansi Press
2485Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013Anthony Bonato, Stephen Finbow, Przemyslaw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)2014Springer India
248610 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut, Daniel Bachrach2014Apress
248710 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and PrivacyDaniel G. Bachrach, Eric J. Rzeszut (auth.)2014Apress
2488Bio-inspiring Cyber Security and Cloud Services: Trends and InnovationsAboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.)2014Springer-Verlag Berlin Heidelberg
2489Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2014Springer International Publishing
2490Cyber SecurityVoeller, John G.2014Wiley
2491Applied Cyber-Physical SystemsBernd J. Krämer (auth.), Sang C. Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu (eds.)2014Springer-Verlag New York
2492Network science and cybersecurityAlexander Kott (auth.), Robinson E. Pino (eds.)2014Springer-Verlag New York
2493Cyberspace and International Relations: Theory, Prospects and ChallengesRoxana Radu (auth.), Jan-Frederik Kremer, Benedikt Müller (eds.)2014Springer-Verlag Berlin Heidelberg
2494Investigating Internet Crimes. An Introduction to Solving Crimes in CyberspaceTodd Shipley and Art Bowker (Auth.)2014Syngress
2495Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE. Developing Cyber-Physical SystemsBran Selic and Sébastien Gérard (Auth.)2014Morgan Kaufmann
2496Cyber Warfare. Techniques, Tactics and Tools for Security PractitionersJason Andress and Steve Winterfeld (Auth.)2014Syngress
2497Cybersecurity and Cyberwar: What Everyone Needs to KnowP.W. Singer, Allan Friedman2014Oxford University Press, USA
2498Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013Anthony Bonato, Stephen Finbow, Przemyslaw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)2014Springer India
2499Developments in the Theory and Practice of Cybercartography: Applications and Indigenous MappingD.R.Fraser Taylor (Eds.)2014Elsevier Science
2500Impacts of Cyberbullying, Building Social and Emotional Resilience in SchoolsSharlene Chadwick (auth.)2014Springer International Publishing
2501Computer Network Security and Cyber Ethics, 4th ed.Joseph Migga Kizza2014McFarland
2502Innovative Approaches Towards Low Carbon Economics: Regional Development CyberneticsJiuping Xu, Liming Yao, Yi Lu (auth.)2014Springer-Verlag Berlin Heidelberg
2503Cybernics: Fusion of human, machine and information systemsYoshiyuki Sankai, Kenji Suzuki, Yasuhisa Hasegawa (eds.)2014Springer Japan
2504Computational Intelligence for Decision Support in Cyber-Physical SystemsZeashan H Khan, A. B. M. Shawkat Ali, Zahid Riaz (eds.)2014Springer-Verlag Singapur
2505Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and MalwareAditya Sood and Richard Enbody (Auth.)2014Syngress
2506Cyberpatterns: Unifying Design Patterns with Security and Attack PatternsClive Blackwell, Hong Zhu (eds.)2014Springer International Publishing
2507Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP ApproachArmando W. Colombo, Thomas Bangemann, Stamatis Karnouskos, Jerker Delsing, Petr Stluka, Robert Harrison, Francois Jammes, Jose L. Lastra (eds.)2014Springer International Publishing
2508Cybersecurity for Executives: A Practical GuideGregory J. Touhill, C. Joseph Touhill2014Wiley-AIChE
2509Cyber Threat!: How to Manage the Growing Risk of Cyber AttacksMacDonnell Ulsch2014Wiley
2510Cyber Policy in ChinaGreg Austin2014Polity
251110 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut, Daniel Bachrach2014Apress
2512Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second EditionJames E Fitzpatrick; Joseph G Morelli2014Elsevier/Mosby, CRC Press
2513Cyber crime and cyber terrorism investigator's handbookBabak Akhgar; Andrew Staniforth; Francesca Bosco2014Syngress, , Elsevier Inc
251410 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and PrivacyDaniel G. Bachrach, Eric J. Rzeszut (auth.)2014Apress
2515Cyberterrorism: Understanding, Assessment, and ResponseThomas M. Chen, Lee Jarvis, Stuart Macdonald (eds.)2014Springer-Verlag New York
2516Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and PracticeElias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos (eds.)2014Springer-Verlag New York
2517Legal Principles for Combatting CyberlaunderingDaniel Adeoyé Leslie (auth.)2014Springer International Publishing
2518Cybersecurity Systems for Human Cognition AugmentationRobinson E. Pino, Alexander Kott, Michael Shevenell (eds.)2014Springer International Publishing
2519Cybersecurity in SwitzerlandMyriam Dunn Cavelty (auth.)2014Springer International Publishing
2520Bio-inspiring Cyber Security and Cloud Services: Trends and InnovationsAboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.)2014Springer-Verlag Berlin Heidelberg
2521Transactions on Computational Science XXIII: Special Issue on CyberworldsMarina L. Gavrilova, C. J. Kenneth Tan, Xiaoyang Mao, Lichan Hong (eds.)2014Springer-Verlag Berlin Heidelberg
2522Cyber Disobedience: Re://Presenting Online AnarchyJeff Shantz, Jordon Tomblin2014Zero Books
2523Cyber and Electromagnetic Threats in Modern Relay ProtectionVladimir Gurevich2014CRC Press
2524Spam nation: the inside story of organized cybercrime—from global epidemic to your front doorBrian Krebs2014Sourcebooks
2525Markets for cybercrime tools and stolen data : hackers' bazaarLillian Ablon;Martin C Libicki;Andrea A Golay;Rand Corporation,;Acquisition and Technology Policy Center,;All authors2014RAND Corporation
2526Automation, Communication and Cybernetics in Science and Engineering 2013/2014Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.)2014Springer International Publishing
2527Cyber Defense and Situational AwarenessAlexander Kott, Cliff Wang, Robert F. Erbacher (eds.)2014Springer International Publishing
2528Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2014Springer International Publishing
2529Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected PapersPavel Gladyshev, Andrew Marrington, Ibrahim Baggili (eds.)2014Springer International Publishing
2530Machine Learning and Cybernetics: 13th International Conference, Lanzhou, China, July 13-16, 2014. ProceedingsXizhao Wang, Witold Pedrycz, Patrick Chan, Qiang He (eds.)2014Springer-Verlag Berlin Heidelberg
2531Proceedings of the 4th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2014D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.)2014Bukrek
2532Neocybernetics and NarrativeBruce Clarke2014University of Minnesota Press
2533Spam nation: the inside story of organized cybercrime—from global epidemic to your front doorBrian Krebs2014Sourcebooks
2534Spam nation: the inside story of organized cybercrime—from global epidemic to your front doorBrian Krebs2014Sourcebooks
2535Cyberbullying: Causes, Consequences, and Coping StrategiesNicole L. Weber, William V., Jr. Pelfrey2014Lfb Scholarly Pub Llc
2536Cyber AttackMargaret J. Goldstein,Martin Gitlin2014Lerner Publishing Group;Twenty-First Century Books
2537Cyber Policy in ChinaGreg Austin2014Polity
2538Labor in the Global Digital Economy: The Cybertariat Comes of AgeUrsula Huws2014Monthly Review Press
2539Managing Trust in CyberspaceSabu M. Thampi, Bharat Bhargava2014Taylor & Francis Group, LLC
2540Cyberwar, Cyberterror, Cybercrime and CyberactivismJulie E. Mehan2014IT Governance Publishing
2541Data Analysis for Network Cyber-SecurityNiall Adams, Nicholas Heard, Niall Adams, Nicholas Heard2014World Scientific Publishing Company
2542Introduction to US Cybersecurity CareersHenry Dalziel2014Syngress
2543How to Define and Build an Effective Cyber Threat Intelligence CapabilityHenry Dalziel, Eric Olson, James Carnall2014Syngress
2544Cybersecurity and Cyberwar: What Everyone Needs to Know®P.W. Singer, Allan Friedman2014Oxford University Press
2545Hate Crimes in CyberspaceDanielle Keats Citron2014Harvard University Press
2546Cyber Operations and the Use of Force in International LawMarco Roscini2014Oxford University Press
2547Cyber operations and the use of force in international lawRoscini, Marco2014Oxford University Press
2548Cybersecurity and cyberwar : what everyone needs to knowSinger, Peter Warren; Friedman, Allan2014Oxford University Press
2549Cybertheology : thinking Christianity in the era of the internetSpadaro, Antonio; Way, Maria2014Fordham University Press
2550Hate crimes in cyberspaceCitron, Danielle Keats2014Harvard University Press
2551Neocybernetics and narrativeClarke, Bruce2014Univ Of Minnesota Press
2552The beginning of heaven and Earth has no name : seven days with second-order cyberneticsHeinz von Foerster & Albert Muller & Karl H. Muller & Elinor Rooks & Michael Kasenbacher2014Fordham University Press
2553Cyber SecurityVoeller, John G.2014Wiley
2554Cybercrime and Cyber WarfareBernik, Igor2014Wiley-ISTE
2555Cyber-War: The Anatomy of the global Security ThreatJulian Richards (auth.)2014Palgrave Macmillan UK
2556Cyber Ireland: Text, Image, CultureClaire Lynch (auth.)2014Palgrave Macmillan UK
2557Body, Soul and Cyberspace in Contemporary Science Fiction Cinema: Virtual Worlds and Ethical ProblemsSylvie Magerstädt (auth.)2014Palgrave Macmillan UK
2558Cameron’s Conservatives and the Internet: Change, Culture and Cyber ToryismAnthony Ridge-Newman (auth.)2014Palgrave Macmillan UK
2559Applied Cyber-Physical SystemsBernd J. Krämer (auth.), Sang C. Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu (eds.)2014Springer-Verlag New York
2560Network science and cybersecurityAlexander Kott (auth.), Robinson E. Pino (eds.)2014Springer-Verlag New York
2561Cyberspace and International Relations: Theory, Prospects and ChallengesRoxana Radu (auth.), Jan-Frederik Kremer, Benedikt Müller (eds.)2014Springer-Verlag Berlin Heidelberg
2562Investigating Internet Crimes. An Introduction to Solving Crimes in CyberspaceTodd Shipley and Art Bowker (Auth.)2014Syngress
2563Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE. Developing Cyber-Physical SystemsBran Selic and Sébastien Gérard (Auth.)2014Morgan Kaufmann
2564Cyber Warfare. Techniques, Tactics and Tools for Security PractitionersJason Andress and Steve Winterfeld (Auth.)2014Syngress
2565Cybersecurity and Cyberwar: What Everyone Needs to KnowP.W. Singer, Allan Friedman2014Oxford University Press, USA
2566Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013Anthony Bonato, Stephen Finbow, Przemyslaw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.)2014Springer India
2567Developments in the Theory and Practice of Cybercartography: Applications and Indigenous MappingD.R.Fraser Taylor (Eds.)2014Elsevier Science
2568Impacts of Cyberbullying, Building Social and Emotional Resilience in SchoolsSharlene Chadwick (auth.)2014Springer International Publishing
2569Computer Network Security and Cyber Ethics, 4th ed.Joseph Migga Kizza2014McFarland
2570Innovative Approaches Towards Low Carbon Economics: Regional Development CyberneticsJiuping Xu, Liming Yao, Yi Lu (auth.)2014Springer-Verlag Berlin Heidelberg
2571Cybernics: Fusion of human, machine and information systemsYoshiyuki Sankai, Kenji Suzuki, Yasuhisa Hasegawa (eds.)2014Springer Japan
2572Computational Intelligence for Decision Support in Cyber-Physical SystemsZeashan H Khan, A. B. M. Shawkat Ali, Zahid Riaz (eds.)2014Springer-Verlag Singapur
2573Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and MalwareAditya Sood and Richard Enbody (Auth.)2014Syngress
2574Cyberpatterns: Unifying Design Patterns with Security and Attack PatternsClive Blackwell, Hong Zhu (eds.)2014Springer International Publishing
2575Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP ApproachArmando W. Colombo, Thomas Bangemann, Stamatis Karnouskos, Jerker Delsing, Petr Stluka, Robert Harrison, Francois Jammes, Jose L. Lastra (eds.)2014Springer International Publishing
2576Cybersecurity for Executives: A Practical GuideGregory J. Touhill, C. Joseph Touhill2014Wiley-AIChE
2577Cyber Threat!: How to Manage the Growing Risk of Cyber AttacksMacDonnell Ulsch2014Wiley
2578Cyber Policy in ChinaGreg Austin2014Polity
257910 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut, Daniel Bachrach2014Apress
2580Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second EditionJames E Fitzpatrick; Joseph G Morelli2014Elsevier/Mosby, CRC Press
2581Cyber crime and cyber terrorism investigator's handbookBabak Akhgar; Andrew Staniforth; Francesca Bosco2014Syngress, , Elsevier Inc
258210 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and PrivacyDaniel G. Bachrach, Eric J. Rzeszut (auth.)2014Apress
2583Cyberterrorism: Understanding, Assessment, and ResponseThomas M. Chen, Lee Jarvis, Stuart Macdonald (eds.)2014Springer-Verlag New York
2584Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and PracticeElias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos (eds.)2014Springer-Verlag New York
2585Legal Principles for Combatting CyberlaunderingDaniel Adeoyé Leslie (auth.)2014Springer International Publishing
2586Cybersecurity Systems for Human Cognition AugmentationRobinson E. Pino, Alexander Kott, Michael Shevenell (eds.)2014Springer International Publishing
2587Cybersecurity in SwitzerlandMyriam Dunn Cavelty (auth.)2014Springer International Publishing
2588Bio-inspiring Cyber Security and Cloud Services: Trends and InnovationsAboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.)2014Springer-Verlag Berlin Heidelberg
2589Transactions on Computational Science XXIII: Special Issue on CyberworldsMarina L. Gavrilova, C. J. Kenneth Tan, Xiaoyang Mao, Lichan Hong (eds.)2014Springer-Verlag Berlin Heidelberg
2590Cyber Disobedience: Re://Presenting Online AnarchyJeff Shantz, Jordon Tomblin2014Zero Books
2591Cyber and Electromagnetic Threats in Modern Relay ProtectionVladimir Gurevich2014CRC Press
2592Spam nation: the inside story of organized cybercrime—from global epidemic to your front doorBrian Krebs2014Sourcebooks
2593Markets for cybercrime tools and stolen data : hackers' bazaarLillian Ablon;Martin C Libicki;Andrea A Golay;Rand Corporation,;Acquisition and Technology Policy Center,;All authors2014RAND Corporation
2594Automation, Communication and Cybernetics in Science and Engineering 2013/2014Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.)2014Springer International Publishing
2595Cyber Defense and Situational AwarenessAlexander Kott, Cliff Wang, Robert F. Erbacher (eds.)2014Springer International Publishing
2596Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected PapersFrances Cleary, Massimo Felici (eds.)2014Springer International Publishing
2597Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected PapersPavel Gladyshev, Andrew Marrington, Ibrahim Baggili (eds.)2014Springer International Publishing
2598Machine Learning and Cybernetics: 13th International Conference, Lanzhou, China, July 13-16, 2014. ProceedingsXizhao Wang, Witold Pedrycz, Patrick Chan, Qiang He (eds.)2014Springer-Verlag Berlin Heidelberg
2599Proceedings of the 4th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2014D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.)2014Bukrek
2600Neocybernetics and NarrativeBruce Clarke2014University of Minnesota Press
2601Spam nation: the inside story of organized cybercrime—from global epidemic to your front doorBrian Krebs2014Sourcebooks
2602Spam nation: the inside story of organized cybercrime—from global epidemic to your front doorBrian Krebs2014Sourcebooks
2603Cyberbullying: Causes, Consequences, and Coping StrategiesNicole L. Weber, William V., Jr. Pelfrey2014Lfb Scholarly Pub Llc
2604Cyber AttackMargaret J. Goldstein,Martin Gitlin2014Lerner Publishing Group;Twenty-First Century Books
2605Cyber Policy in ChinaGreg Austin2014Polity
2606Labor in the Global Digital Economy: The Cybertariat Comes of AgeUrsula Huws2014Monthly Review Press
2607Managing Trust in CyberspaceSabu M. Thampi, Bharat Bhargava2014Taylor & Francis Group, LLC
2608Cyberwar, Cyberterror, Cybercrime and CyberactivismJulie E. Mehan2014IT Governance Publishing
2609Data Analysis for Network Cyber-SecurityNiall Adams, Nicholas Heard, Niall Adams, Nicholas Heard2014World Scientific Publishing Company
2610Introduction to US Cybersecurity CareersHenry Dalziel2014Syngress
2611How to Define and Build an Effective Cyber Threat Intelligence CapabilityHenry Dalziel, Eric Olson, James Carnall2014Syngress
2612Cybersecurity and Cyberwar: What Everyone Needs to Know®P.W. Singer, Allan Friedman2014Oxford University Press
2613Hate Crimes in CyberspaceDanielle Keats Citron2014Harvard University Press
2614Cyber Operations and the Use of Force in International LawMarco Roscini2014Oxford University Press
2615Cyber operations and the use of force in international lawRoscini, Marco2014Oxford University Press
2616Cybersecurity and cyberwar : what everyone needs to knowSinger, Peter Warren; Friedman, Allan2014Oxford University Press
2617Cybertheology : thinking Christianity in the era of the internetSpadaro, Antonio; Way, Maria2014Fordham University Press
2618Hate crimes in cyberspaceCitron, Danielle Keats2014Harvard University Press
2619Neocybernetics and narrativeClarke, Bruce2014Univ Of Minnesota Press
2620The beginning of heaven and Earth has no name : seven days with second-order cyberneticsHeinz von Foerster & Albert Muller & Karl H. Muller & Elinor Rooks & Michael Kasenbacher2014Fordham University Press
2621Cyber SecurityVoeller, John G.2014Wiley
2622Cybercrime and Cyber WarfareBernik, Igor2014Wiley-ISTE
2623Cyber-War: The Anatomy of the global Security ThreatJulian Richards (auth.)2014Palgrave Macmillan UK
2624Cyber Ireland: Text, Image, CultureClaire Lynch (auth.)2014Palgrave Macmillan UK
2625Body, Soul and Cyberspace in Contemporary Science Fiction Cinema: Virtual Worlds and Ethical ProblemsSylvie Magerstädt (auth.)2014Palgrave Macmillan UK
2626Cameron’s Conservatives and the Internet: Change, Culture and Cyber ToryismAnthony Ridge-Newman (auth.)2014Palgrave Macmillan UK
2627Cyber Threat!: How to Manage the Growing Risk of Cyber AttacksMacDonnell Ulsch2014Wiley
2628Cybersecurity for Executives: A Practical GuideGregory J. Touhill, C. Joseph Touhill2014Wiley
2629Cyberactivism on the Participatory WebMartha McCaughey; (ed.)2014Routledge
2630Cyber Self-Defense Expert Advice to Avoid Online Predators, Identity Theft, and CyberbullyingAlexis Moore, Laurie Edwards2014Lyons Press
2631Feminist Cyberethics in Asia: Religious Discourses on Human ConnectivityAgnes M. Brazal, Kochurani Abraham (eds.)2014Palgrave Macmillan US
2632Cyber-War: The Anatomy of the global Security ThreatJulian Richards (auth.)2014Palgrave Macmillan UK
2633Sex, Drugs and Tessellation: The truth about Virtual Reality, as revealed in the pages of CyberEdge JournalBen Delaney2014CyberEdge Information Services
2634Implementing the NIST : cybersecurity Framework2014ISACA
2635Computer Forensics: Cybercriminals, Laws, and EvidenceMarie-Helen Maras2014Jones & Bartlett Learning
2636Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front DoorBrian Krebs2014Sourcebooks
2637CANSO Cyber Security and Risk Assessment Guidecoll.2014Civil Air Navigation Services Organisation
2638Cyber-attacks: Effects on UK Companiesanon.2014CPNI, Oxford Economics
2639Helixtrolysis: Cyberology & the Joycean MachineLouis Armand2014Charles University
2640Cybersecurity Leadership: Powering the Modern OrganizationMansur Hasib2014Tomorrow’s Strategy Today, LLC
2641Cyber Disobedience: Re://Presenting Online AnarchyJeff Shantz, Jordon Tomblin2014Zero Books
264210 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacyEric J. Rzeszut & Daniel G. Bachrach2014Friends of ED/Apress
2643Cyber Crime and Cyber Terrorism Investigator's HandbookBabak Akhgar; Andrew Staniforth; Francesca Bosco2014Syngress
2644Implementing the NIST Cybersecurity FrameworkISACA2014ISACA
2645Neocybernetics and NarrativeBruce Clarke2014University of Minnesota Press
2646Labor in the Global Digital Economy: The Cybertariat Comes of AgeHuws, Ursula2014Monthly Review Press
264710 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and PrivacyEric Rzeszut; Daniel Bachrach2014Apress
2648Cyberpatterns: Unifying Design Patterns with Security and Attack PatternsBlackwell, Clive;Zhu, Hong2014Springer International Publishing
2649Cyberpatterns: Unifying Design Patterns with Security and Attack PatternsBlackwell, Clive;Zhu, Hong2014Springer International Publishing
2650Cyberterrorism: understanding, assessment, and responseChen, Thomas M.;Jarvis, Lee;Macdonald, Stuart2014Springer
2651Industrial cloud-based cyber-physical systems: the IMC-AESOP approachColombo, Armando W2014Springer
2652No Dogs in Philly: A Cyberpunk NoirFuturo, Andy2014June Day Press
2653Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and CyberbullyingAlexis Moore;Laurie J. Edwards2014Lyons Press
2654Neocybernetics and NarrativeClarke, Bruce2014University of Minnesota Press
2655Cybernetic Brain: Sketches of Another FuturePickering, Andrew2014University of Chicago Press
2656Rhetoric and Ethics in the Cybernetic Age: The Transhuman ConditionPruchnic, Jeff2014Taylor and Francis;Routledge
2657Cyber security and IT infrastructure protectionVacca, John R2014Syngress
2658Spam Nation: The Inside Story Of Organized Cybercrime—From Global Epidemic To Your Front DoorBrian Krebs2014Sourcebooks
2659Labor in the global digital economy the cybertariat comes of ageHuws, Ursula2014Monthly Review Press
2660Cyber Reconnaissance, Surveillance and DefenseRobert Shimonski2014Syngress
2661Security in Cyberspace: Targeting Nations, Infrastructures, IndividualsGiampiero Giacomello (editor)2014Bloomsbury Academic
2662Cybertheology: Thinking Christianity in the Era of the InternetAntonio Spadaro; Maria Way2014Fordham University Press
2663Cyber Crime and Cyber Terrorism Investigator's HandbookBabak Akhgar (editor), Andrew Staniforth (editor), Francesca Bosco (editor)2014Syngress
2664How to Define and Build an Effective Cyber Threat Intelligence CapabilityHenry Dalziel, Eric Olson (editor), James Carnall (editor)2014Syngress
2665Cyber BlockadesAlison Lawlor Russell2014Georgetown University Press
2666Cybercrime: Investigating High-Technology Computer CrimeRobert Moore2014Routledge
2667Extreme Mean: Ending Cyberabuse at Work, School, and HomePaula Todd2014McClelland & Stewart
2668Bullying Beyond the Schoolyard: Preventing and Responding to CyberbullyingSameer Hinduja, Justin W. Patchin2014SAGE Publications
2669Visions of War: Picturing Warfare from the Stone Age to the Cyber AgeDavid D. Perlmutter2014St. Martin's Publishing Group
2670Nation as Network: Diaspora, Cyberspace, and CitizenshipVictoria Bernal2014University of Chicago Press
2671Cybercrime and Cyber WarfareIgor Bernik2014Wiley-ISTE
2672Security in Cyberspace: Targeting Nations, Infrastructures, IndividualsGiampiero Giacomello (editor)2014Bloomsbury Academic
2673Computer Forensics: Cybercriminals, Laws, and EvidenceMarie-Helen Maras2014Jones & Bartlett Learning
2674Computer Forensics: Cybercriminals, Laws, and EvidenceMarie-Helen Maras2014Jones & Bartlett Learning
2675The Emergence of EU Criminal Law: Cybercrime and the Regulation of the Information SocietySarah Summers; Christian Schwarzenegger; Gian Ege; Finlay Young2014Hart Publishing
2676Helixtrolysis: Cyberology & the Joycean "Tyrondynamon Machine"Louis Armand2014Litteraria Pragensia
2677Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial ComplexBill Blunden; Violet Cheung2014Trine Day
2678Cyber Security and Resiliency Policy FrameworkA. Vaseashta; P. Susmann; E. Braman2014IOS Press, Incorporated
2679Nation as Network: Diaspora, Cyberspace, and CitizenshipVictoria Bernal2014University of Chicago Press
2680The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special ForcesChristopher Paul; III Isaac R. Porche; Elliot Axelband2014RAND Corporation, The
2681At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and IssuesNational Research Council; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work; Herbert S. Lin; Thomas Berson; David Clark2014National Academies Press
2682Hate Crimes in CyberspaceDanielle Keats Citron2014Harvard University Press
2683Cybertheology: Thinking Christianity in the Era of the InternetAntonio Spadaro; Maria Way2014Fordham University Press
2684Cybersecurity and CyberwarP.W. Singer2014
2685Cyber attacks: protecting national infrastructureVacca, John R.;Amoroso, Edward G2013Elsevier Science;Butterworth-Heinemann
2686Dr. Ecco's cyberpuzzles: 36 puzzles for hackers and other mathematical detectivesShasha, Dennis Elliott2013W. W. Norton & Company
2687Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
2688Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
2689Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp and Raj Samani (Auth.)2013Syngress
2690Cyber Security: Deterrence and IT Protection for Critical InfrastructuresMaurizio Martellini2013Springer
2691Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
2692Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
2693Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2694Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2695What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco2013CRC Press
2696Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology PoliciesRichard Phillips, Rayton R. Sianjina2013Routledge
2697Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime SuspectsBrett Shavers2013Syngress
2698Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime SuspectsBrett Shavers2013Syngress
2699Black code: Inside the battle for cyberspaceRonald J. Deibert2013Signal
2700Control of Cyber-Physical Systems: Workshop held at Johns Hopkins University, March 2013Matthew Hartman, Anantharaman Subbaraman, Andrew R. Teel (auth.), Danielle C. Tarraf (eds.)2013Springer International Publishing
2701Proceedings of the 2012 International Conference on Cybernetics and InformaticsQingyun Luo, Jinguo Zhao (auth.), Shaobo Zhong (eds.)2013Springer-Verlag New York
2702Cybernetic Approach to Project ManagementBogdan Lent (auth.)2013Springer-Verlag Berlin Heidelberg
2703Counterterrorism and cybersecurity: total information awarenessNewton Lee (auth.)2013Springer New York
2704Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. ProceedingsKun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.)2013Springer-Verlag Berlin Heidelberg
2705Visual Mathematics and CyberlearningKeith Jones, Eirini Geraniou, Thanassis Tiropanis (auth.), Dragana Martinovic, Viktor Freiman, Zekeriya Karadag (eds.)2013Springer Netherlands
2706Automation, Communication and Cybernetics in Science and Engineering 2011/2012Ursula Bach, Ingo Leisten (auth.), Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.)2013Springer-Verlag Berlin Heidelberg
2707Introduction to cyber-warfare: a multidisciplinary approachPaulo Shakarian, Jana Shakarian, Andrew Ruef2013Elsevier / Syngress
2708Introduction to cyber-warfare: a multidisciplinary approachPaulo Shakarian, Jana Shakarian, Andrew Ruef2013Elsevier / Syngress
2709Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected PapersKeyun Ruan, Joe Carthy (auth.), Marcus Rogers, Kathryn C. Seigfried-Spellar (eds.)2013Springer-Verlag Berlin Heidelberg
2710Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
2711Cyberpunk Women, Feminism and Science Fiction: A Critical StudyCarlen Lavigne2013McFarland
2712Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
2713Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp and Raj Samani (Auth.)2013Syngress
2714Black Code: Inside the Battle for CyberspaceRonald J. Deibert2013Signal
2715Cyber Security: Deterrence and IT Protection for Critical InfrastructuresMaurizio Martellini2013Springer
2716Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
2717Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
2718Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The KeyboardBrett Shavers2013Syngress
2719Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsThomas J. Mowbray2013Wiley
2720Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The KeyboardBrett Shavers2013Syngress
2721Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, ProceedingsJan-Min Chen (auth.), Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan (eds.)2013Springer International Publishing
2722Transactions on Computational Science XVIII: Special Issue on CyberworldsEvangelos Zotos, Rainer Herpers (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Arjan Kuijper (eds.)2013Springer-Verlag Berlin Heidelberg
2723Investigating Internet Crimes: An Introduction to Solving Crimes in CyberspaceTodd Shipley, Art Bowker, Nick Selby2013Syngress
2724Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.)2013Bukrek
2725Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee (auth.)2013Springer New York
2726Culture contact in Evenki land : a cybernetic anthropology of the Baikal Regionby Tatiana Safonova and Istva´n Sa´ntha.2013Brill
2727Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsThomas J. Mowbray2013Wiley
2728Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsThomas J. Mowbray2013Wiley
2729Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2730Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2731Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security PractitionersJason Andress, Steve Winterfeld2013Syngress
2732Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security PractitionersJason Andress, Steve Winterfeld2013Syngress
2733Investigating Internet Crimes: An Introduction to Solving Crimes in CyberspaceTodd Shipley, Art Bowker, Nick Selby2013Syngress
2734Investigating Internet Crimes: An Introduction to Solving Crimes in CyberspaceTodd Shipley, Art Bowker, Nick Selby2013Syngress
2735What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco2013CRC Press
2736Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the WorldPaul Rosenzweig2013Praeger
2737Cybernetic approach to project managementBogdan Lent (auth.)2013Springer-Verlag Berlin Heidelberg
2738Conflict and Cooperation in Cyberspace: The Challenge to National SecurityPanayotis A Yannakogeorgos, Adam B Lowther2013CRC Press
2739Cyber Power: Crime, Conflict and Security in CyberspaceSolange Ghernaouti-Helie2013EPFL Press,CRC Press
2740Cyber-Physical Systems: Integrated Computing and Engineering DesignFei Hu2013CRC Press
2741Managing Trust in CyberspaceSabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey2013Chapman and Hall/CRC
2742Cybersexism: Sex, Gender and Power on the InternetLaurie Penny2013Bloomsbury Publishing
2743Cyber War Will Not Take PlaceThomas Rid2013Oxford University Press
2744Cyberpunk: Stories of Hardware, Software, Wetware, Evolution, and RevolutionPat Cadigan, Benjamin Parzybok, William Gibson, Jonathan Lethem, Greg Bear, Mark Teppo, Cory Doctorow, Cat Rambo, Kim Stanley Robinson, Bruce Sterling, Victoria Blake2013Underland Press
2745Words Wound. Delete Cyberbullying and Make Kindness Go ViralJustin Patchin, Ph.D.,Sameer Hinduja, Ph.D.2013Free Spirit Publishing
2746The ABA Cybersecurity Handbook. A Resource for Attorneys, Law Firms, and Business ProfessionalsJill D. Rhodes,Vincent I. Polley2013National Book Network (NBN);American Bar Association
2747Bullying Workbook for Teens. Activities to Help You Deal with Social Aggression and CyberbullyingJulia V. Taylor,Raychelle Cassada Lohmann,Haley Kilpatrick2013New Harbinger Publications;Instant Help
2748Access Controlled. The Shaping of Power, Rights, and Rule in CyberspaceRonald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 18.01.2013Street date: 28.02.20142013MIT Press
2749How Serious a Problem Is Cyberbullying?Patricia D. Netzley2013ReferencePoint Press
2750Rhetoric and Ethics in the Cybernetic Age: The Transhuman ConditionJeff Pruchnic2013Routledge
2751Rhetoric and Ethics in the Cybernetic Age: The Transhuman ConditionJeff Pruchnic2013Routledge
2752Transforming Cybersecurity: Using COBIT 5Isaca2013Isaca
2753Digital whoness : identity, privacy and freedom in the cyberworldCapurro, Rafael; Eldred, Michael; Nagel, Daniel2013Ontos Verlag
2754Computer Forensics and Cyber Crime An Introduction, 3rd EditionMarjie T. Britz2013PEARSON
2755Introduction to computer networks and cybersecurityIrwin, J. David; Wu, Chwan-Hwa2013CRC Press
2756Cyber War Will Not Take PlaceThomas Rid2013Oxford University Press
2757Annual review of cybertherapy and telemedicine. 2013 : positive technology and health engagement for health living and active ageingRiva, Giuseppe; Wiederhold, B. K.2013IOS Press
2758Blackhatonomics : an inside look at the economics of cybercrimeWill Gragido & Johnl Pirc & Nick Selby & Daniel Molina2013Elsevier Inc.;Syngress
2759Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology PoliciesRichard Phillips, Rayton R. Sianjina2013Routledge
2760Cybercrime and Cybersecurity in the Global SouthNir Kshetri (auth.)2013Palgrave Macmillan UK
2761Cybersecurity Enhancement Act of 2013 : report (to accompany H.R. 756) (including cost estimate of the Congressional Budget Office)2013[U.S. G.P.O.]
2762Introduction to cyber-warfare: a multidisciplinary approachPaulo Shakarian, Jana Shakarian, Andrew Ruef2013Elsevier / Syngress
2763Introduction to cyber-warfare: a multidisciplinary approachPaulo Shakarian, Jana Shakarian, Andrew Ruef2013Elsevier / Syngress
2764Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected PapersKeyun Ruan, Joe Carthy (auth.), Marcus Rogers, Kathryn C. Seigfried-Spellar (eds.)2013Springer-Verlag Berlin Heidelberg
2765Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
2766Cyberpunk Women, Feminism and Science Fiction: A Critical StudyCarlen Lavigne2013McFarland
2767Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
2768Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp and Raj Samani (Auth.)2013Syngress
2769Black Code: Inside the Battle for CyberspaceRonald J. Deibert2013Signal
2770Cyber Security: Deterrence and IT Protection for Critical InfrastructuresMaurizio Martellini2013Springer
2771Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
2772Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power InfrastructureEric D. Knapp, Raj Samani2013Syngress
2773Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The KeyboardBrett Shavers2013Syngress
2774Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsThomas J. Mowbray2013Wiley
2775Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The KeyboardBrett Shavers2013Syngress
2776Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, ProceedingsJan-Min Chen (auth.), Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan (eds.)2013Springer International Publishing
2777Transactions on Computational Science XVIII: Special Issue on CyberworldsEvangelos Zotos, Rainer Herpers (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Arjan Kuijper (eds.)2013Springer-Verlag Berlin Heidelberg
2778Investigating Internet Crimes: An Introduction to Solving Crimes in CyberspaceTodd Shipley, Art Bowker, Nick Selby2013Syngress
2779Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.)2013Bukrek
2780Counterterrorism and Cybersecurity: Total Information AwarenessNewton Lee (auth.)2013Springer New York
2781Culture contact in Evenki land : a cybernetic anthropology of the Baikal Regionby Tatiana Safonova and Istva´n Sa´ntha.2013Brill
2782Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsThomas J. Mowbray2013Wiley
2783Cybersecurity: Managing Systems, Conducting Testing, and Investigating IntrusionsThomas J. Mowbray2013Wiley
2784Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2785Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2786Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security PractitionersJason Andress, Steve Winterfeld2013Syngress
2787Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security PractitionersJason Andress, Steve Winterfeld2013Syngress
2788Investigating Internet Crimes: An Introduction to Solving Crimes in CyberspaceTodd Shipley, Art Bowker, Nick Selby2013Syngress
2789Investigating Internet Crimes: An Introduction to Solving Crimes in CyberspaceTodd Shipley, Art Bowker, Nick Selby2013Syngress
2790What Every Engineer Should Know About Cyber Security and Digital ForensicsJoanna F. DeFranco2013CRC Press
2791Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the WorldPaul Rosenzweig2013Praeger
2792Cybernetic approach to project managementBogdan Lent (auth.)2013Springer-Verlag Berlin Heidelberg
2793Conflict and Cooperation in Cyberspace: The Challenge to National SecurityPanayotis A Yannakogeorgos, Adam B Lowther2013CRC Press
2794Cyber Power: Crime, Conflict and Security in CyberspaceSolange Ghernaouti-Helie2013EPFL Press,CRC Press
2795Cyber-Physical Systems: Integrated Computing and Engineering DesignFei Hu2013CRC Press
2796Managing Trust in CyberspaceSabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey2013Chapman and Hall/CRC
2797Cybersexism: Sex, Gender and Power on the InternetLaurie Penny2013Bloomsbury Publishing
2798Cyber War Will Not Take PlaceThomas Rid2013Oxford University Press
2799Cyberpunk: Stories of Hardware, Software, Wetware, Evolution, and RevolutionPat Cadigan, Benjamin Parzybok, William Gibson, Jonathan Lethem, Greg Bear, Mark Teppo, Cory Doctorow, Cat Rambo, Kim Stanley Robinson, Bruce Sterling, Victoria Blake2013Underland Press
2800Words Wound. Delete Cyberbullying and Make Kindness Go ViralJustin Patchin, Ph.D.,Sameer Hinduja, Ph.D.2013Free Spirit Publishing
2801The ABA Cybersecurity Handbook. A Resource for Attorneys, Law Firms, and Business ProfessionalsJill D. Rhodes,Vincent I. Polley2013National Book Network (NBN);American Bar Association
2802Bullying Workbook for Teens. Activities to Help You Deal with Social Aggression and CyberbullyingJulia V. Taylor,Raychelle Cassada Lohmann,Haley Kilpatrick2013New Harbinger Publications;Instant Help
2803Access Controlled. The Shaping of Power, Rights, and Rule in CyberspaceRonald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 18.01.2013Street date: 28.02.20142013MIT Press
2804How Serious a Problem Is Cyberbullying?Patricia D. Netzley2013ReferencePoint Press
2805Rhetoric and Ethics in the Cybernetic Age: The Transhuman ConditionJeff Pruchnic2013Routledge
2806Rhetoric and Ethics in the Cybernetic Age: The Transhuman ConditionJeff Pruchnic2013Routledge
2807Transforming Cybersecurity: Using COBIT 5Isaca2013Isaca
2808Digital whoness : identity, privacy and freedom in the cyberworldCapurro, Rafael; Eldred, Michael; Nagel, Daniel2013Ontos Verlag
2809Computer Forensics and Cyber Crime An Introduction, 3rd EditionMarjie T. Britz2013PEARSON
2810Introduction to computer networks and cybersecurityIrwin, J. David; Wu, Chwan-Hwa2013CRC Press
2811Cyber War Will Not Take PlaceThomas Rid2013Oxford University Press
2812Annual review of cybertherapy and telemedicine. 2013 : positive technology and health engagement for health living and active ageingRiva, Giuseppe; Wiederhold, B. K.2013IOS Press
2813Blackhatonomics : an inside look at the economics of cybercrimeWill Gragido & Johnl Pirc & Nick Selby & Daniel Molina2013Elsevier Inc.;Syngress
2814Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology PoliciesRichard Phillips, Rayton R. Sianjina2013Routledge
2815Cybercrime and Cybersecurity in the Global SouthNir Kshetri (auth.)2013Palgrave Macmillan UK
2816Cybersecurity Enhancement Act of 2013 : report (to accompany H.R. 756) (including cost estimate of the Congressional Budget Office)2013[U.S. G.P.O.]
2817Cyber Security and IT Infrastructure ProtectionJohn R. Vacca2013Syngress
2818Information Spaces The Architecture of CyberspaceRobert M. Colomb2013Springer
2819Tallinn Manual on the International Law Applicable to Cyber WarfareMichael N. Schmitt2013Cambridge University Press
2820Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE. Developing Cyber-Physical SystemsBran Selic, Sebastien Gerard2013Morgan Kaufmann
2821Cybersecurity in Our Digital LivesMowbray, Thomas J; LeClair, Jane2013John Wiley & Sons, Inc.
2822Technobiophilia: Nature and CyberspaceSue Thomas2013Bloomsbury Academic
2823CybersecurityMowbray, Thomas J.2013Wiley
2824Cyber WarfareAndress, Jason;Winterfeld, Steve2013Syngress
2825Holistic darwinism: synergy, cybernetics, and the bioeconomics of evolutionCorning, Peter A2013University of Chicago Press
2826Cyberpunk: stories of hardware, software, wetware, evolution and revolutionBlake, Victoria2013Underland Press
2827Cyberpunk: Stories of Hardware, Software, Wetware, Evolution, and RevolutionBlake,Victoria2013Resurrection House
2828Black code: inside the battle for cyberspaceDeibert, Ronald, J2013McClelland & Stewart
2829Digital Whoness: Identity, Privacy And Freedom In The CyberworldRafael Capurro, Michael Eldred, Daniel Nagel2013De Gruyter
2830Glass houses: privacy, secrecy, and cyber insecurity in a transparent worldBrenner, Joel2013Penguin Group US
2831Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected PapersFrancesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.)2013Springer-Verlag Berlin Heidelberg
2832Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. ProceedingsKun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.)2013Springer-Verlag Berlin Heidelberg
2833Cyber Security: Deterrence and IT Protection for Critical InfrastructuresSandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.)2013Springer International Publishing
2834The Information Society Cyber Dreams and Digital NightmaresHassan, Robert2013John Wiley & Sons
2835The Information Society: Cyber Dreams and Digital NightmaresHassan, Robert2013Wiley
2836Counterterrorism and cybersecurity: total information awarenessLee, Newton2013Springer
2837The bullying workbook for teens: activities to help you deal with social aggression and cyberbullyingLohmann, Raychelle Cassada;Taylor, Julia V2013New Harbinger Publications;Instant Help Books
2838Technobiophilia: Nature And CyberspaceSue Thomas2013Bloomsbury Academic
2839Cyber WarfareRosenzweig, Paul2013ABC-CLIO, LLC
2840Computer Forensics and Cyber Crime: An IntroductionBritz, Marjie2013Pearson
2841Introduction to Cyber-Warfare: A Multidisciplinary Approach [Lingua inglese]Dr. Paulo Shakarian2013Syngress
2842Love and Empire: Cybermarriage and Citizenship Across the AmericasFelicity Amaya Schaeffer2013New York University Press
2843Zero Day: The Threat In CyberspaceRobert O'Harrow2013Diversion Books
2844No More Victims: Protecting Those with Autism from Cyber Bullying, Internet Predators & ...Jed Baker2013BookBaby
2845Tallinn Manual on the International Law Applicable to Cyber WarfareMichael N. Schmitt2013Cambridge University Press
2846Technobiophilia: Nature and cyberspaceSue Thomas2013Bloomsbury Academic
2847Cyber Hacking: Wars in Virtual SpaceScientific American2013Scientific American
2848Advances in Cyber Security : Technology, Operations, and ExperiencesD. Frank Hsu; Dorothy Marinucci2013Fordham University Press
2849CybercrimeNoah Berlatsky2013Greenhaven Publishing LLC
2850The Politics of the Internet: Political Claims-making in Cyberspace and Its Effect on Modern Political ActivismR.J. Maratea2013Lexington Books
2851The Beginning of Heaven and Earth Has No Name: Seven Days with Second-Order CyberneticsHeinz von Foerster (editor); Albert Müller (editor); Karl H. Müller (editor); Elinor Rooks (editor); Michael Kasenbacher (editor)2013Fordham University Press
2852Cyberprotest: Environmental activism onlineJenny Pickerill2013Manchester University Press
2853Cyber Law & Cyber Crimes: Information Technology Act, 2000 with New IT Rules: e-Contracts, Software Piracy, Cloud Computing, IPR in Cyber World, Electronic Evidence, Forensics & Investigation, Reasonable Security Practices & Case LawsPrashant Mali2013Snow White
2854Cyber security policy guidebookJennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss2012Wiley
2855FISMA and the Risk Management Framework. The New Practice of Federal Cyber SecurityStephen D. Gantz and Daniel R. Philpott (Eds.)2012Syngress
2856FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2857FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2858FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2859Optimal Mobile Sensing and Actuation Policies in Cyber-physical SystemsChristophe Tricaud, YangQuan Chen (auth.)2012Springer-Verlag London
2860We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgencyParmy Olson2012Little, Brown and Company
2861We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber InsurgencyParmy Olson2012Little, Brown and Company
2862Network Forensics: Tracking Hackers through CyberspaceSherri Davidoff, Jonathan Ham2012Prentice Hall
2863Network Forensics: Tracking Hackers through CyberspaceSherri Davidoff, Jonathan Ham2012Prentice Hall
2864Cyber crime and the victimization of women : laws, rights and regulationsDebarati Halder; K Jaishankar2012Information Science Reference
2865Cyberbullying prevention and response : expert perspectivesJustin W Patchin; Sameer Hinduja2012Routledge
2866Cyberpolitics in International RelationsNazli Choucri2012The MIT Press
2867Blackhatonomics: An Inside Look at the Economics of CybercrimeWill Gragido, Daniel Molina, John Pirc, Nick Selby2012Syngress
2868Blackhatonomics: An Inside Look at the Economics of CybercrimeWill Gragido, Daniel Molina, John Pirc, Nick Selby2012Syngress
2869Cyber security policy guidebookJennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss2012Wiley
2870Optimal Mobile Sensing and Actuation Policies in Cyber-physical SystemsChristophe Tricaud, YangQuan Chen (auth.)2012Springer-Verlag London
2871Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia: Volume 1: Intelligent Control and Network CommunicationShuqin Zhao, Yucui Guo, Shang Lv (auth.), Liangzhong Jiang (eds.)2012Springer-Verlag Berlin Heidelberg
2872Proceedings of the 2011, International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19–20, 2011, Melbourne, Australia: Volume 2: Information Systems and Computer EngineeringZhengwei Zhu, Zongwen Chen (auth.), Liangzhong Jiang (eds.)2012Springer-Verlag Berlin Heidelberg
2873Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19–20, 2011, Melbourne, Australia: Volume 3: Computer Networks and Electronic EngineeringLi Siming, Wang Huaiqing (auth.), Liangzhong Jiang (eds.)2012Springer-Verlag Berlin Heidelberg
2874Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011Jing-bo He, Sheng-liang Hu, Zhong Liu (auth.), Xingui He, Ertian Hua, Yun Lin, Xiaozhu Liu (eds.)2012Springer Netherlands
2875Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected PapersCynthia A. Murphy (auth.), Pavel Gladyshev, Marcus K. Rogers (eds.)2012Springer-Verlag Berlin Heidelberg
2876Cyber ConflictDaniel Ventre (ed.)2012Wiley-ISTE
2877Cyberbullying in the global playground: research from international perspectivesQing Li, Donna Cross, Peter K. Smith (editors)2012Wiley-Blackwell
2878The Changing Face of Empire: Special Ops, Drones, Spies, Proxy Fighters, Secret Bases, and CyberwarfareNick Turse2012Haymarket Books
2879We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgencyParmy Olson2012Little, Brown and Company
2880The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld and Jason Andress (Eds.)2012Syngress
2881Handbook on Securing Cyber-Physical Critical InfrastructureSajal K. Das, Krishna Kant and Nan Zhang (Auth.)2012Morgan Kaufmann
2882FISMA and the Risk Management Framework. The New Practice of Federal Cyber SecurityStephen D. Gantz and Daniel R. Philpott (Eds.)2012Syngress
2883Reverse Deception: Organized Cyber Threat Counter-ExploitationSean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones2012McGraw-Hill Osborne Media
2884Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2885Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2886Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. ProceedingsFengling Han, Ron van Schyndel (auth.), Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (eds.)2012Springer-Verlag Berlin Heidelberg
2887The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld, Jason Andress2012Syngress
2888Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2889Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2890FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2891Proceedings of the 2nd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2012I.O. Lytvynenko (ed.), D.O. Terletskyi (ed.)2012Bukrek
2892The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld, Jason Andress2012Syngress
2893Cyberbullying in the Global Playground: Research from International PerspectivesQing Li, Donna Cross, Peter K. Smith2012Wiley-Blackwell
2894FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2895FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2896The Anti-Social Network: Cyberstalking Victimization Among College StudentsBradford W. Reyns2012Lfb Scholarly Pub Llc
2897We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgencyParmy Olson2012Little, Brown and Company
2898Cyberfactories: How News Agencies Produce NewsBarbara Czarniawska2012Edward Elgar Pub
2899Discoursal Construction of Academic Identity in Cyberspace: The Example of an E-SeminarMalgorzata Sokól2012Cambridge Scholars Publishing
2900Feminist Cyberspaces: Pedagogies in TransitionSharon Collingwood, Alvina E. Quintana, Caroline J. Smith (eds.)2012Cambridge Scholars Publishing
2901Access Contested. Security, Identity, and Resistance in Asian CyberspaceRonald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 05.06.2012Street date: 05.06.20122012MIT Press
2902CyberbullyingPeggy J. Parks2012ReferencePoint Press
2903CyberwarfarePeggy J. Parks2012ReferencePoint Press
2904Cyberspaces and Global AffairsPerry, Jake; Costigan, Sean S, Professor2012Ashgate Publishing Ltd
2905Cyberspace and CybersecurityKostopoulos, George2012CRC Press
2906Cyber Challenges and National Security: Threats, Opportunities, and Power in a Virtual WorldDerek S. Reveron (ed.)2012Georgetown University Press
2907Between page and screen : remaking literature through cinema and cyberspaceBrillenburg Wurth, Kiene2012Fordham University Press
2908Cybertext poetics : the critical landscape of new media literary theoryEskelinen, Markku2012Bloomsbury Academic;Continuum
2909The Changing Face of Empire: Special Ops, Drones, Spies, Proxy Fighters, Secret Bases, and CyberwarfareNick Turse2012Haymarket Books
2910We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgencyParmy Olson2012Little, Brown and Company
2911The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld and Jason Andress (Eds.)2012Syngress
2912Handbook on Securing Cyber-Physical Critical InfrastructureSajal K. Das, Krishna Kant and Nan Zhang (Auth.)2012Morgan Kaufmann
2913FISMA and the Risk Management Framework. The New Practice of Federal Cyber SecurityStephen D. Gantz and Daniel R. Philpott (Eds.)2012Syngress
2914Reverse Deception: Organized Cyber Threat Counter-ExploitationSean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones2012McGraw-Hill Osborne Media
2915Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2916Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2917Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. ProceedingsFengling Han, Ron van Schyndel (auth.), Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (eds.)2012Springer-Verlag Berlin Heidelberg
2918The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld, Jason Andress2012Syngress
2919Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2920Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the KeyboardBrett Shavers2012Syngress
2921FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2922Proceedings of the 2nd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2012I.O. Lytvynenko (ed.), D.O. Terletskyi (ed.)2012Bukrek
2923The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld, Jason Andress2012Syngress
2924Cyberbullying in the Global Playground: Research from International PerspectivesQing Li, Donna Cross, Peter K. Smith2012Wiley-Blackwell
2925FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2926FISMA and the Risk Management Framework: The New Practice of Federal Cyber SecurityStephen D. Gantz, Daniel R. Philpott2012Syngress
2927The Anti-Social Network: Cyberstalking Victimization Among College StudentsBradford W. Reyns2012Lfb Scholarly Pub Llc
2928We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgencyParmy Olson2012Little, Brown and Company
2929Cyberfactories: How News Agencies Produce NewsBarbara Czarniawska2012Edward Elgar Pub
2930Discoursal Construction of Academic Identity in Cyberspace: The Example of an E-SeminarMalgorzata Sokól2012Cambridge Scholars Publishing
2931Feminist Cyberspaces: Pedagogies in TransitionSharon Collingwood, Alvina E. Quintana, Caroline J. Smith (eds.)2012Cambridge Scholars Publishing
2932Access Contested. Security, Identity, and Resistance in Asian CyberspaceRonald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 05.06.2012Street date: 05.06.20122012MIT Press
2933CyberbullyingPeggy J. Parks2012ReferencePoint Press
2934CyberwarfarePeggy J. Parks2012ReferencePoint Press
2935Cyberspaces and Global AffairsPerry, Jake; Costigan, Sean S, Professor2012Ashgate Publishing Ltd
2936Cyberspace and CybersecurityKostopoulos, George2012CRC Press
2937Cyber Challenges and National Security: Threats, Opportunities, and Power in a Virtual WorldDerek S. Reveron (ed.)2012Georgetown University Press
2938Between page and screen : remaking literature through cinema and cyberspaceBrillenburg Wurth, Kiene2012Fordham University Press
2939Cybertext poetics : the critical landscape of new media literary theoryEskelinen, Markku2012Bloomsbury Academic;Continuum
2940Cyber Security Policy GuidebookJennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss2012Wiley
2941Reverse Deception Organized Cyber Threat Counter-ExploitationSean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones2012McGraw-Hill Education
2942Cyberspace and CybersecurityGeorge Kostopoulos2012Auerbach Publications
2943Frontiers of CyberspaceDaniel Riha2012Brill/Rodopi
2944Reverse Deception: Organized Cyber Threat Counter-ExploitationSean Bodmer & Dr. Max Kilger & Gregory Carpenter & Jade Jones2012McGraw-Hill Publishing
2945Network Forensics: Tracking Hackers through CyberspaceSherri Davidoff & Jonathan Ham2012Prentice Hall
2946CyberlawBrian Craig2012Pearson Education (US)
294721st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectorsHagestad, William T2012IT Governance Publishing
2948Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimesAlbert J. Marcella, Jr.;Frederic Guillossou2012Wiley
2949Hacked: the inside story of America's struggle to secure cyberspaceCharlie Mitchell2012Rowman & Littlefield Publishers
2950Reverse Deception: Organized Cyber Threat Counter-ExploitationBodmer, Sean;Carpenter, Gregory;Jones, Jade;Kilger, Max2012McGraw-Hill Education
2951Reverse Deception: Organized Cyber Threat Counter-ExploitationBodmer, Sean;Carpenter, Gregory;Jones, Jade;Kilger, Max2012McGraw-Hill Companies,Inc.
2952Reverse Deception: Organized Cyber Threat Counter-ExploitationBodmer, Sean;Carpenter, Gregory;Jones, Jade;Kilger, Max2012McGraw-Hill
2953Cyberpolitics in international relationsChoucri, Nazli2012MIT Press
2954We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber InsurgencyOlson, Parmy2012Little, Brown & Company
2955We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber InsurgencyOlson, Parmy2012Little, Brown and Company
2956Cyberbullying bullying in the digital ageRobin M. Kowalski;Susan P. Limber;Patricia W. Agatston2012Wiley-Blackwell
2957Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security ProfessionalsY. Anto2012LAP LAMBERT Academic Publishing
2958The changing face of empire: special ops, drones, spies, proxy fighters, secret bases, and cyberwarfareTurse, Nick2012Dispatch Books, Haymarket
2959The Changing Face of Empire: Special Ops, Drones, Spies, Proxy Fighters, Secret Bases, and CyberwarfareTurse, Nick2012Dispatch Books, Haymarket
2960Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual WorldReveron, Derek S(Editor)2012Georgetown University Press
2961Cyber-Physical Systems: Driving Force for Innovations in Mobility, Health, Energy and ProductionAcatechEditor2012Springer
2962The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld2012Syngress
2963The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and PracticeSteve Winterfeld, Jason Andress2012Syngress
2964Cyberculture and the Subaltern: Weavings of the Virtual and RealRadhika Gajjala (editor)2012Lexington Books
2965Cyber Forensics: From Data to Digital EvidenceAlbert J. Marcella Jr., Frederic Guillossou2012Wiley
2966The Dark Sides of the Internet: On Cyber Threats and Information WarfareRoland Heickerö2012Peter Lang GmbH, Internationaler Verlag der Wissenschaften
2967Cyber Security Policy GuidebookJennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus H. Sachs; Jeffrey Schmidt2012John Wiley & Sons
2968CyberbullyingTamara L. Roleff2012Greenhaven Publishing LLC
2969Issues in Cyberspace: From Privacy to PiracyBritannica Educational Publishing2012Britannica Educational Publishing
2970Crisis and Escalation in CyberspaceMartin C. Libicki2012RAND Corporation
2971Is There a Home in Cyberspace?: The Internet in Migrants' Everyday Life and the Emergence of Global CommunitiesHeike Mónika Greschke2012Routledge
2972Cybertext Poetics: The Critical Landscape of New Media Literary TheoryMarkku Eskelinen2012Continuum
2973Digital Whoness: Identity, Privacy and Freedom in the CyberworldRafael Capurro; Michael Eldred; Daniel Nagel2012De Gruyter
2974Cybercrime and the Law : Challenges, Issues, and OutcomesSusan W. Brenner2012Northeastern University Press
2975Misbehavior in Cyber Places : The Regulation of Online Conduct in Virtual Communities on the InternetJanet Sternberg2012UPA
2976Policing Cyber Hate, Cyber Threats and Cyber TerrorismBrian Blakemore; Imran Awan2012Taylor & Francis Group
2977Principles of Cyberbullying Research : Definitions, Measures, and MethodologySheri Bauman; Donna Cross; Jenny Walker2012Taylor & Francis Group
2978Love and Empire: Cybermarriage and Citizenship across the AmericasFelicity Amaya Schaeffer2012New York University Press
2979Storming the Reality Studio: A Casebook of Cyberpunk & Postmodern Science FictionLarry McCaffery (editor)2012Duke University Press
2980Annual Review of Cybertherapy and Telemedicine 2012: Advanced Technologies in the Behavioral, Social and NeurosciencesBrenda K. Wiederhold, Giuseppe Riva2012IOS Press
2981Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and ProsecutorsBrittson, Richard; O'Shea, Kevin; Reyes, Anthony; Steele, James2011Syngress Publishing; Elsevier Science
2982Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard2011Auerbach Publications
2983Cyber Security Essentials Rick Howard2011CRC Press
2984Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Junaid Ahmed Zubairi, Athar Mahboob2011IGI Global snippet
2985A System-Aware Cyber Security architectureRick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 229042011
2986Kingpin: How one hacker took over the billion-dollar cybercrime undergroundKevin Poulsen2011Crown
2987Cybercrimes: A Multidisciplinary AnalysisElliot Turrini, Sumit Ghosh (auth.), Sumit Ghosh, Elliot Turrini (eds.)2011Springer-Verlag Berlin Heidelberg
2988Embedded System Design: Embedded Systems Foundations of Cyber-physical SystemsPeter Marwedel (auth.)2011Springer Netherlands
2989Australia and Cyber-warfare (Canberra Papers on Strategy and Defence No. 168)Gary Waters, Desmond Ball & Ian Dudgeon2011
2990Introduction to Embedded Systems - A Cyber-Physical Systems ApproachE. A. Lee and S. A. Seshia2011
2991Cybercrimes: A multidisciplinary analysisElliot Turrini, Sumit Ghosh (auth.), Sumit Ghosh, Elliot Turrini (eds.)2011Springer-Verlag Berlin Heidelberg
2992Kingpin: How one hacker took over the billion-dollar cybercrime undergroundKevin Poulsen2011Crown
2993Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected PapersAli Alkaabi, George Mohay, Adrian McCullagh (auth.), Ibrahim Baggili (eds.)2011Springer-Verlag Berlin Heidelberg
2994Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard2011Auerbach Publications
2995The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber CriminalsSteve Schroeder2011Course Technology PTR
2996A Cybernetic View of Biological Growth: The Maia HypothesisTony Stebbing2011Cambridge University Press
2997Kingpin: How one hacker took over the billion-dollar cybercrime undergroundKevin Poulsen2011Crown
2998Data Mining and Machine Learning in CybersecuritySumeet Dua, Xian Du2011CRC Press
2999Cyber Warfare: Techniques, Tactics and Tools for Security PractitionersJason Andress, Steve Winterfeld2011Syngress
3000Cyber Infrastructure ProtectionTarek N. Saadawi, Louis H. Jordan Jr. (Editors)2011Strategic Studies Institute (U.S. Army War College)
3001Data Mining and Machine Learning in CybersecuritySumeet Dua, Xian Du2011CRC Press
3002Inside cyber warfare: mapping the cyber underworldJeffrey Carr2011O'Reilly Media
3003Inside cyber warfare: mapping the cyber underworldJeffrey Carr2011O'Reilly Media
3004Cyberpragmatics: Internet-Mediated Communication in ContextFrancisco Yus2011John Benjamins
3005DarkMarket: how hackers became the new mafia [cyberthieves, cybercops and you]Misha Glenny2011Knopf
3006Transforming Combustion Research through Cyberinfrastructure Committee on Building Cyberinfrastructure for Combustion Research, National Research Council2011National Academies Press
3007Doctor Who and the Cybermen Gerry Davis2011BBC Books
3008Cyber Security Essentials Rick Howard2011CRC Press
3009Cyber Criminology: Exploring Internet Crimes and Criminal Behavior K. Jaishankar2011CRC Press
3010Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Junaid Ahmed Zubairi, Athar Mahboob2011IGI Global snippet
3011Ahead of Change: How Crowd Psychology and Cybernetics Transform the Way We Govern Constantin Malik (editor)2011Campus Verlag
3012Cyberbullying Prevention and Response: Expert Perspectives Justin W. Patchin, Sameer Hinduja2011Routledge
3013Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats Pratyusa K. Manadhata, Jeannette M. Wing (auth.), Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang (eds.)2011Springer-Verlag New York
3014Creating Second Lives: Community, Identity and Spatiality as Constructions of the Virtual (Routledge Studies in New Media and Cyberculture) Astrid Ensslin, Eben Muse2011Routledge
3015Reading Communities from Salons to Cyberspace DeNel Rehberg Sedo2011Palgrave Macmillan
3016Reading Communities from Salons to Cyberspace DeNel Rehberg Sedo2011Palgrave Macmillan
3017Kingpin: How one hacker took over the billion-dollar cybercrime undergroundKevin Poulsen2011Crown
3018Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems Peter Marwedel (auth.)2011Springer Netherlands
3019Transactions on Computational Science XII: Special Issue on Cyberworlds Mathieu Hopmann, Mario Gutierrez (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Alexei Sourin, Olga Sourina (eds.)2011Springer-Verlag Berlin Heidelberg
3020Inside cyber warfare: mapping the cyber underworldJeffrey Carr2011O'Reilly Media
3021Kingpin: How one hacker took over the billion-dollar cybercrime undergroundKevin Poulsen2011Crown
3022“Rome Wasn’t Digitized in a Day”: Building a Cyberinfrastructure for Digital ClassicistsAlison Babeu2011Council on Library and Information Resources
3023Geoinformatics: Cyberinfrastructure for the Solid Earth SciencesG. Randy Keller, Chaitanya Baru2011Cambridge University Press
3024Anonymity and Learning in Digitally Mediated Communications: Authenticity and Trust in Cyber CommunicationBobbe Baggio and Yoany Beldarrain2011IGI Global
3025Access Contested: Security, Identity, and Resistance in Asian CyberspaceRonald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain2011MIT Press
3026Libraries, Telecentres, Cybercafes and Public Access to ICT: International ComparisonsRicardo Gomez2011Igi Global
3027Investigating Cyber Law and Cyber Ethics: Issues, Impacts and PracticesAlfreda Dudley, James Braman, Giovanni Vincenti2011Igi Global
3028Embedded System Design: Embedded Systems Foundations of Cyber-Physical SystemsPeter Marwedel (auth.)2011Springer Netherlands
3029Automation, Communication and Cybernetics in Science and Engineering 2009/2010Ursula Bach, Ingo Leisten (auth.), Sabina Jeschke, Ingrid Isenhardt, Klaus Henning (eds.)2011Springer-Verlag Berlin Heidelberg
3030Introduction to Embedded Systems: A Cyber-Physical Systems ApproachEdward Ashford Lee, Sanjit Arunkumarr Seshia2011Lulu.com
3031Cybercrime and Espionage: An Analysis of Subversive Multi-Vector ThreatsWill Gragido, John Pirc2011Syngress
3032Cybersecurity: Public Sector Threats and ResponsesKim J. Andreasson2011CRC Press
3033Kingpin: How one hacker took over the billion-dollar cybercrime undergroundKevin Poulsen2011Crown
3034Transactions on Computational Science XII: Special Issue on CyberworldsMathieu Hopmann, Mario Gutierrez (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Alexei Sourin, Olga Sourina (eds.)2011Springer-Verlag Berlin Heidelberg
3035Internet co-regulation: European law, regulatory governance and legitimacy in cyberspaceChristopher T. Marsden2011Cambridge University Press
3036Embedded System Design: Embedded Systems Foundations of Cyber-Physical SystemsPeter Marwedel (auth.)2011Springer Netherlands
3037Automation, Communication and Cybernetics in Science and Engineering 2009/2010Ursula Bach, Ingo Leisten (auth.), Sabina Jeschke, Ingrid Isenhardt, Klaus Henning (eds.)2011Springer-Verlag Berlin Heidelberg
3038Cybercrimes: A Multidisciplinary AnalysisElliot Turrini, Sumit Ghosh (auth.), Sumit Ghosh, Elliot Turrini (eds.)2011Springer-Verlag Berlin Heidelberg
3039Cyberwar and Information WarfareDaniel Ventre (ed.)2011Wiley-ISTE
3040Cyber warfare : techniques, tactics and tools for security practitionersJason Andress; Steve Winterfeld; Russ Rogers2011Syngress/Elsevier
3041A System-Aware Cyber Security architectureRick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 229042011
3042Cybercrime and Espionage: An Analysis of Subversive Multi-Vector ThreatsWill Gragido, John Pirc2011Syngress
3043Cyberwar and Information WarfareDaniel Ventre2011Wiley-ISTE
3044Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in CyberspaceChristopher T. Marsden2011Cambridge University Press
3045Cyber-Physical Systems: Driving force for innovation in mobility, health, energy and production2011Springer-Verlag Berlin Heidelberg
3046Cyber Infrastructure ProtectionTarek Saadawi, Jr. Louis Jordan2011Strategic Studies Institute
3047Ahead of Change: How Crowd Psychology and Cybernetics Transform the Way We GovernConstantin Malik2011Campus
3048DarkMarket: how hackers became the new mafia [cyberthieves, cybercops and you]Misha Glenny2011House of Anansi Press
3049Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SISTyson Macaulay, Bryan L. Singer2011Auerbach Publications,CRC Press
3050Cybernetic Revolutionaries: Technology and Politics in Allende’s ChileEden Medina2011The MIT Press
3051Cyber BullyingNick Hunter2011Raintree UK
3052The Law of Cybercrimes and Their InvestigationsCurtis, George2011CRC Press
3053Cybernetic revolutionaries : technology and politics in Allende's ChileMedina, Eden2011The MIT Press
3054Cybernetic revolutionaries : technology and politics in Allende's ChileMedina, Eden2011The MIT Press
3055Darkmarket : cyberthieves, cybercops and youGlenny, Misha2011House of Anansi Press Inc.
3056The Law of Cybercrimes and Their InvestigationsCurtis, George2011CRC Press
3057Reading Communities from Salons to CyberspaceDeNel Rehberg Sedo (eds.)2011Palgrave Macmillan UK
3058Cyber warfare : techniques, tactics and tools for security practitionersJason Andress; Steve Winterfeld; Russ Rogers2011Syngress/Elsevier
3059A System-Aware Cyber Security architectureRick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 229042011
3060Cybercrime and Espionage: An Analysis of Subversive Multi-Vector ThreatsWill Gragido, John Pirc2011Syngress
3061Cyberwar and Information WarfareDaniel Ventre2011Wiley-ISTE
3062Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in CyberspaceChristopher T. Marsden2011Cambridge University Press
3063Cyber-Physical Systems: Driving force for innovation in mobility, health, energy and production2011Springer-Verlag Berlin Heidelberg
3064Cyber Infrastructure ProtectionTarek Saadawi, Jr. Louis Jordan2011Strategic Studies Institute
3065Ahead of Change: How Crowd Psychology and Cybernetics Transform the Way We GovernConstantin Malik2011Campus
3066DarkMarket: how hackers became the new mafia [cyberthieves, cybercops and you]Misha Glenny2011House of Anansi Press
3067Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SISTyson Macaulay, Bryan L. Singer2011Auerbach Publications,CRC Press
3068Cybernetic Revolutionaries: Technology and Politics in Allende’s ChileEden Medina2011The MIT Press
3069Cyber BullyingNick Hunter2011Raintree UK
3070The Law of Cybercrimes and Their InvestigationsCurtis, George2011CRC Press
3071Cybernetic revolutionaries : technology and politics in Allende's ChileMedina, Eden2011The MIT Press
3072Cybernetic revolutionaries : technology and politics in Allende's ChileMedina, Eden2011The MIT Press
3073Darkmarket : cyberthieves, cybercops and youGlenny, Misha2011House of Anansi Press Inc.
3074The Law of Cybercrimes and Their InvestigationsCurtis, George2011CRC Press
3075Reading Communities from Salons to CyberspaceDeNel Rehberg Sedo (eds.)2011Palgrave Macmillan UK
3076Cyberpragmatics: Internet-mediated Communication in ContextFrancisco Yus2011
3077Data Mining and Machine Learning in CybersecuritySumeet Dua, Xian Du2011CRC
3078New Perspectives on Cybernetics: Self-Organization, Autonomy and ConnectionismG. Vijver2011Springer
3079Ethnopolitics in Cyberspace: The Internet, Minority Nationalism, and the Web of IdentitySaunders, R.A.2011Lexington Books
3080The science of cybersecurity and a roadmap to researchBenjamin J. Colfer (editor)2011Nova Science Publishers, Inc.
3081Cyber warfare: techniques, tactics and tools for security practitionersAndress, Jason;Winterfeld, Steve;Northcutt, Stephen;Rogers, Russ2011Elsevier Science;Syngress;Elsevier
3082DarkMarket: cyberthieves, cybercops, and youGlenny, Misha2011Knopf Doubleday Publishing Group;Alfred A. Knopf
3083Transactions on Computational Science XII: Special Issue on CyberworldsMathieu Hopmann, Mario Gutierrez (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Alexei Sourin, Olga Sourina (eds.)2011Springer-Verlag Berlin Heidelberg
3084Internet Co-Regulation: European Law, Regulatory Governance And Legitimacy In CyberspaceChristopher T. Marsden2011Cambridge University Press
3085Cybernetic revolutionaries technology and politics in Allende's ChileMedina, Eden;Allende Gossens, Salvador2011The MIT Press
3086Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime UndergroundPoulsen, Kevin2011Crown Publ
3087Girls on the edge: the four factors driving the new crisis for girls?sexual identity, the cyberbubble, obsessions, enviSax, Leonard2011Basic Books
3088Embedded system design: embedded systems foundations of cyber-physical systemsMarwedel, Peter2011Springer
3089Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal PerspectivesWILEY INDIA2011Nina Godbole, Sunit Belapure, Kamlesh Bajaj
3090Transformers: Exodus - The Official History of the War for CybertronAlex Irvine2011Del Rey
3091Cyber Savvy: Embracing Digital Safety and CivilityNancy Willard2011SAGE Publications
3092Cyber Meltdown: Bible Prophecy and the Imminent Threat of CyberterrorismRon Rhodes2011Harvest House Publishers
3093Responding to Cyber Bullying : An Action Tool for School LeadersJill J. Myers; Donna S. McCaw; Leaunda S. Hemphill2011Corwin Press
3094Wars of Disruption and Resilience : Cybered Conflict, Power, and National SecurityChris C. Demchak; Gary Bertsch; Howard J. Wiarda2011University of Georgia Press
3095Culture, Communication and Cyberspace : Rethinking Technical Communication for International Online EnvironmentsKirk St. Amant; Filipp Sapienza; Charles H. Sides2011Taylor & Francis Group
3096Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related CrimeRalph Clifford (editor)2011Carolina Academic Press
3097Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected PapersIbrahim Baggili (editor)2011Springer
3098How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and InformaticsHayles, N. Katherine2010University of Chicago Press
3099Computer forensics: investigating network intrusions and cybercrimeEC-Council2010Cengage Learning
3100Cyber Law and Cyber Security in Developing and Emerging EconomiesZeinab Karake Shalhoub, Lubna Al Qasimi2010
3101Digital Security: Cyber Terror and Cyber Security (The Digital World)Ananda Mitra2010
3102Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
3103Cyber Security EssentialsRick Howard2010CRC Press
3104Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard2010CRC Press
3105Applied Cryptography for Cyber Security and Defense: Information Encryption and CypheringHamid R. Nemati2010IGI Global
3106Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
3107Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and CommuMargot P. C. Weijnen, Zofia Lukszo (auth.), Zofia Lukszo, Geert Deconinck, Margot P. C. We2010Springer Netherlands
3108The global cybercrime industry: economic, institutional and strategic perspectivesNir Kshetri (auth.)2010Springer-Verlag Berlin Heidelberg
3109Principles of CybercrimeJonathan Clough2010Cambridge University Press
3110Principles of CybercrimeJonathan Clough2010Cambridge University Press
3111Access controlled: the shaping of power, rights, and rule in cyberspaceRonald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti2010The MIT Press
3112Cyber Risks for Business Professionals A Management GuideRupert Kendrick2010IT Governance Publishing
3113Access controlled: the shaping of power, rights, and rule in cyberspaceRonald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti2010The MIT Press
3114Cyber Situational Awareness: Issues and Research Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sush2010Springer US
3115Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing oCommittee on Deterring Cyberattacks: Informing Strategies and Developing Options, National2010National Academies Press
3116The Cybernetic Brain: Sketches of Another FutureAndrew Pickering2010
3117Cyber Attacks: Protecting National InfrastructureEdward Amoroso2010Butterworth-Heinemann
3118The global cybercrime industry: economic, institutional and strategic perspectivesNir Kshetri (auth.)2010Springer-Verlag Berlin Heidelberg
3119Cyber Situational Awareness: Issues and ResearchPaul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sush2010Springer US
3120Digital Communications: From E-Mail to the Cyber Community (The Digital World)Ananda Mitra2010
3121Cyber Law and Cyber Security in Developing and Emerging EconomiesZeinab Karake Shalhoub, Lubna Al Qasimi2010
3122Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and CommuMargot P. C. Weijnen, Zofia Lukszo (auth.), Zofia Lukszo, Geert Deconinck, Margot P. C. We2010Springer Netherlands
3123Digital Security: Cyber Terror and Cyber Security (The Digital World)Ananda Mitra2010
3124The global cybercrime industry: economic, institutional and strategic perspectivesNir Kshetri (auth.)2010Springer-Verlag Berlin Heidelberg
3125Cyber War: The Next Threat to National Security and What to Do About ItRichard A. Clarke, Robert Knake2010HarperCollins
3126Cyber War: The Next Threat to National Security and What to Do About ItRichard A. Clarke, Robert Knake2010
3127CyberForensics: Understanding Information Security InvestigationsJennifer Bayuk (auth.), Jennifer Bayuk (eds.)2010Humana Press
3128Cybercrime: criminal threats from cyberspaceSusan W. Brenner2010Praeger
3129Cyber War: The Next Threat to National Security and What to Do About ItRichard A. Clarke, Robert Knake2010Ecco
3130Cyberfiction: After the FuturePaul Youngquist2010Palgrave Macmillan
3131Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
3132Cyber Security EssentialsRick Howard2010CRC Press
3133Emerging practices in cyberculture and social networkingDaniel Riha, Anna Maj (editors)2010Rodopi
3134Cyber Security EssentialsJames Graham, Ryan Olson, Rick Howard2010CRC Press
3135Global copyright: three hundred years since the Statute of Anne, from 1709 to cyberspaceLionel Bently, Uma Suthersanen, Paul Torremans (editors)2010Edward Elgar Publishing
3136Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches Jerzy Jozefczyk2010IGI Global
3137Disability and New Media (Routledge Studies in New Media and Cyberculture) Katie Ellis, Mike Kent2010Routledge
3138Applied Cryptography for Cyber Security and Defense: Information Encryption and CypheringHamid R. Nemati2010IGI Global
3139Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policyCommittee on Deterring Cyberattacks: Informing Strategies and Developing Options, National Research Council2010National Academies Press
3140Proceedings of a Workshop on Deterring CyberattacksNational Research Council2010The National Academies Press
3141Policing cyber crimePetter Gottschalk2010[S.l.] BookBooN.com
3142Surviving cyberwarRichard Stiennon2010Government Institutes
3143Digital Forensics and Cyber Crime: First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected PapersSriram Raghavan, S. V. Raghavan (auth.), Sanjay Goel (eds.)2010Springer-Verlag Berlin Heidelberg
3144Cyber Situational Awareness: Issues and ResearchPaul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.)2010Springer US
3145Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
3146Surviving CyberwarRichard Stiennon2010Government Institutes
3147Access Controlled: The Shaping of Power, Rights, and Rule in CyberspaceRonald Deibert, John Palfrey, Rafal Rohozinski, Jonathan L. Zittrain, Miklos Haraszti2010The MIT Press
3148Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin?Tom Jacobs2010Perfection Learning
3149China's cyberwarfare capabilityElisabette M. Marvel (editor)2010Nova Science Publishers
3150Internet governance in an age of cyber insecurityRobert K. Knake2010Council on Foreign Relations Press
3151Music and CyberlibertiesPatrick Burkart2010Wesleyan
3152Tokyo Cyberpunk: Posthumanism in Japanese Visual CultureSteven T. Brown2010Palgrave Macmillan
3153Cyberfiction After the FuturePaul Youngquist (auth.)2010Palgrave Macmillan US
3154Cyber risks for business professionals : a management guideKendrick, Rupert2010IT Governance
3155Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
3156Surviving CyberwarRichard Stiennon2010Government Institutes
3157Access Controlled: The Shaping of Power, Rights, and Rule in CyberspaceRonald Deibert, John Palfrey, Rafal Rohozinski, Jonathan L. Zittrain, Miklos Haraszti2010The MIT Press
3158Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin?Tom Jacobs2010Perfection Learning
3159China's cyberwarfare capabilityElisabette M. Marvel (editor)2010Nova Science Publishers
3160Internet governance in an age of cyber insecurityRobert K. Knake2010Council on Foreign Relations Press
3161Music and CyberlibertiesPatrick Burkart2010Wesleyan
3162Tokyo Cyberpunk: Posthumanism in Japanese Visual CultureSteven T. Brown2010Palgrave Macmillan
3163Cyberfiction After the FuturePaul Youngquist (auth.)2010Palgrave Macmillan US
3164Cyber risks for business professionals : a management guideKendrick, Rupert2010IT Governance
3165Tokyo Cyberpunk: Posthumanism in Japanese Visual CultureSteven T. Brown2010Palgrave Macmillan US
3166Shakespeare in Hollywood, Asia, and cyberspaceHuang, Alexander Cheng-Yuan; Ross (eds.)2010Purdue University Press
3167Girls on the Edge: The Four Factors Driving the New Crisis for Girls: Sexual Identity, the Cyberbubble, Obsessions, Environmental ToxinsLeonard Sax2010Basic Books (AZ)
3168Girls on the Edge: The Four Factors Driving the New Crisis for Girls: Sexual Identity, the Cyberbubble, Obsessions, Environmental ToxinsLeonard Sax2010Basic Books (AZ)
3169Pyramid. CyberpunkSteve Jackson2010Steve Jackson Games Incorporated
3170Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking WorldVanessa Rogers2010Jessica Kingsley Publishers
3171Cyber Junkie: Escape the Gaming and Internet TrapKevin Roberts2010Hazelden Publishing
3172Cyber Junkie: Escape the Gaming and Internet TrapKevin Roberts2010Hazelden Publishing
3173How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and InformaticsN. Katherine Hayles2010University of Chicago Press
3174Dave Barry in CyberspaceBarry, Dave2010Random House Publishing Group;Fawcett Books
3175Inside cyber warfare: mapping the cyber underworldCarr, Jeffrey2010O'Reilly
3176The First Cyber Death Extravaganza!Douglas, Scott2010Feedbooks
3177The First Cyber Death Extravaganza! A Mock Passion PlayDouglas, Scott2010Feedbooks
3178Insider Threats in Cyber SecurityChristian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.)2010Springer US
3179How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and InformaticsHayles, N. Katherine2010University of Chicago Press
3180Changing the Center of Gravity: Transforming Classical Studies Through CyberinfrastructureMelissa Terras, Gregory Crane2010Gorgias Press
3181Cyber junkie: escape the gaming and internet trapRoberts, Kevin2010Hazelden Publishing
3182Cyber junkie: escape the gaming and internet trapRoberts, Kevin2010Hazelden Publishing
3183Principles Of CybercrimeJonathan Clough2010Cambridge University Press
3184Music and cyberlibertiesBurkart, Patrick2010Wesleyan University Press
3185Cyber Junkie: Escape the Gaming and Internet TrapKevin Roberts2010Hazelden Publishing
3186CyberSafe: Protecting and Empowering Kids in the Digital World of Texting, Gaming, and Social MediaGwenn Schurgin O'Keeffe2010American Academy of Pediatrics
3187Cyber-ArchaeologyMaurizio Forte2010BAR Publishing
3188Changing the Center of Gravity: Transforming Classical Studies Through CyberinfrastructureMelissa Terras (editor); Gregory Crane (editor)2010Gorgias Press
3189Cyberbullying : What Counselors Need to KnowSheri Bauman2010American Counseling Association
3190Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of EvolutionPeter Corning2010University of Chicago Press
3191The Cybernetic Brain: Sketches of Another FutureAndrew Pickering2010University of Chicago Press
3192Cyberprotest : Environmental Activism OnlineJenny Pickerill2010Manchester University Press
3193CyberForensics: Understanding Information Security InvestigationsJennifer Bayuk (editor)2010Humana
3194Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (AKenneth J. Knapp2009Information Science Reference
3195Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science forU. Gori2009
3196Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)Kenneth J. Knapp2009Information Science Reference
3197Optimal observation for cyber-physical systems: a fisher-information-matrix-based approachZhen Song, YangQuan Chen, Chellury Ram Sastry, Nazif Cihan Tas (auth.)2009Springer-Verlag London
3198Encyclopedia of CybercrimeSamuel C. McQuade III (editor)2009Greenwood Press
3199Ethics in cyberspace: How cyberspace may influence interpersonal interactionProfessor Thomas Ploug (auth.)2009Springer Netherlands
3200Inside cyber warfare: mapping the cyber underworldJeffrey Carr2009O'Reilly Media
3201Machine Learning in Cyber Trust: Security, Privacy, and ReliabilityLui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wang (auth.), Philip S. Yu, Jeffrey J. P. 2009Springer US
3202Digital Diaspora: A Race for CyberspaceAnna Everett2009State University of New York Press
3203Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (AKenneth J. Knapp2009Information Science Reference
3204Cyberinfrastructure Technologies and ApplicationsJunwei Cao2009Nova Science Publishers
3205Inside cyber warfare: mapping the cyber underworldJeffrey Carr2009O'Reilly Media
3206Creating a National Framework for Cybersecurity Eric A. Fischer2009Nova Science Publishers
3207The Virtual Battlefield: Perspectives on Cyber WarfareC. Czosseck and K. Geers2009
3208Ethics in cyberspace: How cyberspace may influence interpersonal interactionProfessor Thomas Ploug (auth.)2009Springer Netherlands
3209Technobohemians or the new cybertariat?Rosalind Gill2009
3210Intelligent Engineering Systems and Computational CyberneticsJ.A. Tenreiro Machado, Bela Patkai, Imre J. Rudas2009
3211Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Perspectives in aJessie Daniels2009
3212Cyberthreats: The Emerging Fault Lines of the Nation StateSusan W Brenner2009
3213Machine Learning in Cyber Trust: Security, Privacy, and ReliabilityLui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wang (auth.), Philip S. Yu, Jeffrey J. P. 2009Springer US
3214Cybersecurity, Cyberanalysis and WarningKerry T. Norwood, Sandra P. Catwell2009Nova Science Publishers
3215In Search of Jefferson's Moose: Notes on the State of Cyberspace (Law and Current Events MDavid Post2009
3216Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science forU. Gori2009
3217Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)Kenneth J. Knapp2009Information Science Reference
3218Cyberpunk 2.0Herlander Elias2009LabCom
3219Inside cyber warfare: mapping the cyber underworldJeffrey Carr2009O'Reilly Media
3220Bibliometrics and Citation Analysis: From the Science Citation Index to CybermetricsNicola De Bellis2009The Scarecrow Press, Inc.
3221Cyber Fraud: Tactics, Techniques and ProceduresRick Howard2009
3222Cyberdeterrence and CyberwarMartin C. Libicki2009
3223Astronomical Cybersketching: Observational Drawing with PDAs and Tablet PCsPeter Grego (auth.)2009Springer-Verlag New York
3224Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal ConsequencesShaheen Shariff2009
3225Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack CapabilitiesWilliam A. Owens, Kenneth W. Dam, Herbert S. Lin2009National Academies Press
3226Cyberchiefs: Autonomy and Authority in Online TribesMathieu O'Neil2009Pluto Press
3227Operations Research and Cyber-InfrastructureWilliam E. Hart (auth.), John W. Chinneck, Bjarni Kristjansson, Matthew J. Saltzman (eds.)2009Springer US
3228A Missing Link in Cybernetics: Logic and ContinuityAlex M. Andrew (auth.)2009Springer-Verlag New York
3229Optimal Observation for Cyber-physical Systems: A Fisher-information-matrix-based ApproachZhen Song, YangQuan Chen, Chellury Ram Sastry, Nazif Cihan Tas (auth.)2009Springer-Verlag London
3230Cyberinfrastructure Technologies and ApplicationsJunwei Cao2009Nova Science Pub Inc
3231Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack CapabilitiesWilliam A. Owens, Kenneth W. Dam, Herbert S. Lin2009National Academies Press
3232Intelligent Engineering Systems and Computational Cybernetics J. A. Tenreiro Machado, Béla Pátkai, Imre J. Rudas2009Springer
3233Computer Forensics: Investigating Network Intrusions and Cybercrime EC-Council2009Cengage Learning
3234The Digital Cast of Being: Metaphysics, Mathematics, Cartesianism, Cybernetics, Capitalism, Communication Michael Eldred2009Ontos Verlag
3235Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack CapabilitiesWilliam A. Owens, Kenneth W. Dam, Herbert S. Lin2009National Academies Press
3236Inside cyber warfare: mapping the cyber underworldJeffrey Carr2009O'Reilly Media
3237Islam Dot Com: Contemporary Islamic Discourses in Cyberspace (The Palgrave Macmillan Series in Internatioal Political Communication)Mohammed el-Nawawy, Sahar Khamis2009Palgrave Macmillan
3238Astronomical Cybersketching: Observational Drawing with PDAs and Tablet PCsPeter Grego (auth.)2009Springer-Verlag New York
3239Ethics in Cyberspace: How Cyberspace May Influence Interpersonal InteractionProfessor Thomas Ploug (auth.)2009Springer Netherlands
3240Optimal Observation for Cyber-physical Systems: A Fisher-information-matrix-based ApproachZhen Song, YangQuan Chen, Chellury Ram Sastry, Nazif Cihan Tas (auth.)2009Springer-Verlag London
3241Emotional Intelligence: A Cybernetic ApproachAruna Chakraborty, Amit Konar (auth.)2009Springer-Verlag Berlin Heidelberg
3242Ethics in Cyberspace: How Cyberspace May Influence Interpersonal InteractionProfessor Thomas Ploug (auth.)2009Springer Netherlands
3243Operations Research and Cyber-InfrastructureWilliam E. Hart (auth.), John W. Chinneck, Bjarni Kristjansson, Matthew J. Saltzman (eds.)2009Springer US
3244Global Initiatives to Secure Cyberspace: An Emerging LandscapeMichael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.)2009Springer US
3245Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal ConsequencesShaheen Shariff Ph.D.2009Cambridge University Press
3246Cyberdeterrence and CyberwarMartin C. Libicki2009RAND Corporation
3247Inside cyber warfare: mapping the cyber underworldJeffrey Carr2009O'Reilly Media
3248Tracking GhostNet : investigating a cyber espionage networkthe SecDev Group ; Citizen Lab, Munk Centre for International Studies, University of Toronto2009Citizen Lab
3249Cyber Bullying: Protecting Kids and Adults from Online BulliesSamuel C. McQuade III, James P. Colt, Nancy Meyer2009Praeger
3250Islam Dot Com: Contemporary Islamic Discourses in CyberspaceMohammed el-Nawawy, Sahar Khamis (auth.)2009Palgrave Macmillan US
3251Astronomical Cybersketching. Observational Drawing with PDAs and Tablet PCsPeter Grego2009Springer Publishing
3252Global Initiatives to Secure Cyberspace: An Emerging LandscapeMichael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.)2009Springer US
3253Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal ConsequencesShaheen Shariff Ph.D.2009Cambridge University Press
3254Cyberdeterrence and CyberwarMartin C. Libicki2009RAND Corporation
3255Inside cyber warfare: mapping the cyber underworldJeffrey Carr2009O'Reilly Media
3256Tracking GhostNet : investigating a cyber espionage networkthe SecDev Group ; Citizen Lab, Munk Centre for International Studies, University of Toronto2009Citizen Lab
3257Cyber Bullying: Protecting Kids and Adults from Online BulliesSamuel C. McQuade III, James P. Colt, Nancy Meyer2009Praeger
3258Islam Dot Com: Contemporary Islamic Discourses in CyberspaceMohammed el-Nawawy, Sahar Khamis (auth.)2009Palgrave Macmillan US
3259Astronomical Cybersketching. Observational Drawing with PDAs and Tablet PCsPeter Grego2009Springer Publishing
3260The Lost Blogs: From Jesus to Jim Morrison--The Historically Inaccurate and Totally Fictitious Cyber Diaries of Everyone Worth KnowingPaul Davidson2009Warner Books
3261The everything parent's guide to dealing with bullies: from playground teasing to cyber bullying, all you need to ensure your child's safety and happinessFerguson, Christopher J.; Carpenter, Deborah2009Adams Media, David & Charles ;F+W Media
3262Inside Cyber Warfare: Mapping the Cyber UnderworldJeffrey Carr2009O'Reilly Media, Inc
3263The First Cyber Death Extravaganza!: A Mock Passion PlayDouglas, Scott2009CreateSpace Independent Publishing Platform
3264Global Initiatives to Secure Cyberspace: An Emerging LandscapeMichael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.)2009Springer US
3265Astronomical Cybersketching: Observational Drawing with PDAs and Tablet PCsPeter Grego (auth.)2009Springer-Verlag New York
3266In search of Jefferson's moose notes on the state of cyberspacePost, David G2009Oxford University Press
3267Figurations of Violence and Belonging: Queerness, migranthood and nationalism in cyberspace and beyondAdi Kuntsman2009Peter Lang
3268Cyberpower and National SecurityFranklin Kramer (editor), Stuart H. Starr (editor), Larry Wentz (editor)2009POTOMAC BOOKS
3269Cyberpower and National SecurityFranklin Kramer (editor), Stuart H. Starr (editor), Larry Wentz (editor)2009POTOMAC BOOKS
3270The Digital Cast of Being: Metaphysics, Mathematics, Cartesianism, Cybernetics, Capitalism, CommunicationMichael Eldred2009De Gruyter
3271Cyber Law : Maximizing Safety and Minimizing Risk in ClassroomsAimee M. Bissonette2009Corwin Press
3272Global Medium, Local Laws : Regulating Cross-Border CyberhateBastiaan Vanacker2009LFB Scholarly Publishing LLC
3273Insider Attack and Cyber Security. Beyond the HackerSalvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, 2008Springer
3274Insider attack and cyber security : beyond the hackerSalvatore J Stolfo; et al2008Springer
3275Security and Software for CybercafesEsharenana E. Adomi, Esharenana E. Adomi2008IGI
3276Insider Attack and Cyber Security. Beyond the HackerSalvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, 2008Springer
3277The Allure of Machinic Life - Cybernetics, Artificial Life and the New AIJohn Johnston2008The MIT Press
3278Cyber warfare and cyber terrorismLech J. Janczewski, Lech J. Janczewski, Andrew M. Colarik2008Information Science Reference
3279Systematics as Cyberscience: Computers, Change, and Continuity in Science (Inside TechnolChristine Hine2008The MIT Press
3280Architectural Principles in the Age of CyberneticsChristopher Hight2008Routledge
3281Responses to Cyber Terrorism Center of Excellence Defence Against Terror, Center of Excellence Defence Against Ter2008IOS Press
3282Cyber-Conflict and Global Politics Athina Karatzogianni2008Routledge
3283Cyber-Bullying: Issues and Solutions for the School, the Classroom and the HomeShaheen Shariff2008
3284Cyber Bullying: Bullying in the Digital AgeRobin M., PhD Kowalski, Susan P., PhD Limber, Patricia W., PhD Agatston2008
3285Global Initiatives to Secure Cyberspace: An Emerging Landscape (Advances in Information SeMichael Portnoy, Seymour Goodman2008
3286Cyberculture and new mediaFrancisco J. Ricardo (editor)2008Rodopi
3287Encyclopedia of cybercrimeSamuel C. McQuade III (editor)2008Greenwood Press
3288The Politics of Caribbean CybercultureCurwen Best2008
3289Chinese Women and the Cyberspace (ICAS Publications Edited Volumes)Khun Eng Kuah-Pearce2008
3290Security and Software for Cybercafes (Premier Reference Source)Esharenana E. Adomi2008
3291Psychological aspects of cyberspace: theory, research, applicationsAzy Barak (editor)2008Cambridge University Press
3292Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the InternetKen Dunham, Jim Melnick2008
3293The Medicalization of CyberspaceAndy Miah, Emma Rich2008Routledge
3294Cyber EthicsDiane Bailey2008The Rosen Publishing Group
3295The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AIJohn Johnston2008The MIT Press
3296Scene of the Cybercrime, Second EditionDebra Littlejohn Shinder, Michael Cross2008Syngress
3297Technology and Nationalism in India: Cultural Negotiations from Colonialism to Cyberspace Rohit Chopra2008Cambria Press
3298Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimesAlbert J Marcella; Doug Menendez2008Auerbach Publications
3299Insider attack and cyber security : beyond the hackerSalvatore J Stolfo; et al2008Springer
3300Cyber Bullying: The New Moral FrontierRobin M. Kowalski, Susan P. Limber, Patricia W. Agatston(auth.)2008Wiley
3301Latin American cyberculture and cyberliteratureClaire Taylor, Thea Pitman (editors)2008Liverpool University Press
3302Latin American cyberculture and cyberliteratureClaire Taylor, Thea Pitman (editors)2008Liverpool University Press
3303The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AIJohn Johnston2008A Bradford Book
3304Chinese Women and the CyberspaceKhun Eng Kuah-Pearce2008Amsterdam University Press
3305Cybersemiotics: Why Information Is Not Enough!Soren Brier2008University of Toronto Press
3306The Politics of Caribbean CybercultureCurwen Best (auth.)2008Palgrave Macmillan US
3307Latin American cyberculture and cyberliteratureClaire Taylor, Thea Pitman (editors)2008Liverpool University Press
3308Latin American cyberculture and cyberliteratureClaire Taylor, Thea Pitman (editors)2008Liverpool University Press
3309The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AIJohn Johnston2008A Bradford Book
3310Chinese Women and the CyberspaceKhun Eng Kuah-Pearce2008Amsterdam University Press
3311Cybersemiotics: Why Information Is Not Enough!Soren Brier2008University of Toronto Press
3312The Politics of Caribbean CybercultureCurwen Best (auth.)2008Palgrave Macmillan US
3313Postmodern orientalism : William Gibson, cyberpunk and JapanLeonard Patrick Sanders2008Massey University
3314The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AIJohn Johnston2008A Bradford Book,MIT
3315Complete 31 Free Lessons by GM Tejas Bakre, Cyberchess Lecturescoll.2008
3316Cyber Crime Fighters: Tales from the TrenchesFelicia Donovan2008Que Publishing
3317Cyberliteracy: Navigating the Internet with AwarenessLaura J. Gurak2008Yale University Press
3318Short Course in International Payments : Letters of Credit, Documentary Collections and Cyber Payments in International TransactionsEdward G. Hinkelman2008World Trade Press
3319Chinese Women and the CyberspaceKhun Eng Kuah-Pearce (editor)2008Amsterdam University Press
3320Cybersemiotics: Why Information Is Not EnoughSoren Brier2008University of Toronto Press
3321Data Warehousing and Data Mining Techniques for Cyber SecurityAnoop Singhal (auth.)2007Springer US
3322Cyber Forensics: A Field Manual for Collecting,Examining,and Preserving Evidence of ComputJr. Albert J. Marcella2007Unknown
3323Cyber crime investigations: bridging the gaps between security professionals, law enforcemAnthony Reyes, Richard Brittson, Kevin O'Shea, James Steele2007Syngress Publishing
3324The best damn cybercrime and digital forensics book periodJack Wiles, Anthony Reyes2007Syngress
3325Conquest in Cyberspace - National Security and Information WarfareMartin C. Libicki2007Cambridge University Press
3326Cyberculture Theorists: Manuel Castells and Donna HarawayDavid Bell2007Routledge
3327Cyberculture Theorists (Routledge Critical Thinkers)David Bell2007Routledge
3328Sex in Cyberspace: Men Who Pay for SexSarah Earle, Keith Sharp2007
3329Sex in Cyberspace: Men Who Pay for SexSarah Earle, Keith Sharp2007
3330Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of CompAlbert Marcella Jr., Doug Menendez2007Auerbach Publications
3331Laws On Cyber Crimes: Alongwith IT Act and Relevant RulesP.K. Singh2007Book Enclave
3332The Regulation of Cyberspace: Control in the Online Environment (Glasshouse)Andrew D. Murray2007
3333Power and security in the information age: investigating the role of the state in cyberspaMyriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors)2007Ashgate
3334Toward a Safer and More Secure CyberspaceCommittee on Improving Cybersecurity Research in the United States, National Research Council2007
3335Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and ProsecutorsAnthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel,2007
3336Cybermancy (Ravirn, Book 2)Kelly McCullough2007
3337Conquest in Cyberspace: National Security and Information WarfareMartin C. Libicki2007Cambridge University Press
3338Rewired: The Post-Cyberpunk AnthologyJames Patrick Kelly, John Kessel2007
3339Decoding Liberation: The Promise of Free and Open Source Software (Routledge Studies in New Media and Cyberculture)Samir Chopra, Scott Dexter2007
3340Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and ProsecutorsAnthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel,2007
3341Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Css Studies in Security and International Relations)Myriam Dunn Cavelty2007
3342Cyberlaw, Security and PrivacySylvia Mercado Kierkegaard (ed.)2007Ankara Bar Association Press
3343Cybernetical Physics: From Control of Chaos to Quantum Control (Understanding Complex Systems)A. Fradkov2007Springer
3344The best damn cybercrime and digital forensics book periodJack Wiles, Anthony Reyes2007Syngress
3345The total work of art: from Bayreuth to cyberspace Matthew Wilson Smith2007Routledge
3346Rewired: The Post-Cyberpunk AnthologyJames Patrick Kelly, John Kessel2007Tachyon Publications
3347Cybernetical Physics: From Control of Chaos to Quantum ControlAlexander L. Fradkov (auth.)2007Springer-Verlag Berlin Heidelberg
3348Data Warehousing and Data Mining Techniques for Cyber SecurityAnoop Singhal (auth.)2007Springer US
3349The best damn cybercrime and digital forensics book periodJack Wiles, Anthony Reyes2007Syngress
3350The best damn cybercrime and digital forensics book periodJack Wiles, Anthony Reyes2007Syngress
3351Cyber CopPatricia Hynes2007Cherry Lake Publishing
3352Power and security in the information age: investigating the role of the state in cyberspaceMyriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors)2007Ashgate
3353Power and security in the information age: investigating the role of the state in cyberspaceMyriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors)2007Ashgate
3354Cybercrime : digital cops in a networked environmentJ. M. Balkin, Katz Eddan, James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman2007New York University Press
3355Cybercrime : digital cops in a networked environmentJ. M. Balkin & Jack Balkin & James Grimmelmann & Eddan Katz & Nimrod Kozlovski & Shlomit Wagman & Tal Zarsky2007New York University Press
3356The best damn cybercrime and digital forensics book periodJack Wiles, Anthony Reyes2007Syngress
3357The best damn cybercrime and digital forensics book periodJack Wiles, Anthony Reyes2007Syngress
3358Cyber CopPatricia Hynes2007Cherry Lake Publishing
3359Power and security in the information age: investigating the role of the state in cyberspaceMyriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors)2007Ashgate
3360Power and security in the information age: investigating the role of the state in cyberspaceMyriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors)2007Ashgate
3361Cybercrime : digital cops in a networked environmentJ. M. Balkin, Katz Eddan, James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman2007New York University Press
3362Cybercrime : digital cops in a networked environmentJ. M. Balkin & Jack Balkin & James Grimmelmann & Eddan Katz & Nimrod Kozlovski & Shlomit Wagman & Tal Zarsky2007New York University Press
3363Cybermapping and the writing of mythJahshan, Paul2007P. Lang
3364Chinese cyber nationalism : evolution, characteristics, and implicationsWu, Xu2007Lexington Books
3365Evidence Explained: Citing History Sources from Artifacts to CyberspaceElizabeth Shown Mills2007Genealogical Publishing Company
3366Rewired: the post-cyberpunk anthologyKessel, John;Kelly, James, Patrick;editor2007Tachyon Publications
3367The Resurgence of the State: Trends and Processes in Cyberspace GovernanceCavelty, Myriam Dunn;Krishna-Hensel, Sai Felicia(Editor)2007Routledge
3368Cybernetics and DesignRanulph Glanville; Ranulph Glanville2007Emerald Publishing Limited
3369Cybercrime: Digital Cops in a Networked EnvironmentJack M. Balkin (editor); James Grimmelmann (editor); Eddan Katz (editor); Nimrod Kozlovski (editor); Shlomit Wagman (editor); Tal Zarsky (editor)2007New York University Press
3370Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information SeAnoop Singhal2006
3371Cyber Terrorism: Political and Economic ImplicationsAndrew M. Colarik2006Idea Group Publishing
3372Digital Crime and Forensic Science in Cyberspaceet al, Panagiotis Kanellis2006Idea Group Pub
3373Code: And Other Laws of Cyberspace, Version 2.0Lawrence Lessig2006Basic Books
3374Handbook for bloggers and cyberdissidentsSylvie Devilette, Anne Martinez-Saiz, Nuit de Chine2006Reporters Without Borders
3375Cyberculture, cyborgs and science fiction: consciousness and the posthumanWilliam S. Haney II2006Rodopi
3376The Law and Economics of CybersecurityMark F. Grady, Francesco Parisi2006Cambridge University Press
3377Handbook for Bloggers and Cyber-DissidentsSylvie Devilette, Anne Martinez-Saiz, Nuit de Chine2006Reporters Without Borders
3378Cyberpop: digital lifestyles and commodity cultureSidney Eve Matrix2006Routledge
3379Cybercrime and societyMajid Yar2006SAGE Publications
3380Advances in Machine Learning and Cybernetics: 4th International Conference, ICMLC 2005, GuLi Xu, Wen-Xiang Gu, Xin-Mei Zhang (auth.), Daniel S. Yeung, Zhi-Qiang Liu, Xi-Zhao Wang, 2006Springer-Verlag Berlin Heidelberg
3381The Internet in China: cyberspace and civil societyZixue Tai2006Routledge
3382Cyber Terrorism: Political And Economic ImplicationsAndrew M. Colarik2006
3383Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information SeAnoop Singhal2006
3384From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise Fred Turner2006University of Chicago Press
3385Cyberwar, Netwar and the Revolution in Military AffairsEdward F. Halpin, Philippa Trevorrow, David Webb, Steve Wright2006
3386Faux Paw Meets the First Lady: How to Handle Cyber-bullyingJacalyn Leavitt, Sally Linford2006
3387Chinese Cyberspaces Technological Changes and Political Effects (Asia's Transformations)Jens Damm, Simona Thomas2006
3388Cyberwar, Netwar and the Revolution in Military AffairsEdward F. Halpin, Philippa Trevorrow, David Webb, Steve Wright2006
3389The Politics of Cyberconflict: Security, Ethnoreligious and Sociopolitical conflicts (Routledge Research in Information Technology and Society)Karatzogianni2006
3390‘We’re Okay with Fake’: Cybercinematography and the Spectre of Virtual Actors in S1MØNESidney Eve Matrix2006
3391Cyberwar-netwar: Security in the Information Age (NATO Security Through Science Series) (Nato Security Through Science Series)et al F. D. Garvalho (Editor)2006
3392Cybercrime and societyMajid Yar2006SAGE Publications
3393World Weavers: Globalization, Science Fiction, and The Cybernetic Revolution Wong Kin Yuen, Gary Westfahl, Amy Kit-sze Chan2006Hong Kong Univ Pr
3394Cybernetics and public administrationAngela Ma Espinosa Salazar, Allenna Leonard2006The International Journal of Systems & Cybernetics
3395Cybercultures: Critical Concepts in Media and Cultural Studies Vol 1David Bell2006Informa HealthCare
3396Cybercultures: Critical Concepts in Media and Cultural Studies Vol. 2David Bell2006Routledge
3397Cybercultures: Critical Concepts in Media and Cultural Studies Vol. 3David Bell2006Informa HealthCare
3398Cyberwar-Netwar : security in the information ageFernando Duarte Carvalho; Eduardo Mateus da Silva2006IOS Press
3399Chinese cyberspaces: technological changes and political effectsJens Damm, Simona Thomas (editors)2006Routledge
3400Cybersecurity for SCADA SystemsShaw, William T.2006PennWell
3401Cybersecurity for SCADA SystemsShaw, William T.2006PennWell
3402Cyberculture, cyborgs and science fiction : consciousness and the posthumanWilliam S. Haney II2006Rodopi
3403Cyberspaces of everyday lifeNunes, Mark2006Univ Of Minnesota Press
3404Cyberwar, Netwar and the Revolution in Military AffairsDr Edward Halpin, Dr Philippa Trevorrow, Professor David Webb, Dr Steve Wright (eds.)2006Palgrave Macmillan UK
3405Cybersecurity for SCADA SystemsShaw, William T.2006PennWell
3406Cybersecurity for SCADA SystemsShaw, William T.2006PennWell
3407Cyberculture, cyborgs and science fiction : consciousness and the posthumanWilliam S. Haney II2006Rodopi
3408Cyberspaces of everyday lifeNunes, Mark2006Univ Of Minnesota Press
3409Cyberwar, Netwar and the Revolution in Military AffairsDr Edward Halpin, Dr Philippa Trevorrow, Professor David Webb, Dr Steve Wright (eds.)2006Palgrave Macmillan UK
3410Critical Cyberculture StudiesDavid Silver; Adrienne Massanari (eds.)2006NYU Press
3411Dark Hero of the Information Age: In Search of Norbert Wiener The Father of CyberneticsFlo Conway, Jim Siegelman2006Basic Books
3412Full metal apache : transactions between cyberpunk Japan and avant-pop AmericaTatsumi, Takayuki2006Duke University Press
3413Cyberculture, Cyborgs and Science Fiction: Consciousness and the PosthumanWilliam S. Haney2006Rodopi
3414Cybersounds: Essays on Virtual Music CultureMichael D. Ayer, Elizabeth Buchanan, Markus Giesler, Andrew Whelan, Andre Pinard, Sean Jacob, Adam Haupt, Darah O'Reilly, Chris Anderton, Gabrielle Consentino, Trace Reddell, Kathy Doherty, Jonathan Sterne, John Ryan, Michael Hughes2006Peter Lang Inc., International Academic Publishers
3415From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital UtopianismFred Turner2006University of Chicago Press
3416Critical Cyberculture StudiesDavid Silver (editor); Adrienne Massanari (editor); Steve Jones (editor)2006New York University Press
3417Full Metal Apache: Transactions Between Cyberpunk Japan and Avant-Pop AmericaTakayuki Tatsumi (editor); Stanley Fish (editor); Fredric Jameson (editor); Larry McCaffery (editor)2006Duke University Press
3418Cyber Spying: Tracking Your Family's (Sometimes) Secret Online LivesTed Fair, Michael Nordfelt, Sandra Ring, Dr. Eric Cole2005Syngress Publishing
3419Cyber Spying Tracking Your Family's Sometimes) Secret Online Lives Ted Fair, Michael Nordfelt, Sandra Ring, Dr. Eric Cole2005Syngress Publishing
3420Managing cyber threats: issues, approaches, and challengesVipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic2005Springer
3421Fighting Terror in CyberspaceMark Last, Abraham Kandel2005World Scientific
3422Cyberspace security and defense: research issues. Proceedings of the NATO Advanced ResearcJanusz S. Kowalik, Janusz Gorski, Anatoly Sachenko2005Springer
3423Cybertech Publishing, Working Virtually Challenges Of Virtual Teams2005
3424Signposts in Cyberspace: The Domain Name System And Internet NavigationNational Research Council (U. S.)2005
3425Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)Vipin Kumar (Editor), Jaideep Srivastava (Editor), Aleksandar Lazarevic (Editor)2005
3426Managerial Guide for Handling Cyber-Terrorism and Information WarfareLech Janczewski, Andrew M. Colarik2005
3427Religion and CyberspaceMorten T. Hojsgaard, Margit Warburg2005
3428Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry)Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko2005
3429Cyber Alert: How the World Is Under Attack from a New Form of CrimePeter Warren, Michael Streeter2005
3430Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of EvolutionPeter A. Corning2005
3431Cyber spying: tracking your family's (sometimes) secret online livesTed Fair, Michael Nordfelt, Eric Cole, Sandra Ring2005Syngress
3432Cyber Spying Tracking Your Family's (Sometimes) Secret Online LivesTed Fair, Michael Nordfelt, Sandra Ring2005Syngress Publishing
3433Cyber Spying Tracking Your Family's (Sometimes) Secret Online LivesTed Fair, Michael Nordfelt, Sandra Ring2005Syngress Publishing
3434Cybersecurity of Freight Information Systems: A Scoping Study (Special Report (National Research Council (U S) Transportation Research Board))National Research Council (U. S.)2005National Academies Press
3435Cybercartography: Theory and PracticeD.R. Fraser Taylor (Eds.)2005Elsevier Science
3436Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004Andrzej Bialas (auth.), Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko (eds.)2005Springer Netherlands
3437Bush, City, Cyberspace. The Development of Australian Children's Literature Into the 21st CenturyJohn Foster, Ern Finnis and Maureen Nimon (Auth.)2005Chandos Publishing
3438Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004Andrzej Bialas (auth.), Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko (eds.)2005Springer Netherlands
3439Bush, City, Cyberspace. The Development of Australian Children's Literature Into the 21st CenturyJohn Foster, Ern Finnis and Maureen Nimon (Auth.)2005Chandos Publishing
3440Cyber Consumer Law and Unfair Trading PracticesCristina Coteanu2005Ashgate Publishing; Routledge
3441Cyberspaces of Their Own: Female Fandoms OnlineRhiannon Bury2005Peter Lang Inc., International Academic Publishers
3442Cybernetic IntelligenceMourad Oussalah2005Emerald Publishing Limited
3443Interactive Realism : The Poetics of CyberspaceDaniel Downes2005McGill-Queen's University Press
3444Interactive Realism: The Poetics of CyberspaceDaniel Downes2005McGill-Queen's University Press
3445Ruling the Root: Internet Governance and the Taming of CyberspaceMilton L. Mueller2004The MIT Press
3446Cyber Adversary Characterization: Auditing the Hacker MindParker T., Sachs M., Shaw E.2004
3447Supercomputers: Charting the Future of CyberneticsCharlene W. Billings, Sean M. Grady2004Facts on File
3448Hacktivism and Cyberwars: Rebels with a Cause?Tim Jordan, Paul Taylor2004Routledge
3449Systematics As CyberscienceChristine Hine2004MIT
3450Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your TrJohn F. Ehlers2004Wiley
3451Cyber China: Reshaping National Identities in the Age of InformationFrancoise Mengin2004Palgrave Macmillan
3452Cybercrime: A Reference HandbookClemens Martin, Bernadette Schell, Mildred Vasan2004ABC-CLIO
3453Cyber Criminals on TrialRussell G. Smith, Peter Grabosky, Gregor Urbas2004Cambridge University Press
3454Cybernetic analysis for stocks and futuresJohn F. Ehlers2004Wiley
3455Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your TrJohn F. Ehlers2004Wiley
3456Shaping the Network Society: The New Role of Civil Society in CyberspaceDouglas Schuler, Peter Day2004The MIT Press
3457Cyber Crime Investigator's Field Guide, Second EditionBruce Middleton2004
3458Cyberprotest: New Media, Citizens and Social MovementsW. Van De Donk2004
3459Ruling the Root : Internet Governance and the Taming of CyberspaceMilton L. Mueller2004
3460The Digital Sublime: Myth, Power, and CyberspaceVincent Mosco2004The MIT Press
3461Cyber China: Reshaping National Identities in the Age of Information (Sciences Po Series in International Relations and Political Economy)Francoise Mengin2004
3462Cyberculture: the key conceptsDavid J. Bell, Brian D. Loader, Nicholas Pleace, Douglas Schuler (editors)2004Routledge
34634th Party Cyber Logistics for Air CargoSung-Chi Chu2004
3464Dark Hero Of The Information Age: In Search of Norbert Wiener The Father of CyberneticsFlo Conway, Jim Siegelman,2004
3465Cyberspace, Distance Learning, and Higher Education In Developing Countries: Old and Emergent Issues Of Access, Pedagogy, and Knowledge Production(International Studies in Sociology and Social Anthropology)N'dri Therese Assie-Lumumba2004Brill Academic Publishers
3466Cybertherapy: internet and virtual reality as assessment and rehabilitation tools for clinical psychology and neuroscienceG. Riva2004IOS Press
3467The Digital Sublime: Myth, Power, and Cyberspace Vincent Mosco2004The MIT Press
3468The Cybercities Reader (Routledge Urban Reader Series)Steve Graham (editor)2004Routledge
3469Cybercultures: Critical Concepts in Media and Cultural Studies Vol. 4David Bell2004Routledge
3470Career Opportunities in Computers and Cyberspace, 2nd EditionHarry Henderson2004Facts on File
3471Cyber adversary characterization : auditing the hacker mindTom Parker; et al2004Syngress
3472Cyber adversary characterization : auditing the hacker mindTom Parker; et al2004Syngress
3473Understanding biotechnology : an integrated and cyber-based approachGeorge Acquaah2004Pearson/Prentice Hall
34744th Party Cyber Logistics for Air CargoSung-Chi Chu, Lawrence C. Leung, Yer Van Hui, Waiman Cheung (auth.), Frederick S. Hillier (eds.)2004Springer US
3475Consumer Informatics: Applications and Strategies in Cyber Health CareD. Goldsmith, C. Safran (auth.), Rosemary Nelson RN, BC, CPHIMS, FHIMSS, Marion J. Ball EdD (eds.)2004Springer-Verlag New York
3476Cyber Adversary Characterization: Auditing the Hacker MindTom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost2004Syngress
3477Cyber China: Reshaping National Identities in the Age of InformationFrançoise Mengin (eds.)2004Palgrave Macmillan US
3478Consumer Informatics: Applications and Strategies in Cyber Health CareD. Goldsmith, C. Safran (auth.), Rosemary Nelson RN, BC, CPHIMS, FHIMSS, Marion J. Ball EdD (eds.)2004Springer-Verlag New York
3479Cyber Adversary Characterization: Auditing the Hacker MindTom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost2004Syngress
3480Cyber China: Reshaping National Identities in the Age of InformationFrançoise Mengin (eds.)2004Palgrave Macmillan US
3481Cyber terrorism: a guide for facility managersGustin, Joseph F2004Fairmont Press
3482Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied IdentityJohn Edward Campbell2004Routledge
3483Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied IdentityJohn Edward Campbell2004Routledge
3484Cyberhenge: Modern Pagans on the InternetDouglas E. Cowan2004Routledge
3485Hacktivism and CyberwarsJordan, Tim;Taylor, Paul A2004Routledge
3486Ruling the root: Internet governance and the taming of cyberspaceMueller, Milton2004MIT Press
3487Cyber Selves: Feminist Ethnographies of South Asian WomenRadhika Gajjala2004Altamira Press
3488Race-ing for cybercultures : the performance of minoritarian cultural work as challenge to presumptive whiteness on the internetChristopher McGahan.2004
3489Virtual Worlds: Culture and Politics in the Age of CybertechnologyPramod K. Nayar2004SAGE Publications
3490International Encyclopedia of Systems and CyberneticsCharles Francois2004K. G. Saur
3491Hacktivism and Cyberwars: Rebels with a Cause?Tim Jordan; Paul Taylor2004Routledge
3492Kybernetes: The international journal of systems & cybernetics, Volume 32, Issue 7/8, 20032003
3493Cybersecurity operations handbookJohn W. Rittinghouse, William M. Hancock2003Digital Press
3494Understanding understanding: essays on cybernetics and cognitionHeinz Von Foerster2003Springer
3495Cybercash: The Coming Era of Electronic MoneyGuttmann R. 2003
3496Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environme Gary R. Bunt2003Pluto Press
3497Charles Dickens in Cyberspace: The Afterlife of the Nineteenth Century in Postmodern CultuJay Clayton2003
3498C++ Programming Fundamentals (Cyberrookies Series)Chuck Easttom2003
3499Cyberfeminism and Artificial LifeSarah Kember2003
3500Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus)Charlene W. Billings, Sean M. Grady2003
3501Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus)Charlene W. Billings, Sean M. Grady2003
3502Living with cyberspace: technology and society in the 21st centuryJohn Armitage, Joanne Roberts (editors)2003Continuum
3503Understanding Biotechnology: An Integrated and Cyber-Based ApproachGeorge Acquaah2003
3504Japanese cyberculturesNanette Gottlieb, Mark McLelland (editors)2003Routledge
3505The African American Experience In Cyberspace: A Resource Guide to the Best Web Sites on Black Culture and HistoryAbdul Alkalimat2003
3506Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus)Charlene W. Billings, Sean M. Grady2003
3507The Knowledge Landscapes of CyberspaceDavid Hakken2003
3508Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus)Charlene W. Billings, Sean M. Grady2003
3509The African American Experience In Cyberspace: A Resource Guide to the Best Web Sites on Black Culture and HistoryAbdul Alkalimat2003
3510Cyber Rights: Defending Free speech in the Digital AgeMike Godwin2003The MIT Press
3511The Cyberspace Handbook (Media Practice)Jason Whittaker2003Routledge
3512Cyber Terrorism: A Guide for Facility Managers Joseph F. Gustin2003Fairmont Pr
3513The Psychocybernetic Model of Art Therapy, Second EditionAina O. Nucho2003Charles C Thomas Pub Ltd
3514Virtual Society?: Technology, Cyberbole, RealitySteve Woolgar (ed.)2003Oxford University Press
3515Islam in the digital age : e-jihad, online fatwas and cyber Islamic environmentsGary R Bunt2003Pluto Press
3516Control and Modeling of Complex Systems: Cybernetics in the 21st Century Festschrift in Honor of Hidenori Kimura on the Occasion of his 60th BirthdayChristopher I. Byrnes, Anders Lindquist (auth.), Koichi Hashimoto, Yasuaki Oishi, Yutaka Yamamoto (eds.)2003Birkhäuser Basel
3517Cybersecurity operations handbookJohn W. Rittinghouse, William M. Hancock2003Digital Press
3518Cybersecurity operations handbookJohn W. Rittinghouse, William M. Hancock2003Digital Press
3519Cybercash: The Coming Era of Electronic MoneyRobert Guttmann (auth.)2003Palgrave Macmillan UK
3520Cyberactivism: Online Activism in Theory and PracticeMartha McCaughey, Michael D. Ayers (eds.)2003Routledge
3521Cyberactivism: Online Activism in Theory and PracticeMartha McCaughey, Michael D. Ayers2003Routledge
3522Cyberfeminism: Connectivity, Critique and CreativityRenate Klein, Susan Hawthorne2003Spinifex Press
3523Cybercash the coming era of electronic moneyGuttmann, Robert2003Palgrave Macmillan
3524Virtual Geographies: Cyberpunk At The Intersection Of The Postmodern And Science FictionSabine Heuser2003Brill | Rodopi
3525Self-Games and Body-Play: Personhood in Online Chat and CybersexDennis D. Waskul2003Peter Lang Inc., International Academic Publishers
3526Asian America.Net: Ethnicity, Nationalism, and CyberspaceRachel C. Lee (editor), Sau-ling Cynthia Wong (editor)2003Routledge
3527Asian America.Net: Ethnicity, Nationalism, and CyberspaceRachel C. Lee (editor), Sau-ling Cynthia Wong (editor)2003Routledge
3528The Ontology of Cyberspace: Philosophy, Law, and the Future of Intellectual PropertyDavid R. Koepsell2003Open Court Publishing
3529The Political Mapping of CyberspaceJeremy Crampton2003Edinburgh University Press
3530Cyber Crime Investigator's Field GuideBruce Middleton2002CRC Press
3531Scene of the Cybercrime: Computer Forensics HandbookShinder D.L., Tittel E.2002
3532Sony Advanced Cyber-shot eBookPeter iNova2002Graphics Management Press
3533Cyber ForensicsAlbert Marcella Jr., Robert S. Greenfield2002Auerbach Publications
3534Scene of the CybercrimeDebra Littlejohn Shinder, Ed Tittel2002Syngress
3535Cyber Forensics - A Field Manual For Collecting, Examining, And Preserving Evidence Of ComAlbert J., Jr.; Greenfield, Robert S. Marcella2002Auerbach Publications
3536Cyber crime investigator's field guideBruce Middleton2002CRC Press
3537Cyber crime investigator's field guideBruce Middleton2002CRC Press
3538Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of CompAlbert Marcella Jr., Robert S. Greenfield2002Auerbach Publications
3539Cyber Crime Investigator's Field GuideBruce Middleton2002CRC Press
3540Understanding Understanding: Essays on Cybernetics and CognitionHeinz Von Foerster2002Springer
3541Understanding Understanding: Essays on Cybernetics and CognitionHeinz Von Foerster2002Springer
3542The CyberiadStanislaw Lem2002Mariner Books
3543Understanding Understanding: Essays on Cybernetics and CognitionHeinz Von Foerster2002Springer
3544Cyber Crime Investigator's Field GuideBruce Middleton2002CRC Press
3545New Psycho-CyberneticsMaxwell Maltz2002Prentice Hall Press
3546Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of CompAlbert Marcella Jr., Robert S. Greenfield2002Auerbach Publications
3547Atlas of CyberspaceRob Kitchin, Martin Dodge2002Pearson Education
3548Between Human and Machine: Feedback, Control, and Computing before Cybernetics David A. Mindell2002The Johns Hopkins University Press
3549Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of CompAlbert Marcella Jr., Robert S. Greenfield2002Auerbach Publications
3550The Cyberunion Handbook: Transforming Labor Through Computer Technology Arthur B. Shostak2002M.E. Sharpe
3551Scene of the Cybercrime: Computer Forensics HandbookDebra Littlejohn Shinder, Ed Tittel2002Syngress Publishing
3552Cybersecurity Today and TomorrowNational Research Council2002
3553Creating Cyber Libraries: An Instructional Guide for School Library Media SpecialistsKathleen W. Craver2002
3554From Newspeak to Cyberspeak: A History of Soviet CyberneticsSlava Gerovitch2002
3555Cybersecurity Today and TomorrowNational Research Council2002
3556Naked in Cyberspace: How to Find Personal Information OnlineCarole A. Lane2002
3557From Celluliod to Cyberspace: The Media Arts and the Changing Arts WorldKevin F. McCarthy2002
3558Cybercash: The Coming Era of Electronic MoneyRobert Guttmann2002
3559The Cyber Spellbook: Magick in the Virtual WorldPatricia Telesco, Sirona Knight2002
3560Cyberia: Life in the Trenches of CyberspaceDouglas Rushkoff2002
3561Cyber Spaces Social Spaces: Culture Clash in Computerized ClassroomsIvor F. Goodson, Michele Knobel, Colin Lankshear, J. Marshall Mangan2002
3562Technoculture: From alphabet to cybersexLelia Green2002
3563Building virtual communities: learning and change in cyberspaceK. Ann Renninger, Wesley Shumar2002Cambridge University Press
3564Cybering Democracy: Public Space and the InternetDiana Saco2002University of Minnesota Press
3565Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of CyberspaceDavid Chanoff, Ejovi Nuwere2002William Morrow
3566Cyberia: life in the trenches of hyperspaceDouglas Rushkoff2002Clinamen Press
3567The Cyberiad Stanislaw Lem2002Mariner Books
3568Cyber forensics - a field manual for collecting, examining, and preserving evidence of computer crimesAlbert J. Marcella, Robert Greenfield, editors2002Auerbach
3569Cyber Commerce Reframing: The End of Business Process Reengineering?Uwe G. Seebacher (auth.)2002Springer-Verlag Berlin Heidelberg
3570The Discovery of the Artificial: Behavior, Mind and Machines Before and Beyond CyberneticsRoberto Cordeschi (auth.)2002Springer Netherlands
3571Information Spaces: The Architecture of CyberspaceRobert M. Colomb PhD (auth.)2002Springer-Verlag London
3572Cyber Policy and Economics in an Internet AgeWilliam H. Lehr, Lorenzo M. Pupillo (auth.), William H. Lehr, Lorenzo M. Pupillo (eds.)2002Springer US
3573Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer CrimesAlbert Marcella Jr., Robert S. Greenfield2002Auerbach Publications
3574Understanding Understanding: Essays on Cybernetics and CognitionHeinz Von Foerster2002Springer
3575From Celluloid to Cyberspace: The Media Arts and the Changing Arts WorldKevin F. McCarthy, Elizabeth Heneghan Ondaatje2002RAND Corporation
3576Cybering democracy : public space and the InternetSaco, Diana2002University of Minnesota Press
3577Ruling the Root: Internet Governance and the Taming of CyberspaceMilton Mueller2002MIT Press
3578Cyber Spaces/Social Spaces: Culture Clash in Computerized ClassroomsIvor Goodson, Michele Knobel, Colin Lankshear, J. Marshall Mangan (auth.)2002Palgrave Macmillan US
3579The Complete Internet and World Wide Web Cyber ClassroomDeitel, Harvey M.; Nieto, Tem R.; Deitel, Paul J2002Prentice Hall
3580Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer CrimesAlbert Marcella Jr., Robert S. Greenfield2002Auerbach Publications
3581Understanding Understanding: Essays on Cybernetics and CognitionHeinz Von Foerster2002Springer
3582From Celluloid to Cyberspace: The Media Arts and the Changing Arts WorldKevin F. McCarthy, Elizabeth Heneghan Ondaatje2002RAND Corporation
3583Cybering democracy : public space and the InternetSaco, Diana2002University of Minnesota Press
3584Ruling the Root: Internet Governance and the Taming of CyberspaceMilton Mueller2002MIT Press
3585Cyber Spaces/Social Spaces: Culture Clash in Computerized ClassroomsIvor Goodson, Michele Knobel, Colin Lankshear, J. Marshall Mangan (auth.)2002Palgrave Macmillan US
3586The Complete Internet and World Wide Web Cyber ClassroomDeitel, Harvey M.; Nieto, Tem R.; Deitel, Paul J2002Prentice Hall
3587Cyber-Diplomacy : Managing Foreign Policy in the Twenty-First CenturyEvan H. Potter2002MQUP
3588Cybertypes: Race, Ethnicity, and Identity on the InternetLisa Nakamura2002Routledge
3589Scene of the Cybercrime: Computer Forensics HandbookDebra Littlejohn Shinder, Ed Tittel (editor)2002Syngress Media Inc
3590The Rules for Online Dating: Capturing the Heart of Mr. Right in CyberspaceEllen Fein; Sherrie Schneider2002Gallery Books
3591Reload: Rethinking Women + CybercultureMary Flanagan; Austin Booth2002MIT Press
3592Living with Cyberspace: Technology and Society in the 21st CenturyJohn Armitage; Joanne Roberts (editors)2002Continuum
3593Cyberkids : Youth Identities and Communities in an on-Line WorldSarah Holloway; Gill Valentine2002Taylor & Francis Group
3594Developing Media Literacy in Cyberspace : Pedagogy and Critical Learning for the Twenty-First Century ClassroomJulie D. Frechette2002Greenwood Publishing Group, Incorporated
3595Cyber-Diplomacy: Managing Foreign Policy in the Twenty-First CenturyEvan H. Potter2002McGill-Queen's University Press
3596Crime and the Internet [cybercrime]Wall2001Routledge
3597Cyber Crime Investigator's Field GuideBruce Middleton2001Auerbach Publications
3598Hacking CyberspaceDavid J. Gunkel2001Westview Press
3599Trust in Cyber-societies: Integrating the Human and Artificial PerspectivesRino Falcone, Munindar Singh, Yao-Hua Tan (auth.), Rino Falcone, Munindar Singh, Yao-Hua T2001Springer-Verlag Berlin Heidelberg
3600Cyberpunk and Cyberculture: Science Fiction and the Work of William GibsonDani Cavallaro2001
3601Cyberbranding: Brand Building in the Digital EconomyDeirdre Breakenridge2001
3602Cybereducation: The Future of Long-Distance LearningLarry R., Ph.D. Vandervert, Larisa V. Shavinina, Richard A. Cornell2001
3603Cybernation (Tom Clancy's Net Force, No. 6)Steve Perry, Tom Clancy, Steve Pieczenik2001
3604Beyond Our Control? Confronting the Limits of Our Legal System in the Age of CyberspaceStuart Biegel2001
3605The Ethics of CyberspaceProfessor Cees J Hamelink2001Sage Publications Ltd
3606Vision: The Approach of Biophysics and Neurosciences : Proceedings of the International School of Biophysics Casamicciola, Napoli, Italy, 11-16 October ... on Biophysics and Biocybernetics) (v. 11)Carlo Musio2001
3607An introduction to cyberculturesDavid Bell2001Routledge
3608Information Warfare: How to Survive Cyber AttacksMichael Erbschloe, John Vacca2001
3609Cyberpl@y: Communicating Online (New Technologies New Cultures Series)Brenda Danet2001
3610Sociocybernetics: Complexity, Autopoiesis, and Observation of Social Systems (Controversies in Science)Rudolf F. Geyer, Johannes van der Zouwen2001Praeger
3611Crypto Anarchy, Cyberstates, and Pirate UtopiasPeter Ludlow2001The MIT Press
3612Hacking CyberspaceDavid J. Gunkel2001
3613Lessons from the Cyberspace Classroom: The Realities of Online Teaching (Jossey Bass Higher and Adult Education Series)Rena M. Palloff, Keith Pratt2001
3614Emotions, Qualia, and Consciousness: Proceedings of the International School of Biocybernetics Casamicciola, Napoli, Italy, 19-24 October 1998 (Biophysics and Biocybernetics) International School of Biocybernetics, Alfred W. Kaszniak2001World Scientific Pub Co Inc
3615The Cybernetic HypothesisTiqqun2001
3616Obscene Profits: The Entrepreneurs of Pornography in the Cyber AgeFrederick S. Lane III2001Routledge
3617The Transnational Dimension of Cyber Crime and TerrorismAbraham D. Sofaer; Seymour E. Goodman2001Hoover Institution Press
3618Cyber-Threats, Information Warfare, and Critical Infrastructure Protection : Defending the U.S. HomelandAnthony H. Cordesman; Justin G. Cordesman2001Greenwood Publishing Group, Incorporated
3619CyberpunkAndrew M. Butler2001Pocket Essentials
3620Trust in Cyber-societies: Integrating the Human and Artificial Perspectives (Lecture Notes in Computer Science, 2246)Rino Falcone (editor), Munindar Singh (editor), Yao-Hua Tan (editor)2001Springer
3621TANGLED WEB: Tales of Digital Crime from the Shadows of CyberspaceRichard Power2000Que Corporation
3622Cooperative Information Agents IV - The Future of Information Agents in Cyberspace: 4th InElisabeth André, Thomas Rist (auth.), Matthias Klusch, Larry Kerschberg (eds.)2000Springer-Verlag Berlin Heidelberg
3623Mapping cyberspaceMartin Dodge, Rob Kitchin2000Routledge
3624Democracy in the Digital Age: Challenges to Political Life in CyberspaceAnthony Wilhelm2000
3625Race in cyberspaceBeth E. Kolko, Lisa Nakamura, Gilbert B. Rodman (editors)2000Routledge
3626Race in cyberspaceBeth E. Kolko, Lisa Nakamura, Gilbert B. Rodman (editors)2000Routledge
3627Quantum Cybernetics: Toward a Unification of Relativity and Quantum Theory via Circularly Causal ModelingGerhard Grössing (auth.)2000Springer-Verlag New York
3628Information, Place, and Cyberspace: Issues in AccessibilityDonald G. Janelle, David C. Hodge (auth.), Prof. Dr. Donald G. Janelle, Prof. Dr. David C. Hodge (eds.)2000Springer-Verlag Berlin Heidelberg
3629Cybermarketing. How to use the Internet to market your goods and servicesPauline Bickerton, Matthew Bickerton and Upkar Pardesi (Eds.)2000Butterworth-Heinemann
3630Race in CyberspaceBeth Kolko, Lisa Nakamura, Gilbert Rodman2000Routledge
3631Cybermarketing. How to use the Internet to market your goods and servicesPauline Bickerton, Matthew Bickerton and Upkar Pardesi (Eds.)2000Butterworth-Heinemann
3632Race in CyberspaceBeth Kolko, Lisa Nakamura, Gilbert Rodman2000Routledge
3633Politics as Usual: The Cyberspace `Revolution'Michael Margolis; David Resnick2000Sage Publications, Inc
3634The Cybercultures ReaderDavid Bell2000Routledge
3635Cyberpunk and Cyberculture: Science Fiction and the Work of William GibsonDani Cavallaro2000The Athlone Press
363659.Systems, Man, and CyberneticsJohn G. Webster (Editor) 1999Wiley
3637Cyberpower: an introduction to the politics of cyberspaceTim Jordan1999Routledge
3638Cyber-Marx: Cycles and Circuits of Struggle in High Technology CapitalismNick Dyer-Witheford1999University of Illinois Press
3639Communities in CyberspaceMarc A. Smith1999
3640Cyborgs@Cyberspace?: An Ethnographer Looks to the FutureDavid Hakken1999
3641Libraries, the First Amendment, and Cyberspace: What You Need to KnowRobert S. Peck1999
3642Trust in CyberspaceFred B. Schneider1999National Academy Press
3643Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace and the Clipper ChipProfessor Laura J. Gurak1999Yale University Press
3644Cyberspace Textuality: Computer Technology and Literary TheoryMarie-Laure Ryan1999Indiana University Press
3645CyberAssistant: How to Use the Internet to Get More Done in Less TimePh.D., D.A. Smith-Hemphill1999AMACOM
3646Cyberidentities: Canadian and European Presence in Cyberspace (International Canadian Studies Series)Leen D'Haenens1999University of Ottawa Press
3647How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics N. Katherine Hayles1999University Of Chicago Press
3648Civic Space/Cyberspace: The American Public Library in the Information AgeRedmond Kathleen Molz, Phyllis Dain, Kathleen Molz1999The MIT Press
3649How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and InformaticsN. Katherine Hayles1999University of Chicago Press
3650How we became posthuman : virtual bodies in cybernetics, literature, and informaticsN. Katherine Hayles1999University Of Chicago Press
3651CyberpsychologyÁngel J. Gordo-López, Ian Parker (eds.)1999Macmillan Education UK
3652White Noise: An A–Z of the Contradictions in CybercultureAndrew Calcutt (auth.)1999Palgrave Macmillan UK
3653How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and InformaticsN. Katherine Hayles1999University of Chicago Press
3654How we became posthuman : virtual bodies in cybernetics, literature, and informaticsN. Katherine Hayles1999University Of Chicago Press
3655CyberpsychologyÁngel J. Gordo-López, Ian Parker (eds.)1999Macmillan Education UK
3656White Noise: An A–Z of the Contradictions in CybercultureAndrew Calcutt (auth.)1999Palgrave Macmillan UK
3657Cybersexualities: A Reader in Feminist Theory, Cyborgs and CyberspaceJenny Wolmark1999Edinburgh University Press
3658The Pearly Gates of CyberspaceMargaret Wertheim1999W.W. Norton
3659Identity Theft: The Cybercrime of the MillenniumJohn Q. Newman1999Loompanics Unlimited
3660How we became posthuman: virtual bodies in cybernetics, literature, and informaticsN. Katherine Hayles1999The University of Chicago Press
36611998 IEEE International Conference on Systems, Man, and Cybernetics (1998: San Diego, CaliMan, and Cybernetics (1998 : San Diego, Calif.) IEEE International Conference on Systems1998Institute of Electrical & Electronics Enginee
3662Virtual Futures: Cyberotics, Technology and Posthuman PragmatismJoan Broadhurst Dixon, Eric Cassidy1998Routledge
3663Cyberpirates: A Shadowrun SourcebookJennifer Brandes, Chris Hepler, Michael Mulvihill, FASA Corporation,1998
3664Cyberghetto or cybertopia? : race, class, and gender on the InternetBosah L. Ebo (editor)1998Praeger Publishers
3665Cyberspace Divide: Equality, Agency and Policy in the Information SocietyBrian Loader1998
3666Touch-sensitive: Cybernetic Images and Replicant Bodies in the Post-Industrial AgeSuzanne Livingston1998University of Warwick
3667The Domain Name Handbook; High Stakes and Strategies in CyberspaceEllen Rony, Peter R. Rony1998Publishers Group West
3668GURPS Vehicles: From Chariots to Cybertanks...and Beyond! (GURPS: Generic Universal Role Playing System)David Pulver1998Steve Jackson Games
3669Cybertalk that sellsHerschell Gordon Lewis, Jamie Murphy1998McGraw-Hill Professional
3670Careers for cybersurfers and other online typesMarjorie Eberts, Rachel Kelsey1998McGraw-Hill Professional
3671Cybermarketing: your interactive marketing consultantRegina Brady, Edward Forrest, Richard Mizerski1998NTC Business Books
3672Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial InvestigatorsJames R. Richards1998CRC Press
3673CyberworldsTosiyasu L. Kunii (auth.), Tosiyasu L. Kunii, Annie Luciani (eds.)1998Springer Tokyo
3674Post-Work: The Wages of CybernationStanley Aronowitz (Ed.), Jonathan Cutler (Ed.)1998Routledge
3675Post-Work: The Wages of CybernationStanley Aronowitz (Ed.), Jonathan Cutler (Ed.)1998Routledge
3676Cybersociety 2.0: Revisiting Computer-Mediated Community and TechnologySteven Jones1998SAGE Publications, Inc
3677Aliens in America: Conspiracy Cultures from Outerspace to CyberspaceJodi Dean1998Cornell University Press
3678Global Obscenities: Patriarchy, Capitalism, and the Lure of CyberfantasyZillah Eisenstein1998NYU Press
3679Aliens in America: Conspiracy Cultures from Outerspace to CyberspaceJodi Dean1998Cornell University Press
3680Virtualities: Television, Media Art, and CybercultureMargaret Morse1998Indiana University Press
3681Avatars of the word: from papyrus to cyberspaceJames Joseph O'Donnell1998Harvard University Press
3682Cybertext: Perspectives on Ergodic LiteratureEspen J. Aarseth1997Johns Hopkins University Press
3683Cybernetic Trading StrategiesMurray A. Ruggiero1997Wiley
3684Cybernetic Trading Strategies: Developing a Profitable Trading System with State-of-the-ArMurray A. Ruggiero1997Wiley
3685Cybernetic Trading Strategies: Developing a Profitable Trading System with State-of-the-ArMurray A. Ruggiero1997Wiley
3686The Governance Of Cyberspace: Politics, Technology and Global RestructuringBrian Loader1997
3687Virtual Culture: Identity and Communication in CybersocietySteve Jones1997
3688Virtual culture: identity and communication in cybersocietySteven Jones1997SAGE
3689CyberMeeting: How to Link People and Technology in Your OrganizationJames L. Creighton, James W. R. Adams1997AMACOM
3690Technobrat: Culture in a cybernetic classroomRukmini Bhaya Nair1997HarperCollins
3691Forcing the Factory of the Future: Cybernation and Societal Institutions Bryn Jones1997Cambridge University Press
3692Dave Barry in Cyberspace Dave Barry1997Ballantine Books
3693Elements of Hypermedia Design: Techniques for Navigation & Visualization in CyberspacePeter Gloor (auth.)1997Birkhäuser Basel
3694Defending Cyberspace, and Other MetaphorsMartin C. Libicki1997National Defense University Press
3695Elements of Hypermedia Design: Techniques for Navigation & Visualization in CyberspacePeter Gloor (auth.)1997Birkhäuser Basel
3696Defending Cyberspace, and Other MetaphorsMartin C. Libicki1997National Defense University Press
3697Hamlet on the holodeck : the future of narrative in cyberspaceMurray, Janet Horowitz1997Free Press
3698Chaos & Cyber-KulturLeary, Timothy; Martin, Heinz1997Nachtschatten-Verl.
3699First Cyberfeminist InternationalFirst Cyberfeminist International1997
3700Cybertext: Perspectives On Ergodic LiteratureEspen J. Aarseth1997Johns Hopkins University Press
3701Virtual Politics: Identity and Community in CyberspaceDavid Holmes (editor)1997SAGE Publications Ltd
3702Liber CyberFrater Choronzon1997
3703Borders in Cyberspace: Information Policy and the Global Information InfrastructureBrian Kahin, Charles R. Nesson1997MIT Press
37041996 IEEE International Conference on Systems, Man and CyberneticsIEEE1996Institute of Electrical & Electronics Enginee
3705Cyber Cities M. Christine Boyer1996Princeton Architectural Press
3706Cyber CitiesM. Christine Boyer1996Princeton Architectural Press
3707Cybersong (Star Trek Voyager, No 8)S.N. Lewitt1996
3708Psycho Cybernetics 2000Maxwell Maltz Foundation, Bobbe Sommer1996Prentice Hall Press
3709Cyber Cities: Visual Perception in the Age of Electronic CommunicationM.Christine Boyer1996Princeton Architectural Press
3710Borders in Cyberspace: Information Policy and the Global Information InfrastructureBrian Kahin, Charles Nesson1996The MIT Press
3711CyberLaw: The Law of the InternetJonathan Rosenoer (auth.)1996Springer-Verlag New York
3712Beyond Humanity: CyberEvolution and Future MindsGregory S. Paul, Earl D. Cox1996Delmar Thomson Learning
3713A Sexual Odyssey: From Forbidden Fruit to CybersexKenneth Maxwell (auth.)1996Springer US
3714Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological EmbodimentMike Featherstone, Roger Burrows1996SAGE Publications Ltd
3715Beyond Humanity: CyberEvolution and Future MindsGregory S. Paul, Earl D. Cox1996Delmar Thomson Learning
3716A Sexual Odyssey: From Forbidden Fruit to CybersexKenneth Maxwell (auth.)1996Springer US
3717Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological EmbodimentMike Featherstone, Roger Burrows1996SAGE Publications Ltd
3718The cyber future: 92 ways our lives will change by the year 2025Cornish, Edward1996World Future Society
3719High Noon on the Electronic Frontier: Conceptual Issues in CyberspacePeter Ludlow, Loyd Blankenship1996MIT Press
3720Nattering on the Net: Women, Power, and CybersapceDale Spender1996University of Toronto Press
3721Masters of Deception: The Gang That Ruled CyberspaceMichelle Slatalla, Joshua Quittner1995Harpercollins
3722Decision and Control: The Meaning of Operational Research and Management Cybernetics (Classic Beer Series)Stafford Beer1995Wiley
3723Bloodlust (Cyberpunk Horror Encyclopedia)Stephane Brochu1995Ianus Games
3724GURPS Cyberpunk: High-Tech Low-Life Roleplaying (GURPS: Generic Universal Role Playing System)Loyd Blankenship1995Steve Jackson Games
3725The Media Pavilion / Der Pavillon der Medien: Art and Architecture in the Age of Cyberspace / Eine neue Gleichung zwischen Kunst und ArchitekturHelmut Swiczinsky, Wolf D. Prix (auth.), Prof. Peter Weibel (eds.)1995Springer Vienna
3726Technoscience and CybercultureStanley Aronowitz (Ed.), Barbara Martinsons (Ed.), Michael Menser (Ed.), Jennifer Rich (Ed.)1995Routledge
3727Technoscience and CybercultureStanley Aronowitz (Ed.), Barbara Martinsons (Ed.), Michael Menser (Ed.), Jennifer Rich (Ed.)1995Routledge
3728Postmodern Sublime: Technology and American Writing from Mailer to CyberpunkJoseph Tabbi1995Cornell University Press
3729Neural Network Modeling: Statistical Mechanics and Cybernetic PerspectivesP. S. Neelakanta, Dolores DeGroff1994CRC Press
3730Chaos & Cyber CultureTimothy Leary, Michael Horowitz, Vicki Marshall1994Ronin Pub
3731Remember Me (Cyberpunk)Justin Schmid1994Janus Punlications Inc
3732Cyberia: Life in the Trenches of CyberspaceDouglas Rushkoff1994HarperOne
3733Cybernetics of Prejudices in the Practice of PsychotherapyGianfranco Cecchin1994Karnac Books
3734Flame Wars: The Discourse of CybercultureMark Dery1994Duke University Press
3735Cyberia: Life in the Trenches of CyberspaceDouglas Rushkoff1994HarperOne
3736Cybernetics of Prejudices in the Practice of PsychotherapyGianfranco Cecchin1994Karnac Books
3737Flame Wars: The Discourse of CybercultureMark Dery1994Duke University Press
3738Decision and Control: The meaning of Operational Research and Management CyberneticsStafford Beer1994John Wiley & Sons, Ltd.
3739Neural network modeling : statistical mechanics and cybernetic perspectivesDe Groff, Dolores F.; Neelakanta, Perambur S.1994CRC Press
3740Chaos & Cyber CultureTimothy Leary; Michael Horowitz1994Ronin Publishing (CA)
3741Flame Wars: The Discourse of CybercultureMark Dery (editor)1994Duke University Press
3742Deep Space: The Interplanetary Supplement for Cyberpunk 2020Chris Young, Scott Hedrick1993R. Talsorian Games
3743Necrology: Immortality (Cyberpunk)Justin Schmid1993Ianus
3744Cyberpunk 2020 - Alternate Reality - Grimm's Cybertales SourcebookJustin Schmid1993Ianus Publications Inc.
3745Cyberpunk 2020 - Alternate Reality - Grimm's Cybertales SourcebookJustin Schmid1993Ianus Publications Inc.
3746Constructing a Social Science for Postwar America: The Cybernetics Group, 1946-1953Steve Joshua Heims1993The MIT Press
3747Night City Stories: Atlas Games 1992 : Charting New Realms of Imagination (Cyberpunk)Scott MacKay1992Atlas Games
3748New Perspectives on Cybernetics: Self-Organization, Autonomy and ConnectionismGordon Pask (auth.), Gertrudis van de Vijver (eds.)1992Springer Netherlands
3749Cyberpunk 2020 - The Chrome BeretsThomas R. Kane1992Atlas Games
3750Cyberpunk 2020 - The Chrome BeretsThomas R. Kane1992Atlas Games
3751Cyberpunk: Outlaws and Hackers on the Computer FrontierKatie Hafner, John Markoff1991Simon & Schuster
3752The Night City Guide (Cyberpunk 2020)Colin Fisk1991R Talsorian Games
3753Eurosource: The Euro Theatre Sourcebook for CyberpunkMark Galeotti1991R. Talsorian
3754Chromebook (Cyberpunk RPG)Colin Fisk1991R Talsorian Games
3755Cyberpunk. Outlaws and Hackers on the Computer FrontierKatie Hafner, John Markoff1991Simon & Schuster
3756Cyberspace: First StepsMichael Benedikt1991Mit Pr
3757Cyberspace: First StepsMichael Benedikt1991Mit Pr
3758The Cybernetics GroupSteve Joshua Heims1991The MIT Press
3759Storming the Reality Studio: Casebook of Cyberpunk and Postmodern Science FictionLarry McCaffery, Lawrence F. McCaffery (editor)1991Duke University Press
3760CyberbooksBen Bova1990Tor Books
3761Cyber WayAlan Dean Foster1990
3762The Human Use of Human Beings: Cybernetics and SocietyNorbert Wiener1990
3763Near Orbit (Cyberpunk RPG)Mike Pondsmith1989
3764Cyberpunk Hardwired The SourcebookWalter Jon Williams1989R. Talsorian Games Inc.
3765Cyberpunk Hardwired The SourcebookWalter Jon Williams1989R. Talsorian Games Inc.
3766The Human Use of Human Beings: Cybernetics and SocietyWiener Norbert1989Free Association Books
3767Cybernetics of Living Matter: Nature, Man, InformationIgor' Mikhailovich Makarov1987Mir Publishers
3768Cybernetics of Living Matter: Nature, Man, InformationI. M. Makarov (ed.)1987Mir Publishers
3769Cybernetics and Systems ’86: Proceedings of the Eighth European Meeting on Cybernetics and Systems Research, organized by the Austrian Society for Cybernetic Studies, held at the University of Vienna, Austria, 1–4 April 1986Anna Lewicka-Strzalecka (auth.), Robert Trappl (eds.)1986Springer Netherlands
3770Subjectivity, Information, Systems: An Introduction to a Theory of Relativistic CyberneticsGuy M. Jumarie1986Gordon and Breach
3771The social impact of cybernetics.Dechert, Charles R.1986Simon and Schuster
3772Computers and the Cybernetic SocietyMichael A. Arbib (Auth.)1984Elsevier Inc, Harcourt College Pub
3773Computers and the Cybernetic SocietyMichael A. Arbib (Auth.)1984Elsevier Inc, Harcourt College Pub
3774Cybernetics Today: Achievements, Challenges, ProspectsI. M. Makarov1984Mir Publishers
3775The Cybernetic Foundation of MathematicsTurchin1983
3776The Cybernetic Foundation of MathematicsTurchin1983
3777The Cybernetic Foundation of MathematicsTurchin1983
3778Control and Ability: Towards a Biocybernetics of LanguageWaltraud Brennenstuhl1982John Benjamins Publishing Company
3779Biological Foundations of Linguistic Communication: Towards a Biocybernetics of LanguageThomas T. Ballmer1982John Benjamins Publishing Company
3780Control and Ability: Towards a Biocybernetics of LanguageWaltraud Brennenstuhl1982John Benjamins Publishing Company
3781Biological Foundations of Linguistic Communication: Towards a Biocybernetics of LanguageThomas T. Ballmer1982John Benjamins Publishing Company
3782Systems Research in Health Care, Biocybernetics and Ecology. Proceedings of the International Congress on Applied Systems Research and CyberneticsG.E. Lasker (Eds.)1981Elsevier
3783The Quality of Life: Systems Approaches. Proceedings of the International Congress on Applied Systems Research and CyberneticsGeorge E. Lasker1981Elsevier Inc
3784Systems Approaches in Computer Science and Mathematics. Proceedings of the International Congress on Applied Systems Research and CyberneticsMexico) International Congress on Applied Systems Research and Cybernetics (1980 : Acapulco1981Elsevier Inc, Pergamon Press
3785Systems Research in Health Care, Biocybernetics and Ecology. Proceedings of the International Congress on Applied Systems Research and CyberneticsG.E. Lasker (Eds.)1981Elsevier
3786The Quality of Life: Systems Approaches. Proceedings of the International Congress on Applied Systems Research and CyberneticsGeorge E. Lasker1981Elsevier Inc
3787Systems Approaches in Computer Science and Mathematics. Proceedings of the International Congress on Applied Systems Research and CyberneticsMexico) International Congress on Applied Systems Research and Cybernetics (1980 : Acapulco1981Elsevier Inc, Pergamon Press
3788Brain of the Firm: The Managerial Cybernetics of OrganizationStafford Beer1981John Wiley & Sons Ltd.
3789Current Topics in Cybernetics and Systems: Proceedings of the Fourth International Congress of Cybernetics & Systems 21–25 August, 1978 Amsterdam, The NetherlandsB. D. Josephson (auth.), J. Rose (eds.)1978Springer-Verlag Berlin Heidelberg
3790Sociocybernetics: An actor-oriented social systems approach Vol. 2R. Felix Geyer, Johannes van der Zouwen (auth.), R. Felix Geyer, Johannes van der Zouwen (eds.)1978Springer US
3791Sociocybernetics: An actor-oriented social systems approachR. Felix Geyer, Johannes van der Zouwen (eds.)1978Springer US
3792Sociocybernetics: An actor-oriented social systems approach Vol. 2R. Felix Geyer, Johannes van der Zouwen (auth.), R. Felix Geyer, Johannes van der Zouwen (eds.)1978Springer US
3793Sociocybernetics: An actor-oriented social systems approachR. Felix Geyer, Johannes van der Zouwen (eds.)1978Springer US
3794On the Texture of Brains: An Introduction to Neuroanatomy for the Cybernetically MindedProfessor Dr. Valentino Braitenberg (auth.)1977Springer-Verlag Berlin Heidelberg
3795On the Texture of Brains: An Introduction to Neuroanatomy for the Cybernetically MindedProfessor Dr. Valentino Braitenberg (auth.)1977Springer-Verlag Berlin Heidelberg
3796Psycho-CyberneticsMaxwell Maltz1977Pocket Books
3797Psycho-Cybernetics: A New Way to Get More Living out of LifeMaxwell Maltz1976Pocket
3798Psycho-Cybernetics: A New Way to Get More Living out of LifeMaxwell Maltz1976Pocket
3799Overlapping Tendencies in Operations Research Systems Theory and Cybernetics: Proceedings of an International Symposium, University of Fribourg, Switzerland, October 14–15, 1976Hartmut Bossel, K. F. Müller-Reißmann, Francois Rechenmann (auth.), Ernst Billeter, Michel Cuénod, Salomon Klaczko (eds.)1976Birkhäuser Basel
3800Overlapping Tendencies in Operations Research Systems Theory and Cybernetics: Proceedings of an International Symposium, University of Fribourg, Switzerland, October 14–15, 1976Hartmut Bossel, K. F. Müller-Reißmann, Francois Rechenmann (auth.), Ernst Billeter, Michel Cuénod, Salomon Klaczko (eds.)1976Birkhäuser Basel
3801The cybernetics of human learning and performance: A guide to theory and research Gordon Pask1975Hutchinson Educational
3802Conversation, Cognition and Learning: Cybernetic Theory and Methodology Gordon Pask1975Elsevier Science Ltd
3803The Cyberiad: Fables for the Cybernetic AgeStanislaw Lem1974The Seabury Press
3804Cybernetics: A to ZV. Pekelis1974Mir Publishers
3805The Cybernetic Theory of Development: Mathematical Models for A Re-Evaluation of the Is-Ought ProblemYrjö Ahmavaara1974Kustannusosakeyhtio Tammi
3806Fundamentals of CyberneticsA. Ya. Lerner (auth.)1972Springer US
3807The Cybernetic SocietyRalph Parkman, Thomas F. Irvine, James P. Hartnett and William F. Hughes (Auth.)1972Pergamon Press
3808Fundamentals of CyberneticsA. Ya. Lerner (auth.)1972Springer US
3809The Cybernetic SocietyRalph Parkman, Thomas F. Irvine, James P. Hartnett and William F. Hughes (Auth.)1972Pergamon Press
3810Probability Theory, Mathematical Statistics, and Theoretical CyberneticsM. A. Gavrilov, V. H. Ostianu, A. I. Potekhin (auth.), R. V. Gamkrelidze (eds.)1972Springer US
3811Progress in Mathematics: Probability Theory, Mathematical Statistics, and Theoretical CyberneticsV. V. Kolbin (auth.), R. V. Gamkrelidze (eds.)1971Springer US
3812The Application of Cybernetic Analysis to the Study of International PoliticsStephen David Bryen (auth.)1971Springer Netherlands
3813Mathematical Structure of Finite Random Cybernetic Systems: Lectures Held at the Department for Automation and Information July 1971Silviu Guiasu (auth.)1971Springer-Verlag Wien
3814The Application of Cybernetic Analysis to the Study of International PoliticsStephen David Bryen (auth.)1971Springer Netherlands
3815Mathematical Structure of Finite Random Cybernetic Systems: Lectures Held at the Department for Automation and Information July 1971Silviu Guiasu (auth.)1971Springer-Verlag Wien
3816Cybernetics, Art, and IdeasJasia Reichardt1971Studio Vista
3817Information and Reflection: On some Problems of Cybernetics and how Contemporary Dialectical Materialism Copes with ThemPeter Paul Kirschenmann (auth.)1970Springer Netherlands
3818Introduction to Economic CyberneticsOskar Lange (Auth.)1970Elsevier Ltd, Pergamon Press Reprint
3819Introduction to Economic CyberneticsOskar Lange (Auth.)1970Elsevier Ltd, Pergamon Press Reprint
3820cdc :: cyber :: lang :: fortran :: 60280400A 7600 FORTRAN Dec70Control Data Corporation1970
3821Research and Development in USSR CyberneticsCCM Information Corporation1969Research & Microfilm Publications
3822An Approach to Cybernetics Gordon Pask1968Hutchinson and Co.
3823Psycho-CyberneticsMaxwell Maltz1967Wilshire Book Co
3824Psycho-CyberneticsMaxwell Maltz1967Wilshire Book Co
3825Introduction to cyberneticsW Ross Ashby1966Science Editions - John Wiley & Sons Inc
3826An introduction to cyberneticsW Ross Ashby1966Science Editions - John Wiley & Sons Inc
3827Cybernetics and DevelopmentMichael J. Apter, and G. A. Kerkut (Auth.)1966Pergamon Press
3828Decision and Control: The Meaning of Operational Research and Management CyberneticsStafford Beer1966John Wiley & Sons Inc
3829Cybernetics and DevelopmentMichael J. Apter, and G. A. Kerkut (Auth.)1966Pergamon Press
3830Decision and Control: The Meaning of Operational Research and Management CyberneticsStafford Beer1966John Wiley & Sons Inc
3831Russian-English Dictionary and Reader in the Cybernetical SciencesSamuel Kotz1966Academic Press by University of Toronto
3832Decision and Control: The meaning of Operational Research and Management CyberneticsStafford Beer1966John Wiley & Sons
3833Cybernetics Within UsYelena Saparina; Vladimir Talmy1966Mir (Peace) Publishers
3834Cybernetics Within UsYelena Saparina1966Mir Publishers
3835Cybernetics of the Nervous SystemNorbert Wiener and J.P. Schadé (Eds.)1965Elsevier Science
3836Cybernetics: or the Control and Communication in the Animal and the MachineNorbert Wiener1965The MIT Press
3837Cybernetics, Second Edition: or the Control and Communication in the Animal and the MachineNorbert Wiener1965MIT
3838God and Golem: A Comment on Certain Points where Cybernetics Impinges on ReligionNorbert Wiener1964The M.I.T. Press
3839God and Golem: A Comment on Certain Points where Cybernetics Impinges on Religion Norbert Wiener1964The M.I.T. Press
3840God and Golem, Inc: A Comment on Certain Points where Cybernetics Impinges on ReligionNorbert Wiener1964The M.I.T. Press
3841Cybernetics: or the Control and Communication in the Animal and the Machine: Or Control and Communication in the Animal and the MachineWiener1961MIT Press
3842Psycho-CyberneticsMaltz, Maxwell1960Prentice-Hall
3843Psycho-CyberneticsMaltz, Maxwell1960Prentice-Hall
3844Cybernetics and ManagementStafford Beer1959The English Universities Press
3845What is Cybernetics?Georges Théodule Guilbaud1959Criterion Books
3846Introduction to cybernetics Ashby W.R.1957
3847Thinking by Machine: A Study of CyberneticsPierre de Latil1957Houghton Mifflin Company
3848An Introduction to CyberneticsW. ROSS ASHBY1956Chapman & Hall
3849The next step in management ... : an appraisal of cybernetics.1955GE
3850Engineering cyberneticsH. S. Tsien1954Royal Society of Chemistry
3851The Human use of human beings, cybernetics and society. Norbert Wiener ...Norbert Wiener1950Houghton Mifflin Co.
3852The Human Use of Human Beings - Cybernetics and SocietyNorbert Wiener1950The Riverside Press
3853Psycho-CyberneticsMaxwell Maltz0Perigee
3854Cyber dragon : inside China’s information warfare and cyber operationsDean Cheng0Praeger
3855Linguistic and Cultural Diversity in Cyberspace. Proceedings of the International Conference (Yakutsk, Russian Federation, 2-4 July, 2008) E. Kuzmin, E. Plys (eds.)0
3856complete-cyber-cecurity-course V1nathan house0
3857The Complete Cyber Security Course - Volume 1Nathan House0
3858Hands-On Cybersecurity for Finance Identify vulnerabilities and secure your financial services from security breachesErdal Ozkaya, Milad Aslaner0
3859The Cyber Plumber’s HandbookBrennon Thomas0Opdisk LLC
3860Cyber AttacksEdward Amoroso0
3861Summary of Discussions At a Planning Meeting On Cyber-security and the Insider Threat to Classified InformationNational Research Council (U.S.)0National Academy Press
3862Logical Foundations of Cyber-Physical SystemsAndr?© Platzer0
3863The Cyberspace HandbookRoutledge
3864Scene of the CyberCrime - Computer Forensics HandbookSyngress
3865Cyberpunk 2020 Sub
3866Kybernetes The International Journal of Systems, Cybernetics and Management Science VolumeGuest Editors: Monika Silvia Broecker and Georg Ivanovas
3867The International Journal of Systems & Cybernetics, Volume 32, Number 5 6, 2003Editor Yi Lin
3868The Economist - CyberWarThe Economist
3869The Unseen Cyber WarAustin Wright
3870Cyberspace Job Search Kit 2001-2002: The Complete Guide to Online Job Seeking and Career Information (Cyberspace Job Search Kit)Mary B. Nemnich, Fred Edmund Jandt
3871Contemporary cybernetic and systemic researchesBrian H. Rudall
3872The International Journal of Systems & Cybernetics, Volume 31, Number 9 10, 2002Yi Lin
3873Cyberpunk 2.0 Fiction and ContemporaryHerlander Elias
3874Semiotic Bodies, Aesthetic Embodiments, and CyberbodiesWinfried Nöth
3875THE VIRTUAL BATTLEFIELD PERSPECTIVES ON CYBER WARFARE-2009Raphael C.-W. Phan and Jianying Zhou
3876First Person Shooter: The Subjective CyberspaceHerlander Elias
3877Rise and Fall of Cybergold. COMJohn E. Peltier, Michael J. Gallivan
3878An Introduction to Video Editing with Cyberlink PowerDirector 10 Ultra Cyberlink
3879Cyberabad DaysIan McDonald
3880Inside Cyber WarfareJeffrey Carr
3881Cyber Warfare: Techniques, Tactics and Tools for Security PractitionersJason Andress, Steve Winterfeld
3882The digital cast of being : metaphysics, mathematics, cartesianism, cybernetics, capitalism, communicationMichael Eldred
3883The digital cast of being : metaphysics, mathematics, cartesianism, cybernetics, capitalism, communicationMichael Eldred
3884Cybersecurity For Dummies. Palo Alto Networks EditionMiller L.C.
3885High-Performance Embedded Computing: Applications in Cyber-Physical Systems and Mobile ComputingWolf M.
3886The Decision to Attack: Military and Intelligence Cyber Decision-MakingBrantly Aaron Franklin, Keller William.
3887The Decision to Attack: Military and Intelligence Cyber Decision-MakingBrantly Aaron Franklin, Keller William.
3888Cyber SecurityCarter Michael.
3889Cyber SecurityCarter Michael.
3890The Complete Guide to Cybersecurity Risks and ControlsKohnke Anne, Shoemaker Dan, Sigler Ken.
3891Constructing Soviet Cultural Policy: Cybernetics and Governance in Lithuania after World War IIRindzeviciute E.
3892Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response GuideAyala Luis.
3893Applied Cryptography for Cyber Security and Defense. Information Encryption and CypheringNemati H.R., Yang L.
3894The Politics of Scientific Governance in an Authoritarian Regime: Purification and Hybridisation of Soviet CyberneticsRindzeviciute E.
3895Cybersecurity for BeginnersMeeuwisse Rauf.
3896Cybersecurity for BeginnersMeeuwisse Rauf.
3897etc. Insider Attack and Cyber Security. Beyond the HackerStolfo S.J.
3898Strategic Cyber SecurityGeers K.
3899Cyber Security and Politically, Socially and Religiously Motivated Cyber AttacksCornish Paul.
3900Global Cyber Security - Thinking About The Niche for NATOTikk Eneken.
3901The Tallinn Manual on the International Law Applicable to Cyber Warfare????? ?. (???.)
3902Are Protection and Control Engineers Provisioned with the Tools They Need to Combat Cyber-initiated Intrusions?Holstein Dennis K., Newton W.
3903SERA as a complex approach to provide architecture of cyber-security based on international security standards into critical energy systemsKukanov Aleksey.
3904Beyond Cyberpunk: New Critical PerspectivesMurphy Graham J., Vint Sherryl (eds.)
3905Tom and Co's Adventures in CyberspaceIerace Gaia.
3906Handbook of Cyber-Development, Cyber-Democracy, and Cyber-DefenseElias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos (eds.)Springer International Publishing
3907Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking WorldRogers, VanessaJessica Kingsley Publishers
3908Biologically Inspired Cognitive Architectures (BICA) for Young Scientists : Proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity (FIERCES 2017)Klimov, Valentin V.; Samsonovich, Alexei V
3909Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network ForensicsNik Alleyne
3910Cyber Survival ManualNick SelbyWeldon Owen
3911Cybersecurity Field ManualMatthew Twells, Cember Friend (editor)
3912How to Draw Fantasy Females: Create Sexy Cyberpunks, Seductive Supergirls, and Raunchy All-Action HeroinesChris Patmore
3913Cyber Security Education: Principles and PoliciesGreg Austin
3914Psycho-Cybernetics: Updated and Expanded Paperback – November 3, 2015Maxwell Maltz
3915Handbook of Research on Multimedia Cyber SecurityGupta BrijInformation Science Reference
3916Cyber Security: ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security PractitionersDavid White
3917Cyber-HumansWoodrow BarfieldSpringer International Publishing
3918Biometric-Based Physical and Cybersecurity SystemsMohammad S. Obaidat;Issa Traore;Isaac WoungangSpringer International Publishing
3919Visual Communication for Cybersecurity: Beyond Awareness to AdvocacyNicole van Deursen
3920Flatline Constructs: Gothic Materialism and Cybernetic Theory-FictionMark Fisher
3921Cyber OperationsOLeary, MikeApress
3922CyberstrongAjay Singh
3923APT-28 At the Center of the Russian Cyber StormFireEye, Inc.
3924Constructing cybersecurityUnknown
3925Blockchain for Cyberphysical SystemsAli Dorri
3926Thinking about CybersecurityThe Great Courses
3927Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics - Theories and Applications
3928Adversarial Tradecraft in Cybersecurity(2021)[Borges][9781801076203]Borges
3929The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)Jeremy Martin, Richard Medlin, Nitin Sharma, LaShanda Edwards, Justin Casey, Mossaraf Khan, Ambadi M.P, Vishal Belbase
3930Informatics and Cybernetics in Intelligent Systems: Proceedings of 10th Computer Science On-line Conference 2021, Vol. 3Radek SilhavySpringer Nature
3931Muslim Parents and CybercultureSaheeh International
3932Backdoor: Bypassing the Gatekeepers in Cybersecurity
3933cybernetics or control and communications in the animal and the behaviournorbert wienermit press
3934The Prophets in CyberiaJ W
3935Zero To Mastery In Information Security And Cyber Laws: No.1 Book To Become Zero To Hero In Information Security And Cyber Laws, This Amazing Book Covers ... Edition (Zero To Mastery Computer Series)Rajiv Jain, Vei Publishing
3936Security of Biochip Cyberphysical SystemsShayan Mohammed; Sukanta Bhattacharjee; Yong-Ak Song; Krishnendu Chakrabarty; Ramesh KarriSpringer International Publishing
3937Improving Social Maturity of Cybersecurity Incident Response TeamsGMU
3938Cybersecurity Ops with bash: attack, defend and analyze from the command linePaul Troncone, Carl Albing
3939Cybersecurity and third-party risk: third party threat huntingGregory C. Rasner
3940Connected Places: cyber security principles.National Cyber Security Centre
3941Reinventing CybersecurityJasmine Henry; Alison Gianotto; Coleen Shane; Tracy Bannon; Dr. Meg Layton; Breanne Boland; Angela Marafino; Latha Maripuri; Carlota Sage; Carla Sun
3942Network Forensics: Tracking Hackers Through CyberspaceSherri Davidoff; Jonathan HamPrentice Hall
3943Computer Forensics and Cyber Crime: An IntroductionMarjie BritzPrentice Hall
3944CyberbullyingLucy R. BettsPalgrave Macmillan UK, London
3945International Perspectives on Cyberbullying : Prevalence, Risk Factors and InterventionsAnna Costanza Baldry; Catherine Blaya; David P. FarringtonSpringer International Publishing
3946Cybersecurity and Digital Forensics: Challenges and Future ParadigmsAbdulrahman Yarali, Randall Joyce, Faris Sahawneh
3947Cybersecurity and Digital Forensics: Challenges and Future ParadigmsAbdulrahman Yarali, Randall Joyce, Faris Sahawneh
3948How to get a job in cyber security earning six figuresLina Lau
3949Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably ParanoidSeth EnokaNo Starch Press
3950A British Hacker in America: The story of PMF & 'Operation Cybersnare' - The U.S. Secret Service's first online stingPmf
3951Cybercrime in the Pandemic Digital Age and Beyond (Palgrave Studies in Cybercrime and Cybersecurity)Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), Laurie Yiu-Chung Lau (editor)Palgrave Macmillan
3952Black Falcons: A cyberpunk novelGinny Young
3953The Complete Cyber Seed Compendium: Books 1-5Craig A. Falconer
3954AI Models for Blockchain-Based Intelligent Networks in IoT Systems: Concepts, Methodologies, Tools, and Applications (Engineering Cyber-Physical Systems and Critical Infrastructures, 6)Bharat Bhushan (editor), Arun Kumar Sangaiah (editor), Tu N. Nguyen (editor)Springer
3955Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrimeNearchos NearchouPackt Publishing
3956Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity programJason BrownPackt Publishing
3957Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity programJason BrownPackt Publishing
3958The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacksJeremy WittkopPackt Publishing
3959The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacksJeremy WittkopPackt Publishing
3960Big Breaches: Cybersecurity Lessons for EveryoneNeil Daswani, Moudy Elbayadi
3961Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications)Stanislav Abaimov; Maurizio Martellini
3962Cyber Security and Laws: by Ques10Ques10 Team
3963Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd EditionYuri Diogenes, Dr. Erdal OzkayaPackt Publishing
3964Cyber Crisis: Protecting Your Business from Real Threats in the Virtual WorldEric ColeBenBella Books
3965IWC HACKING LAB USING KALI: Build a portable Cyber Live Fire Range (CLFR) - Second Edition (IWC-Lab: Kali Book 3)Jeremy Martin
3966Managing Cybersecurity Risk: Book 3Jonathan Reuvid
3967Web App Hacking: Carnage & Pwnage (Cyber Secrets)Jeremy Martin; Carlyle Carlyle; Vishal Belbase; Frederico Ferreira; Nitin Sharma; Shoriful Islam; Yang Sze Jue; Daniel TraciIndependently Published
3968Fundamentals of Cyber SecurityMayank Bhushan
3969Bitskrieg: The New Challenge of CyberwarfareJohn ArquillaPolity
3970Cybersecurity in the 21-st Century: Cybersecure microcircuits as the hardware base of cybersecure APCS.Anatoly Belous, Vitaly Saladukha
3971Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity FrameworkCynthia Brumfield
3972Effective Cybersecurity: A Guide to Using Best Practices and StandardsWilliam StallingsAddison-Wesley Professional
3973Maritime Cybersecurity: A Guide for Leaders and ManagersGary Kessler, Steven Shepard
3974Cyber Security: Python for Penetration TestingTravis Czech
3975Listening In: Cybersecurity in an Insecure AgeSusan LandauYale University Press
3976Cybersecurity Management: An Organizational and Strategic ApproachNir Kshetri
3977From CIA to APT: An Introduction to Cyber SecurityAmoroso and Amoroso, Matthew Amoroso
3978Cybersecurity: A Self-Teaching IntroductionC. P. Gupta, K. K. GoyalMercury Learning and Information
3979Introduction To Cybersecurity (Zoohra Non Fiction series Book 32)Hicham and Mohamed Ibnalkadi
3980Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail UsEugene Spafford, Leigh Metcalf, Josiah DykstraAddison-Wesley Professional
3981Cyber Curiosity: A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern WorldLakeidra Smith
3982PYTHON: THE NO-NONSENSE GUIDE: Learn Python Programming Within 12 Hours! (Including a FREE Python Cheatsheet & 50+ Exercises With Original Python Files ) (Cyberpunk Programming Series Book 1)Cyberpunk University
3983Practical Cyber Security for Extremely Busy People: Protect yourself, your family, and your career from online exploitationDaniel Farber Huang
3984CybercrimeTodd WadeBCS, The Chartered Institute for IT
3985Computer Engineering:2 books in 1: Linux for Beginners+Cyber Security, How to Win with Cyberattacks and How to Use Linux Like a ProJohn Snowden
3986CyberSecurity Demystified: A compact reference guide to cybersecurityPeter Theobald
3987CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT ITWaleed Umar
3988CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT ITWaleed Umar
3989Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for BeginnersAlexander J. Roxon
3990Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidentsDr. Erdal OzkayaPackt Publishing
3991Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics – 2018 (Lecture Notes in Networks and Systems Book 48)Gheorghe I. Gheorghe
3992Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics – 2018 (Lecture Notes in Networks and Systems, 48)Gheorghe I. Gheorghe (editor)
3993Breached!: A Cautionary Tale of Cybersecurity and IntrigueDave Millier
3994Cybersecurity essentials - Beginners guide: Step-by-step manual with ten methods to protect your privacy onlineDavid Costa, Gianluca Amadio
3995Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defenseJean Nestor M. DahjPackt Publishing
3996Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker AttacksAlan Grid
3997Easy Steps to Managing CybersecurityJonathan Reuvid (editor)Legend Press
3998Understanding Cyber Threats and AttacksPh.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor)Nova Science Pub Inc
3999Cybercrime and Preventive Measures: A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition)Priyanka Tomar, Sanjay Gautam
4000Philosophical Foundations of CyberneticsFrank Honywill GeorgeCRC Press
4001Dark Hero of the Information Age: In Search Of Norbert Wiener--Father of CyberneticsFlo Conway, Jim SiegelmanBasic Books
4002Dark Hero of the Information Age: In Search Of Norbert Wiener--Father of CyberneticsFlo Conway, Jim SiegelmanBasic Books
4003Dark Hero of the Information Age: In Search Of Norbert Wiener--Father of CyberneticsFlo Conway, Jim SiegelmanBasic Books
4004Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity LandscapeSounil Yu; Dan Geer; Wendy Nather
4005Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certificationsAlan Calder
4006Cybernetics Within UsYelena SaparinaMir Publishers
4007Hybrid Threats, Cyberterrorism and CyberwarfareMohamed Amine Ferrag (editor), Ioanna Kantzavelou (editor), Leandros Maglaras (editor), Helge Janicke (editor)CRC Press; 1 edition
4008Hybrid Threats, Cyberterrorism and CyberwarfareMohamed Amine Ferrag (editor), Ioanna Kantzavelou (editor), Leandros Maglaras (editor), Helge Janicke (editor)CRC Press; 1 edition
4009Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystemSoma Halder, Sinan OzdemirPackt Publishing
4010Data Analytics: Systems Engineering - Cybersecurity - Project ManagementChristopher GrecoMercury Learning and Information
4011Building a Career in Cybersecurity: The Strategy and Skills You Need to SucceedYuri DiogenesAddison-Wesley
4012Escalation Dynamics in Cyberspace (BRIDGING THE GAP SERIES)Erica D. Lonergan, Shawn W. LonerganOxford University Press
4013Cyber Security Intelligence and AnalyticsZheng XuSpringer Nature
4014Cyber Security Intelligence and AnalyticsZheng XuSpringer Nature
4015Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Engineering Cyber-Physical Systems and Critical Infrastructures, 4)Ahmed A. Abd El-Latif (editor), Yassine Maleh (editor), Wojciech Mazurczyk (editor), Mohammed ELAffendi (editor), Mohamed I. Alkanhal (editor)Springer
4016Advance Cyber SecurityManmohan Singh, Priyanka Sharma, Rahul SharmaArcler Press
4017Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))William Easttom IIPearson IT Certification
4018Practical Guide to Digital Forensics Investigations, A (Pearson IT Cybersecurity Curriculum)Darren HayesPearson IT Certification
4019Transactions on Computational Science XXXII: Special Issue on Cybersecurity and Biometrics (Lecture Notes in Computer Science Book 10830)Marina L. Gavrilova; C.J. Kenneth Tan; Alexei Sourin
4020Cyberhate: The Far Right in the Digital AgeLexington Books
4021Building a Cyber Risk Management Program: Evolving Security for the Digital AgeBrian Allen, Brandon Bapst, Terry HicksO'Reilly Media
4022Pathology of Learning in Cyber Space: Concepts, Structures and Processes (Studies in Systems, Decision and Control Book 156)Sayed Hadi Sadeghi
4023Artificial Intelligence in Cyber-Physical Systems (Wireless Communications and Networking Technologies)Anil Kumar Sagar (editor), Parma Nand (editor), Neetesh Kumar (editor), Sanjoy Das (editor)CRC Press
4024Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategiesDwayne NatwickPackt Publishing
4025Cyber-Laundering: International Policies and PracticesNathalie RébéWorld Scientific
4026Regulating Cyber Technologies: Privacy vs SecurityNathalie RébéWorld Scientific
4027Cybersecurity Essentials: The Beginner's Guide | Cybersecurity Textbook | Cybersecurity for Beginners | Cybersecurity Books for Beginners for Certification | Cybersecurity for Libraries and ArchivesOjula Technology Innovations
4028Cybersecurity Essentials: The Beginner's Guide | cybersecurity Textbook | cybersecurity for Beginners | Cybersecurity Books for Beginners for Certification | Cybersecurity for Libraries and ArchivesOjula Technology Innovations
4029Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices (Fat-Free Technology Guides)Nicholas Marsh
4030Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices (Fat-Free Technology Guides)Nicholas Marsh
4031OSINT Investigations: We know what you did that summer (Cyber Secrets)Jeremy Martin; Carolina Christofoletti; Diana Prušová; Mirjana Ivanic; Luna Winchester; Bonnie Betz; Khadija Naz; Prabhu Rajasekar; Zack Jones; LaShanda Edwards
4032CHINA IN THE CYBER DOMAINMajor General PK MallickPRINTS PUBLICATIONS PVT LTD
4033Smart Applications with Advanced Machine Learning and Human-Centred Problem Design (Engineering Cyber-Physical Systems and Critical Infrastructures Book 1)D. Jude Hemanth
4034Digital Earth: Cyber Threats, Privacy and Ethics in an Age of ParanoiaSarah Katz
4035Parallel Population and Parallel Human: A Cyber-Physical Social Approach (IEEE Press Series on Systems Science and Engineering)Peijun Ye, Fei-Yue WangWiley-IEEE Press
4036Good Digital Hygiene: A Guide to Staying Secure in CyberspaceEduardo Gelbstein
4037Cyberphysical Infrastructures in Power Systems: Architectures and VulnerabilitiesMagdi S Mahmoud; Haris M. Khalid; Mutaz M. Hamdan
4038From Parchment to Cyberspace: Medieval Literature in the Digital AgeStephen G. NicholsPeter Lang Incorporated, International Academic Publishers
4039From Parchment to Cyberspace: Medieval Literature in the Digital Age (Medieval Interventions)Stephen G. NicholsPeter Lang Inc., International Academic Publishers
4040Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and TechniquesVinny TroiaWiley
4041Computation-Aware Algorithmic Design for Cyber-Physical SystemsMaria Prandini; Ricardo G. SanfeliceSpringer International Publishing
4042Project: Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed Vol 2Robert Duncan
4043Blockchain for Cybersecurity in Cyber-Physical Systems
4044Cyber security. The complete guide to cyber threats and protectionDavid Sutton
4045CYBERSECURITY FOR SMALL NETWORKSSeth Enoka
4046Cybersecurity Threats, Malware Trends, and StrategiesTim Rains
4047Python for CybersecurityHoward E. Poston lll
4048Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2020 (Technologien für die intelligente Automation)Jürgen Beyerer; Alexander Maier; Oliver Niggemann
4049Digital Transformation, Cyber Security and Resilience of Modern Societies (Studies in Big Data, 84)Todor Tagarev; Krassimir T. Atanassov; Vyacheslav Kharchenko; Janusz Kacprzyk
4050Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive AdvantageBob Chaput
4051Lego instructions: Tesla cybertruck (alternative bricks)
4052Cybertorture and CyberharassmentTolga Yalur
4053Cyber Threat HuntingNadhem AlFardan
4054CIS Minimum Cybersecurity controls