1 | Philosophy Of Cybersecurity | Lukasz Olejnik, Artur Kurasinski | 2024 | CRC Press | Taylor & Francis Group | |
2 | Cybercrime And Cybersecurity | Paul A. Watters | 2024 | Routledge | Taylor & Francis Group | |
3 | Psychocybernetics 2024 | zeroual khalid | 2024 | khalid zeroual | |
4 | The Latest Developments and Challenges in Biomedical Engineering:Proceedings of the 23rd Polish Conference on Biocybernetics and Biomedical Engineering, Lodz, Poland, September 27–29, 2023 | Pawel Strumillo; Artur Klepaczko; Michal Strzelecki; Dorota Bociaga | 2024 | Springer Nature Switzerland | |
5 | Intelligent Techniques for Cyber-Physical Systems | Mohammad Sajid, Anil Kumar Sagar, Jagendra Singh, Osamah Ibrahim Khalaf, Mukesh Prasad | 2024 | CRC Press | |
6 | Intelligent Approaches to Cyber Security | Narendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli | 2024 | CRC Press | |
7 | Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner | Seth James Nielson | 2024 | Apress | |
8 | Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner | Seth James Nielson | 2024 | Apress | |
9 | CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003) | Mya Heath | 2024 | McGraw Hill LLC | |
10 | The Business of Cyber: Why You Should Question What Your Security Team Are Telling You | Peter Fagan | 2024 | CRC Press | |
11 | Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security | Jit Sinha | 2024 | Orange Education Pvt Ltd, AVA™ | |
12 | CC Certified in Cybersecurity Study Guide (Sybex Study Guide) | Mike Chapple | 2024 | Sybex | |
13 | Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security | Jit Sinha | 2024 | Orange education pvt ltd | |
14 | Enterprise Cyber Risk Management as a Value Creator : Leverage Cybersecurity for Competitive Advantage | Bob Chaput | 2024 | Apress | |
15 | Reconstructing Feminism Through Cyberfeminism (Studies in Critical Social Sciences, 275) | Gzde Ersz (editor), Gkmen Kantar (editor), Meltem Ince Yenilmez (editor) | 2024 | Brill Academic Pub | |
16 | Ultimate Cyberwarfare for Evasive Cyber Tactics: Unravel the Techniques of Cyberwarfare, Hacktivism and Asymmetric Conflicts for Tactical Excellence with Real-world Use Cases and Strategic Insights | Chang Tan | 2024 | Orange Education Pvt Ltd, AVA™ | |
17 | Great Power Cyber Competition (Routledge Advances in Defence Studies) | David V. Gioe (editor), Margaret W. Smith (editor) | 2024 | Routledge | |
18 | Great Power Cyber Competition (Routledge Advances in Defence Studies) | David V. Gioe (editor), Margaret W. Smith (editor) | 2024 | Routledge | |
19 | Ultimate Cyberwarfare for Evasive Cyber Tactics | Chang Tan | 2024 | Orange education pvt ltd | |
20 | An Introduction to Cyberpsychology | Gráinne Kirwan, Irene Connolly, Hannah Barton, Marion Palmer | 2024 | Routledge | |
21 | Artificial Intelligence for Cyber Defense and Smart Policing | S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand | 2024 | CRC Press | |
22 | Linux Hacking: A Beginner's Guide to Mastering CyberSecurity and Ethical Hacking with Linux Tools and Techniques | VERA POE | 2024 | Independently Published | |
23 | An Introduction to Cyberpsychology (BPS Core Textbooks Series) | Gráinne Kirwan (editor), Irene Connolly (editor), Hannah Barton (editor), Marion Palmer (editor) | 2024 | Routledge | |
24 | The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity. | M. A. Jabbar, Sanju Tiwari, Subhendu Kumar Pani, Stephen Huang | 2024 | CRC Press | |
25 | Introduction to Cybersecurity in the Internet of Things | Keke Gai, Jing Yu, Liehuang Zhu | 2024 | CRC Press | |
26 | Cybernetics for the 21st Century Vol. 1: Epistemological Reconstruction (Philosophy, Art and Technology) | Yuk Hui | 2024 | Hanart Press | |
27 | Advanced Product Management Series: Cybersecurity | Alex Cowan | 2024 | Cooke & McDouglas | |
28 | Cyber Defense Magazine - February 2024 | Cyber Defense Magazine | 2024 | Cyber Defense Magazine | |
29 | Beyond Digital Distraction: Educating Today's Cyber Student (Digital Education and Learning) | Kurt C. Schuett | 2024 | Palgrave Macmillan | |
30 | Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends | Andi Fitriah Abdul Kadir , Arash Habibi Lashkari , Mahdi Daghmehchi Firoozjaei | 2024 | Springer Cham | |
31 | Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends | Andi Fitriah Abdul Kadir; Arash Habibi Lashkari; Mahdi Daghmehchi Firoozjaei | 2024 | Springer Cham | |
32 | Building Cybersecurity Applications with Blockchain and Smart Contracts | Nour El Madhoun, Ioanna Dionysiou, Emmanuel Bertin | 2024 | Springer Cham | |
33 | Building Cybersecurity Applications with Blockchain and Smart Contracts | Nour El Madhoun; Ioanna Dionysiou; Emmanuel Bertin | 2024 | Springer Cham | |
34 | Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 | Hamid Jahankhani | 2024 | Springer | |
35 | Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023 | Hamid Jahankhani | 2024 | Springer | |
36 | The Cybernetic Border: Drones, Technology, and Intrusion | Iván Chaar López | 2024 | Duke University Press Books | |
37 | Cyberspace, Cyberterrorism and the International Security in the Fourth Industrial Revolution: Threats, Assessment and Responses (Advanced Sciences and Technologies for Security Applications) | Reza Montasari | 2024 | Springer | |
38 | Ransomware and Cyber Extortion: Response and Prevention | Sherri Davidoff, Matt Durrin, Karen Sprenger | 2024 | Pearson | |
39 | Computer Security. ESORICS 2023 International Workshops: CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023, Revised ... I (Lecture Notes in Computer Science, 14398) | Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens-Boulahia (editor), Costas Lambrinoudakis (editor), Joaquin Garcia-Alfaro (editor), Guillermo Navarro-Arribas (editor), Pantaleone Nespoli (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor) | 2024 | Springer | |
40 | Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data, 117) | Haitham M. Alzoubi (editor), Muhammad Turki Alshurideh (editor), Taher M. Ghazal (editor) | 2024 | Springer | |
41 | Cognitive Computing and Cyber Physical Systems: 4th EAI International Conference, IC4S 2023, Bhimavaram, Andhra Pradesh, India, August 4-6, 2023, Proceedings | Prakash Pareek (editor), Nishu Gupta (editor), M. J. C. S. Reis (editor) | 2024 | Springer | |
42 | Cybercrime and Digital Deviance | Roderick S. Graham, 'Shawn K. Smith | 2024 | Routledge | |
43 | Cognitive Computing and Cyber Physical Systems: 4th EAI International Conference, IC4S 2023, Bhimavaram, Andhra Pradesh, India, August 4-6, 2023, ... and Telecommunications Engineering) | Prakash Pareek (editor), Nishu Gupta (editor), M. J. C. S. Reis (editor) | 2024 | Springer | |
44 | ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills | Clint Bodungen | 2024 | Packt Publishing Pvt Ltd | |
45 | Industrial Cyber-Physical Systems: Advancing Industry 4.0 from Vision to Application (Markt- und Unternehmensentwicklung Markets and Organisations) | Sascha Julian Oks | 2024 | Springer Gabler | |
46 | Industrial Cyber-Physical Systems: Advancing Industry 4.0 from Vision to Application (Markt- und Unternehmensentwicklung Markets and Organisations) | Sascha Julian Oks | 2024 | Springer Gabler | |
47 | Industrial Cyber-Physical Systems: Advancing Industry 4.0 from Vision to Application (Markt- und Unternehmensentwicklung Markets and Organisations) | Sascha Julian Oks | 2024 | Springer Gabler | |
48 | The Cybersecurity Guide to Governance, Risk, and Compliance | Jason Edwards, Griffin Weaver | 2024 | Wiley | |
49 | The Cybersecurity Guide to Governance, Risk, and Compliance | Jason Edwards, Griffin Weaver | 2024 | Wiley | |
50 | Cybercrime and Digital Deviance | Graham, Roderick S., Smith, 'Shawn K. | 2024 | Routledge | |
51 | ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills | Clint Bodungen | 2024 | Packt Publishing | |
52 | Ethical Hacking with Python: Developing Cybersecurity Tools | Nate Phoetean | 2024 | Independently Published | |
53 | Understanding Mental Health Apps: An Applied Psychosocial Perspective (Palgrave Studies in Cyberpsychology) | Lewis Goodings, Darren Ellis, Ian Tucker | 2024 | Palgrave Macmillan | |
54 | Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap | Travis DeForge | 2024 | Orange Education Pvt Ltd, AVA™ | |
55 | The Cybersecurity Bible: [5 in 1] The All-In-One Guide to Detect, Prevent, and Manage Cyber Threats. Includes Hands-On Exercises to Become an Expert and Lead Your (First) Security Team | Worley, Rick C. | 2024 | Independently Published | |
56 | Cyber Resilience Act Requirements Standards Mapping | Hernandez Ramos, J.L., Karopoulos, G., Nai Fovino, I., Spigolon, R., Sportiello, L., Steri, G., Gorniak, S., Magnabosco, P. | 2024 | Publications Office of the European Union | |
57 | Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach | Jennifer L. Bayuk | 2024 | Wiley | |
58 | Stepping Through Cybersecurity Risk Management : A Systems Thinking Approach | Jennifer L. Bayuk | 2024 | Wiley | |
59 | Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach | Jennifer L. Bayuk | 2024 | Wiley | |
60 | Machine Learning for Cyber Physical System: Advances and Challenges | Janmenjoy Nayak, Bighnaraj Naik, Vimal S, Margarita Favorskaya | 2024 | Springer | |
61 | Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems) | Bharat Bhushan (editor), Sudhir Kumar Sharma (editor), Parma Nand (editor), Achyut Shankar (editor) | 2024 | CRC Press | |
62 | Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2023; 03–04 July; University of ... Denmark (Springer Proceedings in Complexity) | Cyril Onwubiko (editor), Pierangelo Rosati (editor), Aunshul Rege (editor), Arnau Erola (editor), Xavier Bellekens (editor), Hanan Hindy (editor), Martin Gilje Jaatun (editor) | 2024 | Springer | |
63 | Security and Privacy in Cyber-Physical Systems and Smart Vehicles: First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, ... and Telecommunications Engineering) | Yu Chen (editor), Chung-Wei Lin (editor), Bo Chen (editor), Qi Zhu (editor) | 2024 | Springer | |
64 | Cybersecurity Mastery: Defeat Cyber Threats, Enhance Your Defense, and Overcome Vulnerability with Expert Strategies to Navigate with Confidence. | Miller, Alan | 2024 | | |
65 | Proceedings of the 6th International Conference on Communications and Cyber Physical Engineering: ICCCE 2023; 28–29 April, Hyderabad, India (Lecture Notes in Electrical Engineering, 1096) | Amit Kumar (editor), Stefan Mozar (editor) | 2024 | Springer | |
66 | Cyber Defense Magazine - April 2024 | Cyber Defense Magazine | 2024 | Cyber Defense Magazine | |
67 | Cyber Operations: A Case Study Approach | Jerry M. Couretas | 2024 | Wiley | |
68 | Cyber Operations: A Case Study Approach | Jerry M. Couretas | 2024 | Wiley | |
69 | Cyber Operations: A Case Study Approach | Jerry M. Couretas | 2024 | Wiley | |
70 | Cybersecurity Career Roadmap 2024: Paving the Path to Cyber Excellence | Dan Williams | 2024 | Dan Williams | |
71 | Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection | Shilpa Mahajan; Mehak Khurana; Vania Vieira Estrela | 2024 | WILEY | |
72 | Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers (Communications in Computer and Information Science) | Haomiao Yang (editor), Rongxing Lu (editor) | 2024 | Springer | |
73 | A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program | Debra Baker | 2024 | Packt Publishing | |
74 | A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program | Debra Baker | 2024 | Packt Publishing | |
75 | A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program | Debra Baker | 2024 | Packt Publishing | |
76 | Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture | Lester Nichols | 2024 | Packt Publishing | |
77 | Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture | Lester Nichols | 2024 | Packt Publishing | |
78 | The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age | Peter Kestner | 2024 | Springer | |
79 | The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age | Peter Kestner | 2024 | Springer | |
80 | The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age | Peter Kestner | 2024 | Springer | |
81 | The Art of Cyber Warfare : Strategic and Tactical Approaches for Attack and Defense in the Digital Age | Peter Kestner | 2024 | Springer Fachmedien Wiesbaden | |
82 | The Politics of Cyber-Security (International Studies Intensives) | Myriam Dunn Cavelty | 2024 | Routledge | |
83 | The Politics of Cyber-Security (International Studies Intensives) | Myriam Dunn Cavelty | 2024 | Routledge | |
84 | Social Engineering in Cybersecurity: Threats and Defenses | Gururaj H. L., Janhavi V., Ambika V. | 2024 | CRC Press | |
85 | The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age | Peter Kestner | 2024 | Springer Fachmedien Wiesbaden | |
86 | Feminist Cyberlaw | Meg Leta Jones (editor), Amanda Levendowski (editor) | 2024 | University of California Press | |
87 | Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success | Tyler Wall; Jarrett Rodrick | 2024 | Apress | |
88 | Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success | Tyler Wall; Jarrett Rodrick | 2024 | Apress | |
89 | Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success | Tyler Wall; Jarrett Rodrick | 2024 | Apress | |
90 | Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches | Soledad Antelada Toledano | 2024 | Packt Publishing | |
91 | Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches | Soledad Antelada Toledano | 2024 | Packt Publishing | |
92 | Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense | Shane Hartman | 2024 | Packt Publishing | |
93 | Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense | Shane Hartman | 2024 | Packt Publishing | |
94 | Cyber Sovereignty: The Future of Governance in Cyberspace | Lucie Kadlecová | 2024 | Stanford University Press | |
95 | Cyber Security and Business Analysis: An essential guide to secure and robust systems | Bindu Channaveerappa | 2024 | BCS, The Chartered Institute for IT | |
96 | Cyber Security and Business Analysis: An essential guide to secure and robust systems | Bindu Channaveerappa | 2024 | BCS, The Chartered Institute for IT | |
97 | Advanced Techniques and Applications of Cybersecurity and Forensics | Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary | 2024 | CRC Press | |
98 | Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics | Milad Aslaner | 2024 | Packt Publishing | |
99 | Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense | Shane Hartman | 2024 | Packt Publishing | |
100 | Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches | Soledad Antelada Toledano | 2024 | Packt Publishing | |
101 | Ultimate Linux Network Security for Enterprises: Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services (English Edition) | Adarsh Kant | 2024 | Orange Education Pvt Ltd | |
102 | Ultimate Linux Network Security for Enterprises: Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services (English Edition) | Adarsh Kant | 2024 | Orange Education Pvt Ltd | |
103 | Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity | Zhassulan Zhussupov | 2024 | Packt Publishing Pvt. Ltd. | |
104 | Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux | Karl Lane | 2024 | Packt Publishing Pvt Ltd | |
105 | Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity | Francisco Javier Santiago Vázquez | 2024 | Packt Publishing Pvt Ltd | |
106 | Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity | Francisco Javier Santiago Vázquez | 2024 | Packt Publishing | |
107 | Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity | Francisco Javier Santiago Vázquez | 2024 | Packt Publishing | |
108 | Mastering Cybersecurity: Strategies, Technologies, and Best Practices | Jason Edwards | 2024 | Apress | |
109 | Mastering Cybersecurity: Strategies, Technologies, and Best Practices | Jason Edwards | 2024 | Apress | |
110 | Mastering Cybersecurity: Strategies, Technologies, and Best Practices | Jason Edwards | 2024 | Apress | |
111 | Cybernetics and the Constructed Environment: Design Between Nature and Technology | Zihao Zhang | 2024 | Routledge | |
112 | Cybernetics and the Constructed Environment: Design Between Nature and Technology | Zihao Zhang | 2024 | Routledge | |
113 | Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing) | Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor) | 2024 | CRC Press | |
114 | Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research (Edge AI in Future Computing) | Chhabi Rani Panigrahi (editor), Victor Hugo C. de Albuquerque (editor), Akash Kumar Bhoi (editor), Hareesha K.S. (editor) | 2024 | CRC Press | |
115 | Malware Development for Ethical Hackers: Learn How to Develop Various Types of Malware to Strengthen Cybersecurity | Zhassulan Zhussupov | 2024 | Packt Publishing | |
116 | The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age | Peter Kestner | 2024 | Springer Nature | |
117 | Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence | Rong Su | 2024 | CRC Press | |
118 | Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence | Rong Su | 2024 | CRC Press | |
119 | Ethical Hacking: Understanding the basics of Hacking Tools and Techniques for Cybersecurity and Safeguarding Information in computer systems and computer networks | Lewis Finan | 2024 | Independently Published | |
120 | Secure and Smart Cyber-Physical Systems | Uttam Ghosh (editor), Fortune Mhlanga (editor), Danda B Rawat (editor) | 2024 | CRC Press | |
121 | Cybersecurity for Space: A Guide to Foundations and Challenges | Jacob G. Oakley | 2024 | Apress | |
122 | Cybersecurity for Space: A Guide to Foundations and Challenges | Jacob G. Oakley | 2024 | Apress | |
123 | Cybersecurity for Space: A Guide to Foundations and Challenges | Jacob G. Oakley | 2024 | Apress | |
124 | Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) | Ravindra Das | 2024 | CRC Press | |
125 | Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) | Ravindra Das | 2024 | CRC Press | |
126 | Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) | Ravindra Das | 2024 | CRC Press | |
127 | Generative AI: Phishing and Cybersecurity Metrics (Cyber Shorts) | Ravindra Das | 2024 | CRC Press | |
128 | The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamic | Akash Mukherjee | 2024 | Packt Publishing Pvt Ltd | |
129 | Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps | John Sotiropoulos | 2024 | Packt Publishing | |
130 | Counterterrorism and Cybersecurity: Total Information Awareness | Newton Lee | 2024 | Springer; Third Edition 2024 | |
131 | Counterterrorism and Cybersecurity: Total Information Awareness | Newton Lee | 2024 | Springer; Third Edition 2024 | |
132 | Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection | Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) | 2024 | Wiley | |
133 | Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection | Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) | 2024 | Wiley | |
134 | Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods | Ashish Mishra | 2023 | BPB Publications | |
135 | Cyber Investigations | André Årnes (editor) | 2023 | Wiley | |
136 | Cyber Investigations: A Research Based Introduction for Advanced Studies | André Årnes | 2023 | Wiley | |
137 | Cyber Infrastructure for the Smart Electric Grid | Anurag K. Srivastava, Venkatesh Venkataramanan, Carl Hauser | 2023 | Wiley-IEEE Press | |
138 | Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom | Daniel Shoemaker, Ken Sigler, Tamara Shoemaker | 2023 | CRC Press | |
139 | Cyber Physical Systems: Concepts and Applications | Anupam Baliyan, Kuldeep Singh Kaswan, Naresh Kumar, Kamal Upreti, Ramani Kannan | 2023 | CRC Press/Chapman & Hall | |
140 | Cybersecurity All-in-One For Dummies | Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs | 2023 | For Dummies | |
141 | Cyber Physical Systems. Concepts and Applications | Anupam Baliyan, Kuldeep Singh Kaswan, Naresh Kumar, Kamal Upreti, and Ramani Kannan | 2023 | CRC Press | |
142 | Teaching Cybersecurity. A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom | Daniel Shoemaker, Ken Sigler, Tamara Shoemaker | 2023 | CRC Press | |
143 | Collaborative Approaches for Cyber Security in Cyber-Physical Systems | Theo Dimitrakos, Javier Lopez, Fabio Martinelli | 2023 | Springer | |
144 | Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity | Reza Montasari | 2023 | Springer | |
145 | The Sharing Economy for Tackling Cybercrime: Uberization of Public-Private Partnerships | Ethem Ilbiz, Christian Kaunert | 2023 | Springer | |
146 | Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies | Dwayne Natwick | 2023 | Packt Publishing | |
147 | Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies | Dwayne Natwick | 2023 | Packt Publishing | |
148 | Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 | Hamid Jahankhani | 2023 | Springer | |
149 | Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022 Matsue, Japan, August 10–12, 2022 Revised Selected Papers | Chunhua Su, Kouichi Sakurai | 2023 | Springer | |
150 | Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings | Abderrahmane Nitaj, Karim Zkik | 2023 | Springer | |
151 | Artificial Intelligence and Cybersecurity. Theory and Applications | Tuomo Sipola, Tero Kokkonen, Mika Karjalainen | 2023 | Springer | |
152 | Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime | Nearchos Nearchou | 2023 | | |
153 | Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends | Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari | 2023 | Springer | |
154 | Machine Learning for Cyber Security | | 2023 | Springer International Publishing | |
155 | Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | Eugene H. Spafford; Leigh Metcalf; Josiah Dykstra | 2023 | Addison-Wesley Professional | |
156 | Machine Learning for Cyber Security | | 2023 | Springer International Publishing | |
157 | Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security, 101) | Reza Montasari | 2023 | Springer | |
158 | Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Advances in Information Security, 101) | Reza Montasari | 2023 | Springer | |
159 | Cyber-Physical Systems and Control II | Dmitry G. Arseniev, Nabil Aouf | 2023 | Springer | |
160 | Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part III | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
161 | Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part II | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
162 | Machine Learning for Cyber Security: 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part I | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
163 | Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization | Tim Rains | 2023 | Packt Publishing | |
164 | Intelligent Cyber Physical Systems and Internet of Things: ICoICI 2022 | Jude Hemanth, Danilo Pelusi, Joy Iong-Zong Chen | 2023 | Springer | |
165 | Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry: A Comparative Study within the G-20 | Felix I. Lessambo | 2023 | Palgrave Macmillan | |
166 | Cyber-Physical Systems for Industrial Transformation: Fundamentals, Standards, and Protocols | Gunasekaran Manogaran; Nour Eldeen Mahmoud Khalifa; Mohamed Loey; Mohamed Hamed N. Taha | 2023 | CRC Press | |
167 | Power Systems Cybersecurity: Methods, Concepts, and Best Practices | Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong | 2023 | Springer | |
168 | Intelligent Edge Computing for Cyber Physical Applications | D. Jude Hemanth, B. B. Gupta, Mohamed Elhoseny, Swati Vijay Shinde | 2023 | Academic Press | |
169 | 5G Cyber Risks and Mitigation | Sabhyata Soni | 2023 | CRC Press | |
170 | Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 Copenhagen, Denmark, September 26–30, 2022 Revised Selected Papers | Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla | 2023 | Springer | |
171 | Computer Security. ESORICS 2022 International Workshops. CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022 Copenhagen, Denmark, September 26–30, 2022 Revised Selected Papers | Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla | 2023 | Springer | |
172 | Understanding Cybersecurity Management in Decentralized Finance. Challenges, Strategies, and Trends | Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari | 2023 | Springer | |
173 | Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
174 | Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
175 | Machine Learning for Cyber Security. 4th International Conference, ML4CS 2022 Guangzhou, China, December 2–4, 2022 Proceedings, Part I | Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li | 2023 | Springer | |
176 | Cyber Security Applications for Industry 4.0 | R Sujatha, G Prakash, Noor Zaman Jhanjhi | 2023 | CRC Press | |
177 | Kids Cybersecurity Using Computational Intelligence Techniques | Wael Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm, Abdelhamid Emara | 2023 | Springer | |
178 | Artificial Intelligence for Cyber-Physical Systems Hardening | Issa Traore, Isaac Woungang, Sherif Saad | 2023 | Springer | |
179 | International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) | Nadia Nedjah, Gregorio Martínez Pérez, B. B. Gupta | 2023 | Springer | |
180 | Mastering Linux Security And Hardening: A Practical Guide To Protecting Your Linux System From Cyber Attacks | Donald A. Tevault | 2023 | Packt Publishing | |
181 | Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks | Donald A. Tevault | 2023 | Packt Publishing | |
182 | Cybertax: Managing the Risks and Results | George K.Tsantes, James F. Ransome | 2023 | CRC Press/Auerbach | |
183 | Cyber Deception: Techniques, Strategies, and Human Aspects | Tiffany Bao, MilindTambe, Cliff Wang | 2023 | Springer | |
184 | We Are All Targets: How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos | Matt Potter | 2023 | Hachette Books | |
185 | Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India | Amit Kumar, Stefan Mozar, Jan Haase | 2023 | Springer | |
186 | Cyber Deception: Techniques, Strategies, and Human Aspects | Tiffany Bao, Milind Tambe, Cliff Wang | 2023 | Springer | |
187 | Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales | Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun | 2023 | Springer | |
188 | Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence | Yassine Maleh (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor) | 2023 | River Publishers | |
189 | Understanding Cyber-Warfare Politics, Policy And Strategy | Christopher Whyte, Brian Mazanec | 2023 | Routledge | Taylor & Francis Group | |
190 | Computational Intelligence for Cybersecurity Management and Applications | Yassine Maleh (editor), Mamoun Alazab (editor), Soufyane Mounir (editor) | 2023 | CRC Press | |
191 | Cybersecurity in Transport Systems (Transportation) | Martin Hawley | 2023 | The Institution of Engineering and Technology | |
192 | Cognitive Computing and Cyber Physical Systems: Third EAI International Conference, IC4S 2022, Virtual Event, November 26-27, 2022, Proceedings | Nishu Gupta, Prakash Pareek, M.J.C.S. Reis | 2023 | Springer | |
193 | Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2 | Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang | 2023 | Springer | |
194 | Cybersecurity for Smart Cities: Practices and Challenges | Mohiuddin Ahmed, Paul Haskell-Dowland | 2023 | Springer | |
195 | Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2: BDCPS 2022, December 16–17, Bangkok, Thailand | Mohammed Atiquzzaman, Neil Yuwen Yen, Zheng Xu | 2023 | Springer | |
196 | Cognitive Computing and Cyber Physical Systems. Third EAI International Conference, IC4S 2022 Virtual Event, November 26–27, 2022 Proceedings | Nishu Gupta, Prakash Pareek, M. J. C. S. Reis | 2023 | Springer | |
197 | Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies | Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat | 2023 | Springer | |
198 | How to Measure Anything in Cybersecurity Risk | Douglas W.Hubbard; RICHARD SEIERSEN | 2023 | Wiley | |
199 | Machine Learning Techniques for Cybersecurity | Elisa Bertino; Sonam Bhardwaj; Fabrizio Cicala; Sishuai Gong; Imtiaz Karim; Charalampos Katsis; Hyunwoo Lee; Adrian Shuai Li; Ashraf Y. Mahgoub | 2023 | Springer International Publishing | |
200 | Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 | Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang | 2023 | Springer | |
201 | Machine Learning Techniques for Cybersecurity | Elisa Bertino, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li, Ashraf Y. Mahgoub | 2023 | Springer | |
202 | Escalation Dynamics in Cyberspace | Erica D. Lonergan, Shawn W. Lonergan | 2023 | Oxford University Press | |
203 | Cyber Threat Intelligence | Martin Lee | 2023 | Wiley | |
204 | How to Measure Anything in Cybersecurity Risk | Douglas W. Hubbard, Richard Seiersen | 2023 | Wiley | |
205 | Advances in Cognitive Science and Communications. Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India | Amit Kumar, Stefan Mozar, Jan Haase | 2023 | Springer | |
206 | The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2023 | Springer | |
207 | Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices | Dietmar P. F. Möller | 2023 | Springer | |
208 | MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 | Kathiravan Udayakumar; Puthiyavan Udayakumar | 2023 | John Wiley & Sons, Inc. | |
209 | Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices | Dietmar P.F. Möller | 2023 | Springer | |
210 | MCE Microsoft ® Certified Expert Cybersecurity Architect Study Guide. Exam SC- 100 | Kathiravan Udayakumar, Puthiyavan Udayakumar | 2023 | Sybex | |
211 | Blockchain for Cybersecurity in Cyber-Physical Systems | Yassine Maleh, Mamoun Alazab, Imed Romdhani | 2023 | Springer | |
212 | Online Harms and Cybertrauma: Legal and Harmful Issues with Children and Young People | Catherine Knibbs | 2023 | Routledge | |
213 | Cybercrime in Social Media: Theory and Solutions | Pradeep Kumar Roy, Asis Kumar Tripathy | 2023 | CRC Press/Chapman & Hall | |
214 | Cyber Laundering: International Policies And Practices | Nathalie Rebe | 2023 | World Scientific | |
215 | Regulating Cyber Technologies: Privacy Vs Security | Nathalie Rébé | 2023 | World Scientific | |
216 | Handbook of Research on Cybersecurity Risk in Contemporary Business Systems | Festus Fatai Adedoyin, Bryan Christiansen | 2023 | IGI Global | |
217 | Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 | Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman | 2023 | Springer | |
218 | Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 | Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman | 2023 | Springer | |
219 | Modern Vulnerability Management: Predictive Cybersecurity (Computer Security) | Michael Roytman and Ed Bellis | 2023 | Artech House | |
220 | Cyberbiosecurity: A New Field to Deal with Emerging Threats | Dov Greenbaum (editor) | 2023 | Springer | |
221 | Cyberbiosecurity: A New Field to Deal with Emerging Threats | Dov Greenbaum (editor) | 2023 | Springer | |
222 | Cybersecurity Teaching in Higher Education | Leslie F. Sikos (editor), Paul Haskell-Dowland (editor) | 2023 | Springer | |
223 | Cybersecurity Teaching in Higher Education | Leslie F. Sikos (editor), Paul Haskell-Dowland (editor) | 2023 | Springer | |
224 | Cybersecurity, Privacy and Data Protection in EU Law: A Law, Policy and Technology Analysis | Maria Grazia Porcedda | 2023 | Bloomsbury Publishing | |
225 | Cyberdemocracy: Transforming Politics | Harem Karem | 2023 | Palgrave Macmillan | |
226 | Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization | Kunal Sehgal, Nikolaos Thymianis | 2023 | Packt Publishing | |
227 | Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization | Kunal Sehgal, Nikolaos Thymianis | 2023 | Packt Publishing | |
228 | Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II (River Publishers Series in Digital Security and Forensics) | Anand Handa, Rohit Negi, S. Venkatesan, Sandeep K. Shukla | 2023 | River Publishers | |
229 | Cybersecurity for Decision Makers | Narasimha Rao Vajjhala (editor), Kenneth David Strang (editor) | 2023 | CRC Press | |
230 | Plunkett’s Cybersecurity, Digital ID & Online Fraud Industry Almanac 2023: Cybersecurity, Digital ID & Online Fraud Industry Market Research, Statistics, Trends and Leading Companies | | 2023 | Plunkett Research, Ltd. | |
231 | Cognitive Dependability Engineering: Managing Risks in Cyber-Physical-Social Systems under Deep Uncertainty | Lech Bukowski | 2023 | CRC Press/Science Publishers | |
232 | Research Techniques for Computer Science, Information Systems and Cybersecurity | Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor | 2023 | Springer | |
233 | Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (2nd Early Release) | Kim Crawley | 2023 | O'Reilly Media, Inc. | |
234 | Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 1: BDCPS 2022, December 16-17, Bangkok, Thailand | Mohammed Atiquzzaman, Neil Yen, Zheng Xu | 2023 | Springer | |
235 | 10 Machine Learning Blueprints You Should Know for Cybersecurity | Rajvardhan Oak | 2023 | Packt Publishing | |
236 | The NICE Cyber Security Framework. Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2023 | Springer | |
237 | Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide | Alexander Kott | 2023 | Springer | |
238 | Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide | Alexander Kott | 2023 | Springer International Publishing | |
239 | Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography | Om Pal; Vinod Kumar; Rijwan Khan; Bashir Alam; Mansaf Alam | 2023 | | |
240 | Balkan Cyberia: Cold War Computing, Bulgarian Modernization, and the Information Age behind the Iron Curtain | Victor Petrov | 2023 | The MIT Press | |
241 | Balkan Cyberia: Cold War Computing, Bulgarian Modernization, And The Information Age Behind The Iron Curtain | Victor Petrov | 2023 | The MIT Press | |
242 | Cybercrime in the Pandemic Digital Age and Beyond | Russell G. Smith; Rick Sarre; Lennon Yao-Chung Chang; Laurie Yiu-Chung Lau | 2023 | Springer Nature | |
243 | Cyberdemocracy: Transforming Politics | Harem Karem | 2023 | Springer Nature | |
244 | Artificial Intelligence and Cyber Security in Industry 4.0 | Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi | 2023 | Springer | |
245 | Modern Vulnerability Management. Predictive Cybersecurity | Michael Roytman, Ed Bellis | 2023 | Artech House | |
246 | Modern Vulnerability Management. Predictive Cybersecurity | Michael Roytman | 2023 | Artech House | |
247 | Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) | Kim Crawley | 2023 | O'Reilly Media, Inc. | |
248 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2023 | Apress | |
249 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2023 | Apress | |
250 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2023 | Apress | |
251 | Cybersecurity First Principles: A Reboot of Strategy and Tactics | Rick Howard | 2023 | Wiley | |
252 | 10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques | Rajvardhan Oak | 2023 | Packt Publishing | |
253 | 10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques | Rajvardhan Oak | 2023 | Packt Publishing | |
254 | 10 Machine Learning Blueprints You Should Know for Cybersecurity: Protect your systems and boost your defenses with cutting-edge AI techniques | Rajvardhan Oak | 2023 | Packt Publishing | |
255 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2023 | Apress | |
256 | Cyber Threat Intelligence | Martin Lee | 2023 | Wiley | |
257 | Cyber Threat Intelligence | Martin Lee | 2023 | Wiley | |
258 | Technological Innovation for Connected Cyber Physical Spaces: 14th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2023 Caparica, Portugal, July 5–7, 2023 Proceedings | Luis M. Camarinha-Matos Filipa Ferrada | 2023 | Springer-IFIP | |
259 | Cybersecurity First Principles: A Reboot of Strategy and Tactics | Rick Howard | 2023 | Wiley | |
260 | Cybersecurity First Principles: A Reboot of Strategy and Tactics | Rick Howard | 2023 | Wiley | |
261 | Parallel Population and Parallel Human: A Cyber-Physical Social Approach | Peijun Ye, Fei-Yue Wang | 2023 | Wiley-IEEE Press | |
262 | Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program | Jason Brown | 2023 | Packt Publishing | |
263 | Cyber-Physical-Human Systems: Fundamentals and Applications | Anuradha M. Annaswamy, Pramod P. Khargonekar, Françoise Lamnabhi-Lagarrigue, Sarah K. Spurgeon | 2023 | Wiley-IEEE Press | |
264 | Counterintelligence in a Cyber World | Paul A. Watters | 2023 | Springer | |
265 | Smart Grid Resilience: Extreme Weather, Cyber-Physical Security, and System Interdependency | Junjian Qi | 2023 | Springer | |
266 | CC Certified in Cybersecurity All-in-One Exam Guide | Jordan Genung, Steven Bennett | 2023 | McGraw Hill | |
267 | Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security: IC4S 2022 | Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou | 2023 | Springer | |
268 | Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed | Yuri Diogenes | 2023 | Addison-Wesley | |
269 | A History of Cyber Literary Criticism in China | Ouyang Youquan | 2023 | Routledge | |
270 | Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership) | Anuradha M. Annaswamy (editor), Pramod P. Khargonekar (editor), Francoise Lamnabhi-Lagarrigue (editor), Sarah K. Spurgeon (editor) | 2023 | Wiley-IEEE Press | |
271 | Cyber-Physical-Human Systems: Fundamentals and Applications (IEEE Press Series on Technology Management, Innovation, and Leadership) | Anuradha M. Annaswamy (editor), Pramod P. Khargonekar (editor), Francoise Lamnabhi-Lagarrigue (editor), Sarah K. Spurgeon (editor) | 2023 | Wiley-IEEE Press | |
272 | Vision, Technology, And Subjectivity In Mexican Cyberpunk Literature | Stephen C. Tobin | 2023 | Palgrave Macmillan | |
273 | Cybercrime During the SARS-CoV-2 Pandemic: Evolutions, Adaptations, Consequences | Daniel Ventre, Hugo Loiseau | 2023 | Wiley-ISTE | |
274 | HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023 Held as Part of the 25th HCI International Conference, HCII 2023 Copenhagen, Denmark, July 23–28, 2023 Proceedings | Abbas Moallem | 2023 | Springer | |
275 | Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively | Ashish M Kothekar | 2023 | Packt Publishing | |
276 | Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively | Ashish M Kothekar | 2023 | Packt Publishing | |
277 | Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively | Ashish M Kothekar | 2023 | Packt Publishing | |
278 | Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA | Marco Fanti | 2023 | Packt Publishing | |
279 | Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA | Marco Fanti | 2023 | Packt Publishing | |
280 | Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA | Marco Fanti | 2023 | Packt Publishing | |
281 | Networks and Systems in Cybernetics: Proceedings of 12th Computer Science On-line Conference 2023, Volume 2 | Radek Silhavy, Petr Silhavy | 2023 | Springer | |
282 | Output Regulation and Cybersecurity of Networked Switched Systems | Lili Li, Jun Fu | 2023 | Springer | |
283 | Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed | Yuri Diogenes | 2023 | Addison-Wesley | |
284 | Cybersecurity: A Technology Landscape Analysis (Applied Innovation and Technology Management) | Tugrul U Daim (editor), Marina Dabic (editor) | 2023 | Springer | |
285 | Cybersecurity: A Technology Landscape Analysis (Applied Innovation and Technology Management) | Tugrul U Daim (editor), Marina Dabic (editor) | 2023 | Springer | |
286 | Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide | Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu | 2023 | Apress | |
287 | WordPress Security Secrets Revealed: A Cybersecurity Consultant’s Guide to Stop Hackers on WordPress Websites that Power almost Half of the Internet | Sahil B. | 2023 | Notion Press | |
288 | Cybersecurity First Principles: A Reboot of Strategy and Tactics | Rick Howard | 2023 | Wiley | |
289 | Cyber Threat Intelligence | Martin Lee | 2023 | Wiley | |
290 | Artificial Intelligence and Cyber Security in Industry 4.0 | Velliangiri Sarveshwaran; Joy Iong-Zong Chen; Danilo Pelusi | 2023 | Springer Nature | |
291 | Cyber Deception: Techniques, Strategies, and Human Aspects | Tiffany Bao; Milind Tambe; Cliff Wang | 2023 | Springer Nature | |
292 | Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies | Ahmed A. Abd El-Latif; Yassine Maleh; Wojciech Mazurczyk; Mohammed ELAffendi; Mohamed I. Alkanhal | 2023 | Springer Nature | |
293 | Counterintelligence in a Cyber World | Paul A. Watters | 2023 | Springer Nature | |
294 | Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime | Hari Ravichandran | 2023 | Skyhorse | |
295 | Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices | Dietmar P.F. Möller | 2023 | Springer Nature | |
296 | Cybersecurity for Smart Cities: Practices and Challenges | Mohiuddin Ahmed; Paul Haskell-Dowland | 2023 | Springer Nature | |
297 | Research Techniques for Computer Science, Information Systems and Cybersecurity | Uche M. Mbanaso; Lucienne Abrahams; Kennedy Chinedu Okafor | 2023 | Springer Nature | |
298 | Cybersecurity All-In-One for Dummies | Joseph Steinberg; Kevin Beaver; Ira Winkler; Ted Coombs | 2023 | For Dummies | |
299 | Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 1 | Jemal H. Abawajy; Zheng Xu; Mohammed Atiquzzaman; Xiaolu Zhang | 2023 | Springer Nature | |
300 | Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales | Cyril Onwubiko; Pierangelo Rosati; Aunshul Rege; Arnau Erola; Xavier Bellekens; Hanan Hindy; Martin Gilje Jaatun | 2023 | Springer Nature | |
301 | The Sharing Economy for Tackling Cybercrime | Ethem Ilbiz; Christian Kaunert | 2023 | Springer Nature | |
302 | Collaborative Approaches for Cyber Security in Cyber-Physical Systems | Theo Dimitrakos; Javier Lopez; Fabio Martinelli | 2023 | Springer Nature | |
303 | Intelligent Cyber Physical Systems and Internet of Things: ICoICI 2022 | Jude Hemanth; Danilo Pelusi; Joy Iong-Zong Chen | 2023 | Springer Nature | |
304 | Kids Cybersecurity Using Computational Intelligence Techniques | Wael M. S. Yafooz; Hussain Al-Aqrabi; Arafat Al-Dhaqm; Abdelhamid Emara | 2023 | Springer Nature | |
305 | Vision, Technology, and Subjectivity in Mexican Cyberpunk Literature | Stephen C. Tobin | 2023 | Springer Nature | |
306 | Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies | Kutub Thakur; Al-Sakib Khan Pathan; Sadia Ismat | 2023 | Springer Nature | |
307 | The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2023 | Springer Nature | |
308 | Cognitive Computing and Cyber Physical Systems: Third EAI International Conference, IC4S 2022, Virtual Event, November 26-27, 2022, Proceedings | Nishu Gupta; Prakash Pareek; M.J.C.S. Reis | 2023 | Springer Nature | |
309 | Technological Innovation for Connected Cyber Physical Spaces: 14th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2023, Caparica, Portugal, July 5–7, 2023, Proceedings | Luis M. Camarinha-Matos; Filipa Ferrada | 2023 | Springer Nature | |
310 | Power Systems Cybersecurity: Methods, Concepts, and Best Practices | Hassan Haes Alhelou; Nikos Hatziargyriou; Zhao Yang Dong | 2023 | Springer Nature | |
311 | Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings | Abderrahmane Nitaj; Karim Zkik | 2023 | Springer Nature | |
312 | Blockchain for Cybersecurity in Cyber-Physical Systems | Yassine Maleh; Mamoun Alazab; Imed Romdhani | 2023 | Springer Nature | |
313 | Mobilizing the C-Suite: Waging War Against Cyberattacks | Frank Riccardi | 2023 | Business Expert Press | |
314 | Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers | Chunhua Su; Kouichi Sakurai | 2023 | Springer Nature | |
315 | Cybersecurity in the Age of Smart Societies: Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022 | Hamid Jahankhani | 2023 | Springer Nature | |
316 | Dancho Danchev's Cyber Intelligence Cybercrime Research Memoir Second Edition | Dancho Danchev | 2023 | Dancho Danchev | |
317 | How to Be OT Cybersecurity Professional [Team-IRA] | Alqurashi, Nebras; | 2023 | Austin Macauley Publishers | |
318 | Cyber-Physical Systems Engineering and Control | Alla G. Kravets, Alexander A. Bolshakov, Maxim V Shcherbakov | 2023 | Springer | |
319 | Cyberspace and Instability | Robert Chesney (editor); James Shires (editor); Max Smeets (editor) | 2023 | Edinburgh University Press | |
320 | What Is Cybersecurity For? | Tim Stevens | 2023 | Bristol University Press | |
321 | Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on Cybersecurity | Satya Prakash Yadav (editor); Raghuraj Singh (editor); Vibhash Yadav (editor); Fadi Al-Turjman (editor); Swarn Avinash Kumar (editor) | 2023 | De Gruyter | |
322 | Cyber Guardians: Empowering Board Members for Effective Cybersecurity | Bart R. McDonough | 2023 | Wiley | |
323 | Advancements in Cybercrime Investigation and Digital Forensics | A. Harisha & Amarnath Mishra & Chandra Singh | 2023 | CRC Press | |
324 | Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity | Kofler, Michael; Gebeshuber, Klaus;Kloep, Peter;Neugebauer, Frank; Zingsheim, Andr?;Hackner, Thomas;Widl, Markus;Aigner, Roland;Kania, Stefan; Scheible, Tobias; | 2023 | Rheinwerk Publishing Inc. | |
325 | Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications) | Hamid Jahankhani (editor), Ayman El Hajjar (editor) | 2023 | Springer | |
326 | Wireless Networks: Cyber Security Threats and Countermeasures (Advanced Sciences and Technologies for Security Applications) | Hamid Jahankhani (editor), Ayman El Hajjar (editor) | 2023 | Springer | |
327 | Evolution of the Cyber Domain: The Implications for National and Global Security | Eneken Tikk-Ringas | 2023 | Taylor & Francis | |
328 | New Age Cyber Threat Mitigation for Cloud Computing Networks | Akashdeep Bhardwaj | 2023 | Bentham Science Publishers | |
329 | New Age Cyber Threat Mitigation for Cloud Computing Networks | Akashdeep Bhardwaj | 2023 | Bentham Science Publishers | |
330 | New Age Cyber Threat Mitigation for Cloud Computing Networks | Akashdeep Bhardwaj | 2023 | Bentham Science Publishers | |
331 | Cybersecurity for Entrepreneurs | Gloria D'Anna, Zachary A Collier | 2023 | SAE International | |
332 | Cybersecurity for Entrepreneurs | Gloria D'Anna, Zachary A Collier | 2023 | SAE International | |
333 | Cybersecurity for Entrepreneurs | Gloria D'Anna, Zachary A Collier | 2023 | SAE International | |
334 | Battlefield Cyber: How China and Russia are Undermining Our Democracy and National Security | William J Holstein, Michael McLaughlin | 2023 | Prometheus | |
335 | 1000 Facts about the Greatest Video Games: A Pixelated Journey from Pong to Cyberpunk | Daniel Scott | 2023 | | |
336 | Building a Cyber Risk Management Program | Brian Allen, Brandon Bapst, and Terry Allan Hicks | 2023 | O'Reilly Media, Inc. | |
337 | Building a Cyber Risk Management Program | Brian Allen, Brandon Bapst, and Terry Allan Hicks | 2023 | O'Reilly Media, Inc. | |
338 | Cyber Resilience in Critical Infrastructure | Sinan Küfeoglu, Abdullah Talip Akgün | 2023 | CRC Press | |
339 | The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry | Alon Arvatz | 2023 | Wiley | |
340 | The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry | Alon Arvatz | 2023 | Wiley | |
341 | The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry | Alon Arvatz | 2023 | Wiley | |
342 | Cyber Resilience in Critical Infrastructure | Sinan Kufeoglu, Abdullah Talip Akgun | 2023 | | |
343 | Intelligent Approaches to Cyber Security | Narendra M. Shekokar, Hari Vasudevan, Surya S. Durbha, Antonis Michalas | 2023 | CRC Press | |
344 | Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services | Puthiyavan Udayakumar | 2023 | Apress | |
345 | Target Tehran - How Israel Is Using Sabotage, Cyberwarfare, Assassination – and Secret Diplomacy – to Stop a Nuclear Iran and Create a New Middle East | Yonah Jeremy Bob; Ilan Evyatar | 2023 | Simon & Schuster | |
346 | Cyber Threat Intelligence | Martin Lee | 2023 | Wiley | |
347 | Israel and the Cyber Threat | Charles D. Freilich, Matthew S. Cohen and Gabi Siboni | 2023 | Oxford University Press | |
348 | Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power | Charles D. Freilich, Matthew S. Cohen, Gabi Siboni | 2023 | Oxford University Press | |
349 | Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power | Charles D. Freilich; Matthew S. Cohen; Gabi Siboni | 2023 | Oxford University Press | |
350 | Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment | Richie Miller | 2023 | Independently published | |
351 | Cyber Guardians : Empowering Board Members for Effective Cybersecurity | Bart R. McDonough | 2023 | Wiley | |
352 | Artificial Intelligence & Blockchain in Cyber Physical Systems: Technologies & Applications | Muhammad Arif, Valentina Emilia Balas, Tabrez Nafis, Nawab Muhammad Faseeh Qureshi, Samar Wazir, Ibrar Hussain | 2023 | CRC Press | |
353 | IEEE Systems, Man, & Cybernetics Magazine | | 2023 | | |
354 | Confident Cyber Security: The Essential Insights and How to Protect from Threats | Jessica Barker | 2023 | Kogan Page | |
355 | Introduction To Cybersecurity: A Multidisciplinary Challenge | Robin Sharp | 2023 | Springer | |
356 | Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | Eugene H. Spafford, Leigh Metcalf and Josih Dykstra | 2023 | Addison-Wesley Professional | |
357 | Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | Eugene H. Spafford, Leigh Metcalf; Josih Dykstra | 2023 | Addison-Wesley Professional | |
358 | Automotive Cybersecurity Engineering Handbook: The automotive engineer's roadmap to cyber-resilient vehicles | Dr. Ahmad MK Nasser | 2023 | Packt Publishing Pvt Ltd | |
359 | Cybersecurity All-in-One For Dummies | Joseph Steinberg; Kevin Beaver; Ted Coombs; Ira Winkler | 2023 | | |
360 | Escalation Dynamics in Cyberspace | Erica D. Lonergan;Shawn W. Lonergan; | 2023 | Oxford University Press USA | |
361 | Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11) | Dr Jessica Barker | 2023 | Kogan Page | |
362 | Confident Cyber Security: The Essential Insights and How to Protect from Threats (Confident Series, 11) | Dr Jessica Barker | 2023 | Kogan Page | |
363 | The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity | Cesar Bravo, Desilda Toska | 2023 | Packt Publishing Pvt Ltd | |
364 | Wireless Communication for Cybersecurity | S. Sountharrajan; R. Maheswar Geetanjali; Rathee; M. Akila | 2023 | Wiley | |
365 | Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications | Ahmed A. Abd El-Latif, Mohammed Adel Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk | 2023 | The Institution of Engineering and Technology | |
366 | Cybernetic Aesthetics: Modernist Networks of Information and Data | Heather A. Love | 2023 | Cambridge University Press | |
367 | Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity | Rishalin Pillay, Mohammed Abutheraa | 2023 | Packt Publishing | |
368 | Windows Forensics Analyst Field Guide: Engage in proactive cyber defense using digital forensics techniques | MUHIBULLAH. MOHAMMED | 2023 | Packt | |
369 | Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 | Hind Zantout; Hani Ragab Hassen | 2023 | Springer Nature Switzerland | |
370 | Proceedings of the International Conference on Applied Cybersecurity (ACS) 2023 | Hind Zantout; Hani Ragab Hassen | 2023 | Springer Nature Switzerland | |
371 | Cyber Malware : Offensive and Defensive Systems | Iman Almomani; Leandros A. Maglaras; Mohamed Amine Ferrag; Nick Ayres | 2023 | Springer International Publishing | |
372 | Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects, 2nd Ed | Diana Kelley?, Ed Moyle | 2023 | Packt Publishing Pvt Ltd | |
373 | Wireless Communication in Cyber Security | S. Sountharrajan (editor), R. Maheswar (editor), Geetanjali Rathee (editor), M. Akila (editor) | 2023 | Wiley-Scrivener | |
374 | Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects | Diana Kelley, Ed Moyle | 2023 | Packt Publishing | |
375 | How to Measure Anything in Cybersecurity Risk | Douglas W. Hubbard; RICHARD SEIERSEN | 2023 | Wiley | |
376 | Cyber Security for Next-Generation Computing Technologies | Inam Ullah Khan | 2023 | CRC Press | |
377 | Self-Powered Cyber Physical Systems | Rathishchandra R. Gatti, Chandra Singh, Rajeev Agrawal, Felcy Jyothi Serrao | 2023 | Scrivener Publishing, Wiley Blackwell | |
378 | Cyberspace and Instability | Robert Chesney, James Shires, Max Smeets | 2023 | Edinburgh University Press | |
379 | Deploying the Zero Trust Framework in MSFT Azure (Cyber Shorts) | Ravindra Das | 2023 | CRC Press | |
380 | Deploying the Zero Trust Framework in MSFT Azure (Cyber Shorts) | Ravindra Das | 2023 | CRC Press | |
381 | Combatting Cyberbullying in Digital Media with Artificial Intelligence | Mohamed Lahby (editor), Al-Sakib Khan Pathan (editor), Yassine Maleh (editor) | 2023 | Chapman and Hall/CRC | |
382 | Discovering Cybersecurity: A Technical Introduction For The Absolute Beginner | Seth James Nielson | 2023 | Apress | |
383 | Smart Grid Resilience: Extreme Weather, Cyber-Physical Security, and System Interdependency | Junjian Qi | 2023 | Springer Nature | |
384 | Output Regulation and Cybersecurity of Networked Switched Systems | Lili Li; Jun Fu | 2023 | Springer Nature | |
385 | Networks and Systems in Cybernetics: Proceedings of 12th Computer Science On-line Conference 2023, Volume 2 | Radek Silhavy; Petr Silhavy | 2023 | Springer Nature | |
386 | HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings | Abbas Moallem | 2023 | Springer Nature | |
387 | Building a Cyber Risk Management Program | Brian Allen | 2023 | O'Reilly Media | |
388 | Building a Cyber Risk Management Program: Evolving Security for the Digital Age | Brian Allen, Brandon Bapst, Terry Allan Hicks | 2023 | O'Reilly Media | |
389 | AI Embedded Assurance for Cyber Systems | Cliff Wang; S. S. Iyengar; Kun Sun | 2023 | Springer International Publishing | |
390 | The Chinese Internet (Routledge Studies in New Media and Cyberculture) | Yuqi Na | 2023 | Routledge | |
391 | Explainable AI for Cybersecurity | Zhixin Pan, Prabhat Mishra | 2023 | Springer | |
392 | Explainable AI for Cybersecurity | Zhixin Pan, Prabhat Mishra | 2023 | Springer | |
393 | Explainable AI for Cybersecurity | Zhixin Pan, Prabhat Mishra | 2023 | Springer | |
394 | Against Cybercrime: Toward a Realist Criminology of Computer Crime (New Directions in Critical Criminology) | Kevin F. Steinmetz | 2023 | Routledge | |
395 | Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity Techniques | Alex Khang, Shashi Kant Gupta, Sita Rani, Dimitrios A. Karras | 2023 | CRC Press | |
396 | Malware Analysis and Intrusion Detection in Cyber-Physical Systems | S L Shiva Darshan (editor), M V Manoj Kumar (editor), B S Prashanth (editor) | 2023 | IGI Global | |
397 | Malware Analysis and Intrusion Detection in Cyber-Physical Systems | S L Shiva Darshan (editor), M V Manoj Kumar (editor), B S Prashanth (editor) | 2023 | IGI Global | |
398 | CYBERDEFENSE: the next generation | Marcus Matthias Keupp (ed) | 2023 | Springer Cham | |
399 | The Chinese Internet (Routledge Studies in New Media and Cyberculture) | Yuqi Na | 2023 | Routledge | |
400 | The Chinese Internet (Routledge Studies in New Media and Cyberculture) | Yuqi Na | 2023 | Routledge | |
401 | Cybernetics and the Origin of Information (Groundworks) | Raymond Ruyer | 2023 | Rowman & Littlefield Publishers | |
402 | Cyber Wargaming: Research and Education for Security in a Dangerous Digital World | Frank L. Smith; Nina A. Kollars; Benjamin H. Schechter | 2023 | Georgetown University Press | |
403 | Cyber Wargaming: Research and Education for Security in a Dangerous Digital World | Frank L. Smith; Nina A. Kollars; Benjamin H. Schechter | 2023 | Georgetown University Press | |
404 | Cyberfeminism Index | Mindy Seu (editor) | 2023 | Inventory Press | |
405 | Big Data Analytics in Intelligent IoT and Cyber-Physical Systems (Transactions on Computer Systems and Networks) | Nonita Sharma (editor), Monika Mangla (editor), Subhash K. Shinde (editor) | 2023 | Springer | |
406 | 26 Below (Alaskan Cyber Hunters, 1) | Kimberley Woodhouse | 2023 | Kregel Publications | |
407 | Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide | Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu | 2023 | Apress | |
408 | A Transdisciplinary Introduction to the World of Cybernetics: Basics, Models, Theories and Practical Examples | E. W. Udo Küppers | 2023 | Springer | |
409 | A Transdisciplinary Introduction to the World of Cybernetics: Basics, Models, Theories and Practical Examples | E. W. Udo Küppers | 2023 | Springer | |
410 | Cyber Forensics up and Running : A hands-on guide to digital forensics tools and technique | Vashishth, Tarun; | 2023 | BPB Publications | |
411 | Cybersecurity (Computer Science Fundamentals) | Edet, Theophilus | 2023 | CompreQuest Books | |
412 | SANS ICS Cybersecurity Field Manual Volume 2 | Dean Parsons | 2023 | SANS | |
413 | Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | Eugene H. Spafford, Leigh Metcalf, Josiah Dykstra, Vint Cerf | 2023 | Addison-Wesley | |
414 | Defending APIs against Cyber Attack: Learn the secrets of defense techniques to build secure application programming interfaces | Colin Domoney | 2023 | Packt Publishing Ltd. | |
415 | Cybersecurity Threats, Malware Trends, and Strategies: Discover Risk Mitigation Strategies for Modern Threats to Your Organization | Tim Rains | 2023 | Packt Publishing | |
416 | PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers | Miriam C Wiesner | 2023 | Packt Publishing | |
417 | Cybersecurity Study Guide | Sam O.A | 2023 | | |
418 | Cybernetic Aesthetics: Modernist Networks of Information and Data | Heather A. Love | 2023 | Cambridge University Press | |
419 | Cybercrime and Challenges in South Africa | Stanley Osezua Ehiane (editor), Sogo Angel Olofinbiyi (editor), Sazelo Michael Mkhize (editor) | 2023 | Palgrave Macmillan | |
420 | Cybersecurity and Data Laws of the Commonwealth: International Trade, Investment and Arbitration | Robert Walters | 2023 | Springer | |
421 | A Century of Pulitzer Prize Global Press Coverage 1917-2017: The International Reporting awards from First World War to Cyberwar (Pulitzer Prize Panorama) | Heinz-Dietrich Fischer | 2023 | LIT Verlag | |
422 | Cyber Security and Social Media Applications (Lecture Notes in Social Networks) | Sibel Tariyan Özyer (editor), Buket Kaya (editor) | 2023 | Springer | |
423 | CyberSecurity in a DevOps Environment: From Requirements to Monitoring | Andrey Sadovykh (editor), Dragos Truscan (editor), Wissam Mallouli (editor), Ana Rosa Cavalli (editor), Cristina Seceleanu (editor), Alessandra Bagnato (editor) | 2023 | Springer | |
424 | Cybersecurity and Evolutionary Data Engineering: Select Proceedings of the 2nd International Conference, ICCEDE 2022 (Lecture Notes in Electrical Engineering, 1073) | Raj Jain (editor), Carlos M. Travieso (editor), Sanjeev Kumar (editor) | 2023 | Springer | |
425 | Cybersecurity Vigilance and Security Engineering of Internet of Everything (Internet of Things) | Kashif Naseer Qureshi (editor), Thomas Newe (editor), Gwanggil Jeon (editor), Abdellah Chehri (editor) | 2023 | Springer | |
426 | Digital Sovereignty in Cyber Security: New Challenges in Future Vision: First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers | Antonio Skarmeta (editor), Daniele Canavese (editor), Antonio Lioy (editor), Sara Matheu (editor) | 2023 | Springer | |
427 | Digital Transformation, Cyber Security and Resilience: Second International Conference, DIGILIENCE 2020, Varna, Bulgaria, September 30 – October 2, 2020, Revised Selected Papers | Todor Tagarev (editor), Nikolai Stoianov (editor) | 2023 | Springer | |
428 | Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings | Sanjay Goel (editor), Pavel Gladyshev (editor), Akatyev Nikolay (editor), George Markowsky (editor), Daryl Johnson (editor) | 2023 | Springer | |
429 | Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | Eugene Spafford, Leigh Metcalf, Josiah Dykstra | 2023 | Addison-Wesley Professional | |
430 | Understand, Manage, and Measure Cyber Risk®: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2023 | Apress | |
431 | Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things) | Vinit Kumar Gunjan (editor), Mohd Dilshad Ansari (editor), Mohammed Usman (editor), ThiDieuLinh Nguyen (editor) | 2023 | Springer | |
432 | Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems | Vipin Kumar Kukkala; Sudeep Pasricha | 2023 | Springer Nature | |
433 | Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Hardware Architectures | Sudeep Pasricha (editor), Muhammad Shafique (editor) | 2023 | Springer | |
434 | Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Software Optimizations and Hardware/Software Codesign | Sudeep Pasricha (editor), Muhammad Shafique (editor) | 2023 | Springer | |
435 | Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use Cases and Emerging Challenges | Sudeep Pasricha (editor), Muhammad Shafique (editor) | 2023 | Springer | |
436 | ISA/IEC 62443 Cybersecurity Fundamental Specialist IC32 v4.2 Student Noteset | | 2023 | isa.org | |
437 | ISA/IEC 62443 Cybersecurity Fundamental Specialist IC32 v4.2 Student Noteset | | 2023 | isa.org | |
438 | Science Diplomacy, Cyberdiplomacy and Techplomacy in EU-LAC Relations (United Nations University Series on Regionalism, 25) | Mario Torres Jarrín, Shaun Riordan | 2023 | Springer | |
439 | Society 5.0: Cyber-Solutions for Human-Centric Technologies (Studies in Systems, Decision and Control, 437) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim V. Shcherbakov (editor) | 2023 | Springer | |
440 | Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science, 1683) | Luis Bathen (editor), Gokay Saldamli (editor), Xiaoyan Sun (editor), Thomas H. Austin (editor), Alex J. Nelson (editor) | 2023 | Springer | |
441 | Science of Cyber Security: 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings (Lecture Notes in Computer Science) | Moti Yung (editor), Chao Chen (editor), Weizhi Meng (editor) | 2023 | Springer | |
442 | Cybersecurity for Decision Makers | Narasimha Rao Vajjhala (editor), Kenneth David Strang (editor) | 2023 | CRC Press | |
443 | Fundamental and Applied Scientific Research in the Development of Agriculture in the Far East (AFE-2022): Agricultural Cyber-Physical Systems, Volume 2 (Lecture Notes in Networks and Systems, 706) | Khasanov Sayidjakhon Zokirjon ugli (editor), Aleksei Muratov (editor), Svetlana Ignateva (editor) | 2023 | Springer | |
444 | The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape | IT Governance Publishing (editor) | 2023 | It Governance Publishing | |
445 | The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape | IT Governance Publishing (editor) | 2023 | It Governance Publishing | |
446 | The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape | IT Governance Publishing (editor) | 2023 | It Governance Publishing | |
447 | Exam Ref SC-100 Microsoft Cybersecurity Architect | Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez | 2023 | Microsoft Press | |
448 | Exam Ref SC-100 Microsoft Cybersecurity Architect | Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez | 2023 | Microsoft Press | |
449 | Exam Ref SC-100 Microsoft Cybersecurity Architect | Yuri Diogenes, Sarah Young, Mark Simos, Gladys Rodriguez | 2023 | Microsoft Press | |
450 | Cybersecurity In Poland: Legal Aspects | Katarzyna Chalubinska-Jentkiewicz, Filip Radoniewicz, Tadeusz Zielinski | 2022 | Springer | |
451 | Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools | Abbas Moallem | 2022 | CRC Press | |
452 | Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 | João Manuel R. S. Tavares, Paramartha Dutta, Soumi Dutta, Debabrata Samanta | 2022 | Springer | |
453 | Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) | Ishaani Priyadarshini (editor), Rohit Sharma (editor) | 2022 | CRC Press | |
454 | Understanding Cybersecurity Law and Digital Privacy: A Common Law Perspective | Melissa Lukings, Arash Habibi Lashkari | 2022 | Springer | |
455 | Understanding Cybersecurity Law and Digital Privacy: A Common Law Perspective | Melissa Lukings, Arash Habibi Lashkari | 2022 | Springer | |
456 | Cybersecurity for eHealth: A Simplified Guide to Practical Cybersecurity for Non-technical Stakeholders & Practitioners of Healthcare | Emmanuel C. Ogu | 2022 | Routledge | |
457 | Networked and Event-Triggered Control Approaches in Cyber-Physical Systems | Jinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen | 2022 | CRC Press | |
458 | Cyberphysical Smart Cities Infrastructures: Optimal Operation and Intelligent Decision Making | M. Hadi Amini (editor), Miadreza Shafie-khah (editor) | 2022 | Wiley | |
459 | Cyber-physical Systems and Industry 4.0 : Practical Applications and Security Management | Dinesh Goyal (editor); Karthikrajan Senthilnathan (editor); Mohammad Israr (editor); Shanmugam Balamurugan (editor); Iyswarya Annapoorani (editor) | 2022 | Apple Academic Press Inc. | |
460 | Networked and Event- Triggered Control Approaches in Cyber-Physical Systems | Jinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen | 2022 | CRC Press | |
461 | Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense | Bryson Payne | 2022 | No Starch Press | |
462 | Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO | Dr. Erdal Ozkaya | 2022 | Packt Publishing - ebooks Account | |
463 | Intelligent Workloads at the Edge: Deliver cyber-physical outcomes with data and machine learning using AWS IoT Greengrass | Indraneel Mitra, Ryan Burke | 2022 | Packt Publishing | |
464 | Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework | Cynthia Brumfield | 2022 | Wiley | |
465 | Intelligent Workloads at the Edge: Deliver cyber-physical outcomes with data and machine learning using AWS IoT Greengrass | Indraneel Mitra, Ryan Burke | 2022 | Packt Publishing | |
466 | An Introduction to Cyber Analysis and Targeting | Jerry M. Couretas | 2022 | Springer | |
467 | The CISO Evolution: Business Knowledge for Cybersecurity Executives | Matthew K. Sharp, Kyriakos Lambros | 2022 | Wiley | |
468 | Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) | Stanislav Abaimov, Maurizio Martellini | 2022 | Springer | |
469 | Mathematics in Cyber Research | Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett | 2022 | CRC Press | |
470 | The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode | Dewayne Hart | 2022 | Koehler Books | |
471 | Python for Cybersecurity: Using Python for Cyber Offense and Defense | Howard E Poston | 2022 | Wiley | |
472 | Cyber Security and Digital Forensics: Challenges and Future Trends | Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le | 2022 | Wiley-Scrivener | |
473 | Maritime Cybersecurity A Guide for Leaders and Managers | Gary C. Kessler; Steven D. Shepard | 2022 | | |
474 | Access Control Models and Architectures For IoT and Cyber Physical Systems | Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri, Ravi Sandhu | 2022 | Springer | |
475 | Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation | Myriam Dunn Cavelty, Andreas Wenger | 2022 | Routledge | |
476 | Advances in Information, Communication and Cybersecurity: Proceedings of ICI2C’21 | Yassine Maleh, Mamoun Alazab, Noreddine Gherabi, Lo’ai Tawalbeh, Ahmed A. Abd El-Latif | 2022 | Springer | |
477 | Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies, 109) | Sanjay Misra (editor), Chamundeswari Arumugam (editor) | 2022 | Springer | |
478 | The Art of Cyberwarfare An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime | Jon DiMaggio | 2022 | No Starch Press | |
479 | The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime | Jon DiMaggio | 2022 | No Starch Press | |
480 | The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks | Jeremy Wittkop | 2022 | Packt Publishing | |
481 | Cyber Muslims Mapping Islamic Digital Media in the Digital Age | Robert Rozehnal | 2022 | Bloomsbury Academic | |
482 | Agile Security Operations: Engineering for agility in cyber defense, detection, and response | Hinne Hettema | 2022 | Packt Publishing | |
483 | Agile Security Operations: Engineering for agility in cyber defense, detection, and response | Hinne Hettema | 2022 | Packt Publishing | |
484 | Python for Cybersecurity: Using Python for Cyber Offense and Defense | Howard E. Poston | 2022 | Wiley | |
485 | Secure Data Science: Integrating Cyber Security and Data Science | B. Thuraisngham, M. Kantarcioglu, L. Khan | 2022 | | |
486 | Making Sense of Cyber Capabilities for Small States: Case Studies from the Asia-pacific | Francis C. Domingo | 2022 | Routledge | |
487 | Cybersecurity and High-Performance Computing Environments | Kuan-Ching Li Nitin Sukhija Elizabeth Bautista Jean-Luc Gaudiot | 2022 | Taylor & Francis | |
488 | Cyber Security and Network Security | Sabyasachi Pramanik (editor), Debabrata Samanta (editor), M. Vinay (editor), Abhijit Guha (editor) | 2022 | Wiley-Scrivener | |
489 | Cyber Security Practical Engineering Approach | Henrique Santos | 2022 | | |
490 | Cyber Security (2022) [Lehto Neittaanmaki] [9783030912925] | Lehto Neittaanmaki | 2022 | | |
491 | Cyber Security : Critical Infrastructure Protection | Martti Lehto; Pekka Neittaanmäki | 2022 | Springer International Publishing | |
492 | Semi-State Actors in Cybersecurity | Florian J. Egloff | 2022 | Oxford University Press | |
493 | Semi-State Actors in Cybersecurity | Florian J. Egloff | 2022 | Oxford University Press | |
494 | Security of Biochip Cyberphysical Systems (2022) [Mohammed et al] [9783030932732] | | 2022 | | |
495 | Cybersecurity for dummies. | Joseph Steinberg | 2022 | | |
496 | Cybersecurity and Local Government | Donald F. Norris, Laura K. Mateczun, Richard F. Forno | 2022 | Wiley | |
497 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
498 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
499 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
500 | Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems) | Bishwajeet Pandey, Shabeer Ahmad | 2022 | Chapman & Hall | |
501 | Introduction to the Cyber Ranges (Chapman & Hall/Crc Cyber-physical Systems) | Bishwajeet Pandey, Shabeer Ahmad | 2022 | Chapman & Hall | |
502 | The Cyber Meta-Reality: Beyond the Metaverse | Joshua A. Sipper | 2022 | Lexington Books | |
503 | Cyber Peace: Charting A Path Toward A Sustainable, Stable, And Secure Cyberspace | Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen | 2022 | Cambridge University Press | |
504 | The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime | Jon DiMaggio | 2022 | No Starch Press | |
505 | Cybersecurity For Dummies (For Dummies (Computer/Tech)) | Joseph Steinberg | 2022 | For Dummies | |
506 | CYBER CRIME INVESTIGATOR'S FIELD GUIDE | BRUCE MIDDLETON | 2022 | CRC PRESS | |
507 | Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT | Charles J. Brooks, Philip A. Craig Jr. | 2022 | Wiley | |
508 | Cyber Persistence Theory: Redefining National Security in Cyberspace | Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett | 2022 | Oxford University Press | |
509 | Cybersecurity and Cognitive Science | Ahmed A. Moustafa (editor) | 2022 | Academic Press | |
510 | Cybersecurity and Cognitive Science | Ahmed A. Moustafa (editor) | 2022 | Academic Press | |
511 | Cybersecurity and Cognitive Science | Ahmed A. Moustafa (editor) | 2022 | Academic Press | |
512 | Cyber-Physical Systems: Foundations and Techniques | Uzzal Sharma (editor), Parma Nand (editor), Jyotir Moy Chatterjee (editor), Vishal Jain (editor), Noor Zaman Jhanjhi (editor), R. Sujatha (editor) | 2022 | Wiley-Scrivener | |
513 | Cyber-Physical Systems: Foundations and Techniques | Uzzal Sharma (editor), Parma Nand (editor), Jyotir Moy Chatterjee (editor), Vishal Jain (editor), Noor Zaman Jhanjhi (editor), R. Sujatha (editor) | 2022 | Wiley-Scrivener | |
514 | Holistic Approach to Quantum Cryptography in Cyber Security | Shashi Bhushan; Manoj Kumar; Pramod Kumar; Renjith V Ravi; Anuj Kumar Singh | 2022 | CRC Press | |
515 | The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs | Chad Maurice, Jeremy Thompson, William Copeland | 2022 | Packt Publishing | |
516 | The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs | Chad Maurice, Jeremy Thompson, William Copeland | 2022 | Packt Publishing | |
517 | The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs | Chad Maurice, Jeremy Thompson, William Copeland | 2022 | Packt Publishing | |
518 | Cyber Persistence Theory: Redefining National Security in Cyberspace (Bridging the Gap) | Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett | 2022 | Oxford University Press | |
519 | Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs | Kyle Wilhoit, Joseph Opacki | 2022 | Packt Publishing | |
520 | Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs | Kyle Wilhoit, Joseph Opacki | 2022 | Packt Publishing | |
521 | Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs | Kyle Wilhoit, Joseph Opacki | 2022 | Packt Publishing | |
522 | Handbook of Research of Internet of Things and Cyber-Physical Systems: An Integrative Approach to an Interconnected Future | Amit Kumar Tyagi (editor), Niladhuri Sreenath (editor) | 2022 | Apple Academic Press | |
523 | Handbook of Research of Internet of Things and Cyber-Physical Systems: An Integrative Approach to an Interconnected Future | Amit Kumar Tyagi (editor), Niladhuri Sreenath (editor) | 2022 | Apple Academic Press | |
524 | Strategic Cyber Security Management | Peter Trim, Yang-Im Lee | 2022 | Routledge | |
525 | Strategic Cyber Security Management | Peter Trim, Yang-Im Lee | 2022 | Routledge | |
526 | Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems) | Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia | 2022 | Chapman and Hall/CRC | |
527 | Security and Resilience of Cyber Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems) | Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia | 2022 | Chapman and Hall/CRC | |
528 | Mathematics in cyber research | Paul L. Goethals (editor); Natalie Michele Scala (editor); Daniel T. Bennett (editor) | 2022 | CRC Press | |
529 | Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic | Ryma Abassi (editor), Aida Ben Chehida Douss (editor) | 2022 | Information Science Reference | |
530 | Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic | Ryma Abassi (editor), Aida Ben Chehida Douss (editor) | 2022 | Information Science Reference | |
531 | Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic | Ryma Abassi (editor), Aida Ben Chehida Douss (editor) | 2022 | Information Science Reference | |
532 | Cybersecurity Career Guide | Alyssa Miller | 2022 | Manning Publications | |
533 | Handbook of Research on Cyber Law, Data Protection, and Privacy (Advances in Information Security, Privacy, and Ethics) | Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (editor), Mamta Sharma (editor), Shaharyar Asaf Khan (editor) | 2022 | Information Science Reference | |
534 | Handbook of Research on Cyber Law, Data Protection, and Privacy (Advances in Information Security, Privacy, and Ethics) | Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (editor), Mamta Sharma (editor), Shaharyar Asaf Khan (editor) | 2022 | Information Science Reference | |
535 | Handbook of Research on Cyber Law, Data Protection, and Privacy (Advances in Information Security, Privacy, and Ethics) | Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (editor), Mamta Sharma (editor), Shaharyar Asaf Khan (editor) | 2022 | Information Science Reference | |
536 | IEEE Systems, Man, & Cybernetics Magazine | | 2022 | | |
537 | Cybersecurity Awareness (Advances in Information Security, 88) | Jerry Andriessen (editor), Thomas Schaberreiter (editor), Alexandros Papanikolaou (editor), Juha Röning (editor) | 2022 | Springer | |
538 | Cybersecurity Awareness (Advances in Information Security, 88) | Jerry Andriessen (editor), Thomas Schaberreiter (editor), Alexandros Papanikolaou (editor), Juha Röning (editor) | 2022 | Springer | |
539 | Cybersecurity Career Guide | Alyssa Miller | 2022 | Manning | |
540 | Cybersecurity and Identity Access Management | Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter | 2022 | Springer | |
541 | Cybersecurity Measures for E-Government Frameworks (Advances in Electronic Government, Digital Divide, and Regional Development) | Noor Zaman (editor), Imdad Ali Shah (editor), Samina Rajper (editor) | 2022 | Information Science Reference | |
542 | Cyber Security Threats and Challenges Facing Human Life | Hari Vasudevan (editor), Surya S Durbha (editor), Antonis Michalas (editor), Monika Mangla (editor), Narendra M Shekokar (editor), Tatwadarshi P Nagarhalli (editor), Ramchandra Sharad Mangrulkar (editor) | 2022 | Chapman and Hall/CRC | |
543 | Real-time Applications of Machine Learning in Cyber-physical Systems (Advances in Computational Intelligence and Robotics) | Balamurugan Easwaran (editor), Kamal Kant Hiran (editor), Sangeetha Krishnan (editor), Ruchi Doshi (editor) | 2022 | Engineering Science Reference | |
544 | Real-time Applications of Machine Learning in Cyber-physical Systems (Advances in Computational Intelligence and Robotics) | Balamurugan Easwaran (editor), Kamal Kant Hiran (editor), Sangeetha Krishnan (editor), Ruchi Doshi (editor) | 2022 | Engineering Science Reference | |
545 | A Brief History of Cyberspace | Huansheng Ning | 2022 | CRC Press | |
546 | Security Engineering for Embedded and Cyber-Physical Systems | Saad Motahhir, Yassine Maleh | 2022 | CRC Press | |
547 | Strategic Cyber Security Management | Peter Trim, Yang-Im Lee | 2022 | Routledge | |
548 | Russian Information Warfare: Assault on Democracies in the Cyber Wild West | Bilyana Lilly | 2022 | Naval Institute Press | |
549 | Russian Information Warfare: Assault on Democracies in the Cyber Wild West | Bilyana Lilly | 2022 | Naval Institute Press | |
550 | Theoretical Cybersecurity: Principles and Advanced Concepts | Jacob G. Oakley; Michael Butler; Matthew Puckett; J. Louis Sewell; Wayne York | 2022 | Apress | |
551 | Theoretical Cybersecurity: Principles and Advanced Concepts | Jacob G. Oakley; Michael Butler; Matthew Puckett; J. Louis Sewell; Wayne York | 2022 | Apress | |
552 | Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021 | Pradeep Kumar Singh, Slawomir T. Wierzchon, Sudeep Tanwar, Joel J. P. C. Rodrigues, Maria Ganzha | 2022 | Springer | |
553 | Brutal Kangaroo: WikiLeaks Verdict Against Josh Schulte, and Other Whistleblowers: Convicted of sending the CIA's Vault 7 cyber tools to Wikileaks, Schulte remains in jail under DOJ SAMs. And others? | Matthew Russell Lee | 2022 | | |
554 | Cybersecurity for Artificial Intelligence | Mark Stamp; Corrado Aaron Visaggio; Francesco Mercaldo; Fabio Di Troia | 2022 | Springer | |
555 | Microgrid Cyberphysical Systems: Renewable Energy and Plug-in Vehicle Integration | Bidyadhar Subudhi (editor), Pravat Kumar Ray (editor) | 2022 | Elsevier | |
556 | Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) | Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) | 2022 | Springer | |
557 | Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) | Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) | 2022 | Springer | |
558 | Cybersecurity for Artificial Intelligence (Advances in Information Security, 54) | Mark Stamp (editor), Corrado Aaron Visaggio (editor), Francesco Mercaldo (editor), Fabio Di Troia (editor) | 2022 | Springer | |
559 | Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings (Lecture Notes in Computer Science, 13301) | Shlomi Dolev (editor), Jonathan Katz (editor), Amnon Meisels (editor) | 2022 | Springer | |
560 | Cybersecurity and Identity Access Management | Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter | 2022 | Springer | |
561 | Cybersecurity and Identity Access Management | Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter | 2022 | Springer | |
562 | Cybersecurity and Identity Access Management | Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter | 2022 | Springer | |
563 | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Application and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) | Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) | 2022 | Chapman and Hall/CRC | |
564 | Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development | Frank J. Furrer | 2022 | Springer Vieweg | |
565 | Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development | Frank J. Furrer | 2022 | Springer Vieweg | |
566 | Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development | Frank J. Furrer | 2022 | Springer Vieweg | |
567 | Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources | Morey J. Haber, Brian Chappell, Christopher Hills | 2022 | Apress | |
568 | Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources | Morey J. Haber, Brian Chappell, Christopher Hills | 2022 | Apress | |
569 | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) | Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) | 2022 | Chapman and Hall/CRC | |
570 | Machine Learning, Blockchain, and Cyber Security in Smart Environments: Applications and Challenges (Chapman & Hall/CRC Cyber-Physical Systems) | Sarvesh Tanwar (editor), Sumit Badotra (editor), Ajay Rana (editor) | 2022 | Chapman and Hall/CRC | |
571 | Cyberpredators and Their Prey | Lauren R. Shapiro | 2022 | CRC Press | |
572 | Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career | Ken Underhill, Christophe Foulon, Tia Hopkins | 2022 | Packt Publishing | |
573 | Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career | Ken Underhill, Christophe Foulon, Tia Hopkins | 2022 | Packt Publishing | |
574 | Cyber And The City: Securing London’s Banks In The Computer Age | Ashley Sweetman | 2022 | Springer | |
575 | Exploring Careers in Cybersecurity and Digital Forensics | Lucy K. Tsado, Robert Osgood | 2022 | Rowman & Littlefield Publishers | |
576 | Exploring Careers in Cybersecurity and Digital Forensics | Lucy K. Tsado, Robert Osgood | 2022 | Rowman & Littlefield Publishers | |
577 | Executive's Guide to Cyber Risk: Securing the Future Today | Siegfried Moyo | 2022 | Wiley | |
578 | Executive's Guide to Cyber Risk: Securing the Future Today | Siegfried Moyo | 2022 | Wiley | |
579 | Executive's Guide to Cyber Risk: Securing the Future Today | Siegfried Moyo | 2022 | Wiley | |
580 | Executive's Guide to Cyber Risk: Securing the Future Today | Siegfried Moyo | 2022 | Wiley | |
581 | Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th Edition | Vijay Kumar Velu | 2022 | Packt Publishing | |
582 | Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th Edition | Vijay Kumar Velu | 2022 | Packt Publishing | |
583 | Mastering Kali Linux for Advanced Penetration Testing: Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite, 4th Edition | Vijay Kumar Velu | 2022 | Packt Publishing | |
584 | Decision Advantage: Intelligence in International Politics from the Spanish Armada to Cyberwar | Jennifer E. Sims | 2022 | Oxford University Press | |
585 | From City Space to Cyberspace: Art, Squatting, and Internet Culture in the Netherlands | Amanda Wasielewski | 2022 | Amsterdam University Press | |
586 | Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and Applications | Olivier Cardin, William Derigent, Damien Trentesaux | 2022 | Wiley-ISTE | |
587 | Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control | Masoud Abbaszadeh, Ali Zemouche | 2022 | Springer | |
588 | Cybercrimes and Financial Crimes in the Global Era | Yanping Liu, Minghai Tian, Yanming Shao | 2022 | Springer | |
589 | Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control | Masoud Abbaszadeh, Ali Zemouche | 2022 | Springer | |
590 | Cyber Security and Critical Infrastructures | Leandros Maglaras; Helge Janicke; Mohamed Amine Ferrag (eds.) | 2022 | MDPI | |
591 | Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control | Masoud Abbaszadeh (editor), Ali Zemouche (editor) | 2022 | Springer | |
592 | Security and Resilience in Cyber-Physical Systems: Detection, Estimation and Control | Masoud Abbaszadeh (editor), Ali Zemouche (editor) | 2022 | Springer | |
593 | Data Analytics for Cybersecurity | Vandana P. Janeja | 2022 | Cambridge University Press | |
594 | Cybersecurity and digital forensics : challenges and future paradigms | Randal Joyce; Abdulrahman Yarali; Faris Sahawneh | 2022 | Nova Science Publishers | |
595 | Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition | Mark Dunkerley, Matt Tumbarello | 2022 | Packt Publishing | |
596 | Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition | Mark Dunkerley, Matt Tumbarello | 2022 | Packt Publishing | |
597 | Cyberhate in the Context of Migrations | Angeliki Monnier, Axel Boursier, Annabelle Seoane | 2022 | Palgrave Macmillan | |
598 | Cyber Security for Beginners: A Comprehensive and Essential Guide for Every Novice to Understand and Master Cybersecurity | Liam Smith | 2022 | Independently published | |
599 | Complex Systems: Spanning Control and Computational Cybernetics: Foundations: Dedicated to Professor Georgi M. Dimirovski on his Anniversary | Peng Shi, Jovan Stefanovski, Janusz Kacprzyk | 2022 | Springer | |
600 | Advances in Blockchain Technology for Cyber Physical Systems | Yassine Maleh, Lo’ai Tawalbeh, Saad Motahhir, Abdelhakim Senhaji Hafid | 2022 | Springer | |
601 | The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War | Geoff White | 2022 | Penguin Business | |
602 | Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices | Dr. Erdal Ozkaya | 2022 | BPB Publications | |
603 | Security and Privacy in Cyberspace | Omprakash Kaiwartya, Keshav Kaushik, Sachin Kumar Gupta, Ashutosh Mishra, Manoj Kumar | 2022 | Springer | |
604 | Cyber Security Applications for Industry 4.0 | R. Sujatha, G. Prakash, Noor Zaman Jhanjhi | 2022 | CRC Press/Chapman & Hall | |
605 | Cyber Security Applications for Industry 4.0 (Chapman & Hall/CRC Cyber-Physical Systems) | R Sujatha (editor), G Prakash (editor), Noor Zaman Jhanjhi (editor) | 2022 | Chapman and Hall/CRC | |
606 | Defending Cyber Systems through Reverse Engineering of Criminal Malware | Marwan Omar | 2022 | Springer | |
607 | Big Data Analytics and Computational Intelligence for Cybersecurity | Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Kaosar | 2022 | Springer | |
608 | Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks | Josephine Wolff | 2022 | The MIT Press | |
609 | Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods | Ashish Mishra | 2022 | BPB Publications | |
610 | Secure and Trusted Cyber Physical Systems: Recent Approaches and Future Directions | Shantanu Pal, Zahra Jadidi, Ernest Foo | 2022 | Springer | |
611 | The Rule of Law in Cyberspace | Carlos Blanco de Morais, Gilmar Ferreira Mendes, Thomas Vesting | 2022 | Springer | |
612 | Conflicts, Crimes and Regulations in Cyberspace | Sébastien-Yves Laurent | 2022 | Wiley-ISTE | |
613 | Advances in Nature-Inspired Cyber Security and Resilience | Shishir Kumar Shandilya, Neal Wagner, V.B. Gupta, Atulya K. Nagar | 2022 | Springer | |
614 | Aviation Cybersecurity: Foundations, principles, and applications | Houbing Song, Kenneth Hopkinson, Tomaso De Cola, Tom Alexandrovich, Dahai Liu | 2022 | Scitech Publishing | |
615 | Evidence-Based Cybersecurity: Foundations, Research, and Practice | Pierre-Luc Pomerleau, David Maimon | 2022 | CRC Press | |
616 | Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation | Claudia Lanza | 2022 | CRC Press | |
617 | The Great Power Competition, Volume 3: Cyberspace: The Fifth Domain | Adib Farhadi, Ronald P. Sanders, Anthony Masys | 2022 | Springer | |
618 | Cybersecurity for Coaches and Therapists A Practical Guide for Protecting Client Data | Alexandra J.S. Fouracres | 2022 | Routledge | |
619 | Cybersecurity in Smart Homes: Architectures, Solutions and Technologies | Rida Khatoun | 2022 | Wiley-ISTE | |
620 | Cyber-physical Systems: Theory, Methodology, and Applications | Pedro H. J. Nardelli | 2022 | Wiley-IEEE Press | |
621 | Cyber Security for Microgrids | Subham Sahoo, Frede Blaabjerg, Tomislav Dragicevic | 2022 | The Institution of Engineering and Technology | |
622 | The CISO Evolution: Business Knowledge for Cybersecurity Executives | Matthew K. Sharp; Kyriakos P. Lambros | 2022 | Wiley | |
623 | Mastering Cyber Intelligence | Jean Nestor M. Dahj; | 2022 | Packt | |
624 | Machine Learning for Cybersecurity: Innovative Deep Learning Solutions | Marwan Omar | 2022 | Springer | |
625 | Offensive Cyber Operations | Daniel Moore; | 2022 | LightningSource | |
626 | Weaponizing Cyberspace | Nicholas Michael Sambaluk | 2022 | ABC-CLIO | |
627 | Cyberhate: The Far Right in the Digital Age | James Bacigalupo | 2022 | Lexington Books | |
628 | Big Data Management and Analysis for Cyber Physical Systems: Selected Papers of BDET 2022 | Loon Ching Tang, Hongzhi Wang | 2022 | Springer | |
629 | Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks | Alexey Kleymenov, Amr Thabet | 2022 | Packt Publishing | |
630 | Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid | Seth Enoka | 2022 | No Starch Press | |
631 | Cybersecurity (Chapman & Hall/CRC Textbooks in Computing) | Henrique M. D. Santos | 2022 | Chapman and Hall/CRC | |
632 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco, Bob Maley | 2022 | CRC Press | |
633 | Rethinking European Cyber Defense Policy : Toward a Defense Superiority Doctrine | Valentin Weber | 2022 | Deutsche Gesellschaft für Auswärtige Politik | |
634 | A Reliable Global Cyber Power : Cyberspace and Germany’s National Security Strategy | Valentin Weber | 2022 | Deutsche Gesellschaft für Auswärtige Politik | |
635 | Cybersecurity – Attack and Defense Strategies | Yuri Diogenes, Dr. Erdal Ozkaya | 2022 | Packt Publishing | |
636 | Cybersecurity – Attack and Defense Strategies | Yuri Diogenes, Dr. Erdal Ozkaya | 2022 | Packt Publishing | |
637 | Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers | Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan | 2022 | Springer | |
638 | Cybersecurity – Attack and Defense Strategies | Yuri Diogenes, Erdal Ozkaya | 2022 | Packt | |
639 | Cybersecurity – Attack and Defense Strategies: Improve your security posture to mitigate risks and prevent attackers from infiltrating your system, 3rd Edition | Yuri Diogenes, Dr. Erdal Ozkaya | 2022 | Packt Publishing | |
640 | Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and Applications | Olivier Cardin, William Derigent, Damien Trentesaux | 2022 | Wiley-ISTE | |
641 | Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries | Bradley Fowler, Kennedy Maranga | 2022 | CRC Press | |
642 | Cyber Investigations : A Research Based Textbook for Advanced Studies | Årnes, André; | 2022 | John Wiley & Sons, Incorporated | |
643 | Cyber-Security Threats and Response Models in Nuclear Power Plants | Carol Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao, Linan Huang, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski | 2022 | Springer | |
644 | Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective | Melissa Lukings, Arash Habibi Lashkari | 2022 | Springer | |
645 | Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2021 (Algorithms for Intelligent Systems) | Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor) | 2022 | Springer | |
646 | Cyberinsurance Policy: Rethinking Risk In An Age Of Ransomware, Computer Fraud, Data Breaches, And Cyberattacks | Josephine Wolff | 2022 | The MIT Press | |
647 | Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the Body | Bernard Widrow | 2022 | Springer | |
648 | Ransomware and Cyber Extortion: Response and Prevention | Sherri Davidoff, Matt Durrin, Karen Sprenger | 2022 | Addison-Wesley Professional | |
649 | Break in Cyber Playbook | Mike Miller | 2022 | | |
650 | The New Technological Condition: Architecture and Technical Thinking in the Age of Cybernetics | Georg Vrachliotis | 2022 | Birkhäuser | |
651 | Handbook on Artificial Intelligence-Empowered Applied Software Engineering: VOL.2: Smart Software Applications in Cyber-Physical Systems | Maria Virvou, George A. Tsihrintzis, Nikolaos G. Bourbakis, Lakhmi C. Jain | 2022 | Springer | |
652 | Handbook on Artificial Intelligence-Empowered Applied Software Engineering: VOL.2: Smart Software Applications in Cyber-Physical Systems | Maria Virvou, George A. Tsihrintzis, Nikolaos G. Bourbakis, Lakhmi C. Jain | 2022 | Springer | |
653 | Cyber-Physical Systems: Solutions to Pandemic Challenges | Tushar Semwal, Faiz Iqbal | 2022 | CRC Press/Science Publishers | |
654 | Cyber Careers: The Basics of Information Technology and Deciding on a Career Path | Pee Vululleh | 2022 | CRC Press | |
655 | Cross-industry Applications of Cyber Security Frameworks | Sukanta Baral, Richa Goel, Mashiur Rahman, Jahangir Sultan, Sarkar Jahan | 2022 | Information Science Reference | |
656 | Cross-Industry Applications of Cyber Security Frameworks | Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman | 2022 | IGI Global | |
657 | Cross-Industry Applications of Cyber Security Frameworks | Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman | 2022 | IGI Global | |
658 | Losing the Cybersecurity War: And What We Can Do to Stop It | Steve King, Kiren Chaudry | 2022 | CRC Press | |
659 | Cyber Security and Operations Management for Industry 4.0 | Ahmed A Elngar; N Thillaiarasu; Mohamed Elhoseny; K Martin Sagayam | 2022 | CRC Press | |
660 | Python for Cybersecurity: Using Python for Cyber Offense and Defense | Howard E. Poston III | 2022 | Wiley | |
661 | Cyberterrorism | Erica Grove | 2022 | Greenhaven Publishing LLC | |
662 | Cybersecurity Risk Management: An ERM Approach | Kok-Boon Oh | 2022 | Nova Science Publishers | |
663 | Making Sense of Cybersecurity | Thomas Kranz | 2022 | Manning Publications Co. | |
664 | Convergence of Deep Learning in Cyber-IoT Systems and Security | Rajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal, S. Balamurugan | 2022 | Wiley-Scrivener | |
665 | The Ransomware Hunting Team - A Band of Misfits' Improbable Crusade to Save the World from Cybercrime | Renee Dudley | 2022 | Farrar, Straus and Giroux | |
666 | Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity | Leeza Garber; Scott Olson | 2022 | Business Expert Press | |
667 | Cybersecurity: A Practical Engineering Approach | Henrique M. D. Santos | 2022 | CRC Press/Chapman & Hall | |
668 | Smart Cities: Cyber Situational Awareness to Support Decision Making | Nataliia Neshenko, Elias Bou-Harb, Borko Furht | 2022 | Springer | |
669 | Cybersecurity in Intelligent Networking Systems (IEEE Press) | Shengjie Xu, Yi Qian, Rose Qingyang Hu | 2022 | Wiley-IEEE Press | |
670 | Cybersecurity in Intelligent Networking Systems (IEEE Press) | Shengjie Xu, Yi Qian, Rose Qingyang Hu | 2022 | Wiley-IEEE Press | |
671 | Cybersecurity in Intelligent Networking Systems (IEEE Press) | Shengjie Xu, Yi Qian, Rose Qingyang Hu | 2022 | Wiley-IEEE Press | |
672 | Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management | Jyoti Sekhar Banerjee, Siddhartha Bhattacharyya, Ahmed J. Obaid, Wei-Chang Yeh | 2022 | CRC Press/Chapman & Hall | |
673 | Cyberwarfare: Threats to Critical Infrastructure | Kristan Stoddart | 2022 | Palgrave Macmillan | |
674 | Emerging Trends in Cybersecurity Applications | Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun | 2022 | Springer | |
675 | Advances in Cyber Security and Intelligent Analytics | Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas | 2022 | CRC Press | |
676 | Machine Learning for Cyber Security | Preeti Malik, Lata Nautiyal, Mangey Ram | 2022 | De Gruyter | |
677 | Artificial Intelligence for Cyber-Physical Systems Hardening | Issa Traore, Isaac Woungang, Sherif Saad | 2022 | Springer | |
678 | Information Systems Security: in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Turbulent Times | Kennedy Njenga | 2022 | Nova Science Publishers | |
679 | Cybersecurity Ethics: An Introduction | Mary Manjikian | 2022 | Routledge | |
680 | Information Systems Security in Small and Medium-Sized Enterprises. Emerging Cybersecurity Threats in Times of Turbulence | Kennedy Njenga | 2022 | | |
681 | Cyberwarfare. Threats to Critical Infrastructure | Kristan Stoddart | 2022 | Palgrave Macmillan | |
682 | Frontiers in Cyber Security: 5th International Conference, FCS 2022, Kumasi, Ghana, December 13–15, 2022, Proceedings | Emmanuel Ahene, Fagen Li | 2022 | Springer | |
683 | Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid | Seth Enoka | 2022 | No Starch Press | |
684 | Artificial Intelligence and Cybersecurity: Theory and Applications | Tuomo Sipola, Tero Kokkonen, Mika Karjalainen | 2022 | Springer | |
685 | Digital Forensics and Incident Response Incident response tools and techniques for effective cyber threat response | Gerard Johansen | 2022 | Packt Publishing | |
686 | Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers | Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li | 2022 | Springer | |
687 | Cybersecurity and Privacy Law Handbook: A beginner’s guide to dealing with privacy and security while keeping hackers at bay | Walter Rocchi | 2022 | Packt Publishing | |
688 | Cybersecurity Policy in the EU and South Korea from Consultation to Action: Theoretical and Comparative Perspectives | Gertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo | 2022 | Palgrave Macmillan | |
689 | Internet of Things and Cyber Physical Systems: Security and Forensics | Keshav Kaushik, Susheela Dahiya, Akashdeep Bhardwaj, Yassine Maleh | 2022 | CRC Press | |
690 | Translation, Disinformation, and Wuhan Diary: Anatomy of a Transpacific Cyber Campaign | Michael Berry | 2022 | Palgrave Macmillan | |
691 | Digital Grooming: Discourses of Manipulation and Cyber-Crime | Nuria Lorenzo-Dus | 2022 | Oxford University Press | |
692 | An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments | Kushantha Gunawardana | 2022 | Packt Publishing | |
693 | Managing Cybersecurity in the Process Industries: A Risk-based Approach | CCPS (Center for Chemical Process Safety) | 2022 | Wiley-AIChE | |
694 | Ransomware and Cybercrime | Andrew Jenkinson | 2022 | CRC Press | |
695 | Cyber-Physical Systems in the Construction Sector | Wesam Salah Alaloul | 2022 | CRC Press | |
696 | Intelligent Cyber-Physical Systems for Autonomous Transportation | Sahil Garg, Gagangeet Singh Aujla, Kuljeet Kaur, Syed Hassan Ahmed Shah | 2022 | Springer | |
697 | Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 | Dharma P. Agrawal, Nadia Nedjah, B. B. Gupta, Gregorio Martinez Perez | 2022 | Springer | |
698 | Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future | Aaron Mauro | 2022 | Bloomsbury Academic | |
699 | Internet of Things: Security and Privacy in Cyberspace | Sandeep Saxena, Ashok Kumar Pradhan | 2022 | Springer | |
700 | How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO | Ravi Das | 2022 | CRC Press/Auerbach | |
701 | Cyber-Physical Systems: A Comprehensive Guide | Nonita Sharma, L. K. Awasthi, Monika Mangla, K. P. Sharma, Rohit Kumar | 2022 | CRC Press/Chapman & Hall | |
702 | Relax: A Guide To True Cyber Security | J. Kenneth Fanger | 2022 | James Kenneth Fanger | |
703 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco, Bob Maley | 2022 | CRC Press | |
704 | ISO/IEC 27001:2022: Information security, cybersecurity and privacy protection — Information security management systems — Requirements | ISO | 2022 | ISO | |
705 | Methods, Implementation, and Application of Cyber Security Intelligence and Analytics | Jena Om Prakash, H. L. Gururaj, M. R. Pooja, S. P. Pavan Kumar | 2022 | Information Science Reference | |
706 | Industrial Cybersecurity Case Studies and Best Practices | Mustard, Steve | 2022 | ISA - International Society of Automation | |
707 | Striking Back: The End of Peace in Cyberspace - And How to Restore It | Lucas Kello | 2022 | Yale University Press | |
708 | Encyclopedia Cyberspacia | | 2022 | | |
709 | Smart Cities: Cyber Situational Awareness to Support Decision Making | Nataliia Neshenko, Elias Bou-Harb, Borko Furht | 2022 | Springer | |
710 | Security and Privacy in Cyberspace | Omprakash Kaiwartya, Keshav Kaushik, Sachin Kumar Gupta, Ashutosh Mishra, Manoj Kumar | 2022 | Springer | |
711 | Introduction to the Cyber Ranges | Bishwajeet Pandey, Shabeer Ahmad | 2022 | CRC Press | |
712 | Cyber Security Meets National Security: International Perspectives on Digital Era Threats | Neil Kent, Irina du Quenoy | 2022 | Academica Press | |
713 | Building a Cyber Resilient Business | Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran | 2022 | Packt Publishing Limited | |
714 | Building a Cyber Resilient Business: A cyber handbook for executives and boards | Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran | 2022 | Packt Publishing | |
715 | Cyber War and Cyber Peace: Digital Conflict in the Middle East | Mike Sexton, Eliza Campbell | 2022 | Bloomsbury Publishing | |
716 | Fifty Key Figures in Cyberpunk Culture | Anna McFarlane, Graham J. Murphy, Lars Schmeink | 2022 | Routledge | |
717 | Cybermedia: Explorations in Science, Sound, and Vision | Carol Vernallis; Holly Rogers; Selmin Kara; Jonathan Leal (editors) | 2022 | Bloomsbury Academic | |
718 | Cyber Muslims: Mapping Islamic Digital Media in the Internet Age | Robert Rozehnal (editor) | 2022 | Bloomsbury Academic | |
719 | The EU as a Global Digital Actor: Institutionalising Global Data Protection, Trade, and Cybersecurity | Elaine Fahey | 2022 | Hart Publishing | |
720 | Cyber War and Cyber Peace: Digital Conflict in the Middle East | Mike Sexton; Eliza Campbell (editors) | 2022 | I.B. Tauris | |
721 | Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future | Aaron Mauro | 2022 | Bloomsbury Academic | |
722 | Machine Learning for Cyber Security | Preeti Malik (editor); Lata Nautiyal (editor); Mangey Ram (editor) | 2022 | De Gruyter | |
723 | Striking Back: The End of Peace in Cyberspace - And How to Restore It | Lucas Kello | 2022 | Yale University Press | |
724 | Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue | Larry Clinton | 2022 | Kogan Page | |
725 | Fundamentals of Adopting the NIST Cybersecurity Framework | David Nichols, David Moskowitz | 2022 | The Stationery Office Ltd | |
726 | Success Cybernetics (Unabridged edition) | Uell S. Andersen | 2022 | UELL S. ANDERSEN | |
727 | Cyber Crime Investigator's Field Guide | Bruce Middleton | 2022 | Auerbach Publications | |
728 | Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime | Nearchos Nearchou | 2022 | Packt Publishing | |
729 | The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks | Jeremy Wittkop | 2022 | Packt Publishing | |
730 | The Informational Logic of Human Rights: Network Imaginaries in the Cybernetic Age | Joshua Bowsher | 2022 | Edinburgh University Press | |
731 | ISO/IEC 27005:2022 Information security, cybersecurity and privacy protection — Guidance on managing information security risks | ISO | 2022 | ISO | |
732 | Practical Industrial Cybersecurity: Ics, Industry 4.0, and Iiot | Philip A Craig; Charles J Brooks | 2022 | Wiley | |
733 | Cyber Security and Digital Forensics: Challenges and Future Trends | Sabyasachi Pramanik | 2022 | Wiley-Scrivener | |
734 | Cyber Persistence Theory: Redefining National Security in Cyberspace | Michael P. Fischerkeller; Emily O. Goldman; Richard J. Harknett | 2022 | Oxford University Press | |
735 | Holistic Approach to Quantum Cryptography in Cyber Security | Shashi Bhushan | 2022 | CRC Press | |
736 | Cyber-Physical Systems in the Construction Sector | Wesam Salah Alaloul | 2022 | CRC Press | |
737 | Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) | Shaun Kimmons | 2022 | Felix Walter | |
738 | A Straightforward Guide to Cyber Security For Small to Medium Size Business: How to Ensure Your Business is Prepared to Combat a Cyber Attack | David Marsh | 2022 | Straightforward Publishing | |
739 | Cyber-physical Systems: Theory, Methodology, and Applications (IEEE Press) | Pedro H. J. Nardelli | 2022 | Wiley-IEEE Press | |
740 | How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO | Ravi Das | 2022 | Auerbach Publications | |
741 | Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers | Wei Lu; Yuqing Zhang; Weiping Wen; Hanbing Yan; Chao Li | 2022 | Springer Singapore Pte. Limited | |
742 | Cyber Troops, Online Manipulation of Public Opinion and Co-optation of Indonesia’s Cybersphere | Yatun Sastramidjaja; Wijayanto | 2022 | ISEAS Publishing | |
743 | Between Page and Screen: Remaking Literature Through Cinema and Cyberspace | Kiene Brillenburg Wurth (editor) | 2022 | Fordham University Press | |
744 | Launching into Cyberspace: Internet and Politics in Five World Regions | Marcus Franda | 2022 | Lynne Rienner Publishers | |
745 | Cybersexualities: A Reader in Feminist Theory, Cyborgs and Cyberspace | Jenny Wolmark | 2022 | Edinburgh University Press | |
746 | Chinese Stardom in Participatory Cyberculture | Dorothy Wai Sim Lau | 2022 | Edinburgh University Press | |
747 | Making Sense of Cybersecurity | Thomas Kranz | 2022 | Manning Publications Co. | |
748 | Sacred Cyberspaces: Catholicism, New Media, and the Religious Experience | Oren Golan; Michele Martini | 2022 | McGill-Queen's University Press | |
749 | Cyber-Threats to Canadian Democracy | Holly Ann Garnett (editor); Michael Pal (editor) | 2022 | McGill-Queen's University Press | |
750 | IEEE Systems, Man and Cybernetics Magazine | | 2022 | | |
751 | IEEE Systems, Man and Cybernetics Magazine | | 2022 | | |
752 | IEEE Systems, Man and Cybernetics Magazine | | 2022 | | |
753 | Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid | Seth Enoka | 2022 | No Starch Press | |
754 | Cybercrime and Digital Forensics: An Introduction | Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar | 2022 | Routledge | |
755 | Cybercrime and Digital Forensics: An Introduction - 3rd Edition | Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar | 2022 | Routledge | |
756 | Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense | Bryson Payne | 2022 | No Starch Press | |
757 | ISO/IEC 27001 - Information security, cybersecurity and privacy protection | International Organization for Standardization, International Electrotechnical Commission | 2022 | ISO/IEC | |
758 | Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools (Lecture Notes in Computer Science, 13300) | Joanna Kolodziej (editor), Matteo Repetto (editor), Armend Duzha (editor) | 2022 | Springer | |
759 | Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools | Joanna Kolodziej; Matteo Repetto; Armend Duzha | 2022 | Springer Nature | |
760 | Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 – July 1, 2022, Proceedings | Shlomi Dolev; Jonathan Katz; Amnon Meisels | 2022 | Springer Nature | |
761 | Microgrid Cyberphysical Systems: Renewable Energy and Plug-in Vehicle Integration | Bidyadhar Subudhi (editor), Pravat Kumar Ray (editor) | 2022 | Elsevier | |
762 | Advances in Nature-Inspired Cyber Security and Resilience | Shishir Kumar Shandilya; Neal Wagner; V.B. Gupta; Atulya K. Nagar | 2022 | Springer Nature | |
763 | Cyber-Physical Systems: Solutions to Pandemic Challenges | Tushar Semwal; Faiz Iqbal | 2022 | CRC Press | |
764 | Managing Cybersecurity in the Process Industries: A Risk-based Approach | CCPS (Center for Chemical Process Safety) | 2022 | Wiley-AIChE | |
765 | Advances in Computing, Informatics, Networking and Cybersecurity: A Book Honoring Professor Mohammad S. Obaidat’s Significant Scientific Contributions | Petros Nicopolitidis; Sudip Misra; Laurence T. Yang; Bernard Zeigler; Zhaolng Ning | 2022 | Springer Nature | |
766 | Advances in Computing, Informatics, Networking and Cybersecurity: A Book Honoring Professor Mohammad S. Obaidat’s Significant Scientific Contributions (Lecture Notes in Networks and Systems, 289) | Petros Nicopolitidis (editor), Sudip Misra (editor), Laurence T. Yang (editor), Bernard Zeigler (editor), Zhaolng Ning (editor) | 2022 | Springer | |
767 | Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience | Charlette Donalds; Corlane Barclay; Kweku-Muata Osei-Bryson | 2022 | Routledge | |
768 | Weaponizing Cyberspace: Inside Russia's Hostile Activities (Praeger Security International) | Nicholas Sambaluk | 2022 | Praeger | |
769 | Cybersecurity For Dummies (For Dummies (Computer/Tech)) | Joseph Steinberg | 2022 | For Dummies | |
770 | The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks | Jeremy Wittkop | 2022 | Packt Publishing | |
771 | Ransomware and Cybercrime | Andrew Jenkinson | 2022 | CRC Press | |
772 | Agile Security Operations: Engineering for agility in cyber defense, detection, and response | Hinne Hettema | 2022 | Packt Publishing | |
773 | Cyber Peace: Charting a Path Toward a Sustainable, Stable, and Secure Cyberspace | Scott J. Shackelford (editor), Frederick Douzet (editor), Christopher Ankersen (editor) | 2022 | Cambridge University Press | |
774 | Cybersecurity: A Practical Engineering Approach | Henrique M D Santos | 2022 | CRC Press | |
775 | Cybersecurity in Morocco (SpringerBriefs in Cybersecurity) | Yassine Maleh, Youness Maleh | 2022 | Springer | |
776 | The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity | Tine Munk | 2022 | Routledge | |
777 | An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments | Kushantha Gunawardana | 2022 | Packt Publishing | |
778 | Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense | Bryson Payne | 2022 | No Starch Press | |
779 | The Art of Cyber Security: A practical guide to winning the war on cyber crime | IT Governance Publishing (editor) | 2022 | It Governance Publishing | |
780 | Cybersecurity in Morocco (SpringerBriefs in Cybersecurity) | Yassine Maleh, Youness Maleh | 2022 | Springer | |
781 | Cybercomplexity: A Macroscopic View of Cybersecurity Risk (Advanced Sciences and Technologies for Security Applications) | Carl S. Young | 2022 | Springer | |
782 | Cyber-Physical Systems: Intelligent Models and Algorithms (Studies in Systems, Decision and Control, 417) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor) | 2022 | Springer | |
783 | Cyber Security in Intelligent Computing and Communications (Studies in Computational Intelligence, 1007) | Rajeev Agrawal (editor), Jing He (editor), Emmanuel Shubhakar Pilli (editor), Sanjeev Kumar (editor) | 2022 | Springer | |
784 | Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2021 (Algorithms for Intelligent Systems) | Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor) | 2022 | Springer | |
785 | Cybersecurity: A New Approach Using Chaotic Systems (Studies in Big Data, 102) | Ahmed A. Abd El-Latif (editor), Christos Volos (editor) | 2022 | Springer | |
786 | Cyber Technologies and Emerging Sciences: ICCTES 2021 (Lecture Notes in Networks and Systems, 467) | Sudhanshu Maurya (editor), Sateesh K. Peddoju (editor), Badlishah Ahmad (editor), Ines Chihi (editor) | 2022 | Springer | |
787 | Complex Systems: Spanning Control and Computational Cybernetics: Applications: Dedicated to Professor Georgi M. Dimirovski on his Anniversary (Studies in Systems, Decision and Control, 415) | Peng Shi (editor), Jovan Stefanovski (editor), Janusz Kacprzyk (editor) | 2022 | Springer | |
788 | Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings (Security and Cryptology) | Weizhi Meng (editor), Mauro Conti (editor) | 2022 | Springer | |
789 | Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631) | Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor) | 2022 | Springer | |
790 | Cyberspace Safety and Security: 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings (Lecture Notes in Computer Science) | Xiaofeng Chen (editor), Jian Shen (editor), Willy Susilo (editor) | 2022 | Springer | |
791 | Cybernetics Perspectives in Systems: Proceedings of 11th Computer Science On-line Conference 2022, Vol. 3 (Lecture Notes in Networks and Systems, 503) | Radek Silhavy (editor) | 2022 | Springer | |
792 | Cyber Technological Paradigms and Threat Landscape in India | Ramnath Reghunadhan | 2022 | Palgrave Macmillan | |
793 | Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the Body (Springer Series on Bio- and Neurosystems, 14) | Bernard Widrow | 2022 | Springer | |
794 | Cyber-Physical Systems: Modelling and Industrial Application (Studies in Systems, Decision and Control, 418) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor) | 2022 | Springer | |
795 | Cyber Warfare, Security and Space Research: First International Conference, SpacSec 2021, Jaipur, India, December 9–10, 2021, Revised Selected Papers | Sandeep Joshi (editor), Amit Kumar Bairwa (editor), Amita Nandal (editor), Milena Radenkovic (editor), Cem Avsar (editor) | 2022 | Springer | |
796 | Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 ... and Communications Technologies, 123) | Zheng Xu (editor), Saed Alrabaee (editor), Octavio Loyola-González (editor), Xiaolu Zhang (editor), Niken Dwi Wahyu Cahyani (editor), Nurul Hidayah Ab Rahman (editor) | 2022 | Springer | |
797 | The U.S. Cybersecurity and Intelligence Analysis Challenges | John Michael Weaver | 2022 | Palgrave Macmillan | |
798 | Machine Learning for Cybersecurity: Innovative Deep Learning Solutions (SpringerBriefs in Computer Science) | Marwan Omar | 2022 | Springer | |
799 | Digital Forensics and Cyber Crime: 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings (Lecture ... and Telecommunications Engineering, 441) | Pavel Gladyshev (editor), Sanjay Goel (editor), Joshua James (editor), George Markowsky (editor), Daryl Johnson (editor) | 2022 | Springer | |
800 | Computer Security. ESORICS 2021 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, ... Selected Papers (Security and Cryptology) | Sokratis Katsikas (editor), Costas Lambrinoudakis (editor), Nora Cuppens (editor), John Mylopoulos (editor), Christos Kalloniatis (editor), Weizhi Meng (editor), Steven Furnell (editor), Frank Pallas (editor), Jörg Pohle (editor) | 2022 | Springer | |
801 | Emerging Trends in Cybersecurity Applications | Kevin Daimi (editor), Abeer Alsadoon (editor), Cathryn Peoples (editor), Nour El Madhoun (editor) | 2022 | Springer | |
802 | Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence (Studies in Computational Intelligence, 1025) | Mohiuddin Ahmed (editor), Sheikh Rabiul Islam (editor), Adnan Anwar (editor), Nour Moustafa (editor), Al-Sakib Khan Pathan (editor) | 2022 | Springer | |
803 | HCI for Cybersecurity, Privacy and Trust (Lecture Notes in Computer Science) | Abbas Moallem (editor) | 2022 | Springer | |
804 | Advanced Introduction to Cybersecurity Law | David P. Fidler | 2022 | Edward Elgar | |
805 | Illumination of Artificial Intelligence in Cybersecurity and Forensics (Lecture Notes on Data Engineering and Communications Technologies) | Sanjay Misra (editor), Chamundeswari Arumugam (editor) | 2022 | Springer | |
806 | World Organization of Systems and Cybernetics 18. Congress-WOSC2021: Systems Approach and Cybernetics: Engaging for the Future of Mankind (Lecture Notes in Networks and Systems) | Igor Perko (editor), Raul Espejo (editor), Vladimir Lepskiy (editor), Dmitry A. Novikov (editor) | 2022 | Springer | |
807 | Intelligent Decarbonisation: Can Artificial Intelligence and Cyber-Physical Systems Help Achieve Climate Mitigation Targets? (Lecture Notes in Energy, 86) | Oliver Inderwildi (editor), Markus Kraft (editor) | 2022 | Springer | |
808 | Order in Chaos: Cybernetics of Brand Management | Oliver Errichiello, Marius Wernke | 2022 | Springer | |
809 | The Informational Logic of Human Rights: Network Imaginaries in the Cybernetic Age (Technicities) | Joshua Bowsher | 2022 | Edinburgh University Press | |
810 | The Informational Logic of Human Rights: Network Imaginaries in the Cybernetic Age (Technicities) | Joshua Bowsher | 2022 | Edinburgh University Press | |
811 | Privacy-Preserving Machine Learning (SpringerBriefs on Cyber Security Systems and Networks) | Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li | 2022 | Springer | |
812 | Social Media and Technology Across the Lifespan (Palgrave Studies in Cyberpsychology) | Tanya Machin (editor), Charlotte Brownlow (editor), Susan Abel (editor), John Gilmour (editor) | 2022 | Palgrave Macmillan | |
813 | Research on the Rule of Law of China’s Cybersecurity: China’s Rule of Law in Cybersecurity Over the Past 40 Years | Daoli Huang | 2022 | Springer | |
814 | Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Studies in Computational Intelligence, 1030) | Nadia Nedjah (editor), Ahmed A. Abd El-Latif (editor), Brij B. Gupta (editor), Luiza M. Mourelle (editor) | 2022 | Springer | |
815 | Silicon Valley Cybersecurity Conference: Second Conference, SVCC 2021, San Jose, CA, USA, December 2–3, 2021, Revised Selected Papers (Communications in Computer and Information Science) | Sang-Yoon Chang (editor), Luis Bathen (editor), Fabio Di Troia (editor), Thomas H. Austin (editor), Alex J. Nelson (editor) | 2022 | Springer | |
816 | Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021 (Lecture Notes in Networks and Systems) | Hani Ragab Hassen (editor), Hadj Batatia (editor) | 2022 | Springer | |
817 | Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected ... in Computer and Information Science) | Erol Gelenbe (editor), Marija Jankovic (editor), Dionysios Kehagias (editor), Anna Marton (editor), Andras Vilmos (editor) | 2022 | Springer | |
818 | Proceedings of International Conference on Intelligent Cyber-Physical Systems: ICPS 2021 (Algorithms for Intelligent Systems) | Basant Agarwal (editor), Azizur Rahman (editor), Srikant Patnaik (editor), Ramesh Chandra Poonia (editor) | 2022 | Springer | |
819 | Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021 (Lecture Notes in Networks and Systems, 421) | Pradeep Kumar Singh (editor), Slawomir T. Wierzchon (editor), Sudeep Tanwar (editor), Joel J. P. C. Rodrigues (editor), Maria Ganzha (editor) | 2022 | Springer | |
820 | Science of Cyber Security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers (Lecture Notes in Computer Science, 13580) | Chunhua Su (editor), Kouichi Sakurai (editor), Feng Liu (editor) | 2022 | Springer | |
821 | ICCCE 2021: Proceedings of the 4th International Conference on Communications and Cyber Physical Engineering (Lecture Notes in Electrical Engineering, 828) | Amit Kumar (editor), Stefan Mozar (editor) | 2022 | Springer | |
822 | Frontiers in Cyber Security: 4th International Conference, FCS 2021, Haikou, China, December 17–19, 2021, Revised Selected Papers (Communications in Computer and Information Science) | Chunjie Cao (editor), Yuqing Zhang (editor), Yuan Hong (editor), Ding Wang (editor) | 2022 | Springer | |
823 | Psycho-Cybernetics (Updated and Expanded) | Maxwell Maltz | 2022 | | |
824 | Cyber Security: The Complete Guide to Cyber Threats and Protection 2nd Edition | David Sutton | 2022 | BCS Learning and Development Ltd | |
825 | Cyber defense mechanisms security, privacy, and challenges | Kumar, Gautam(Editor);Saini, Dinesh Kumar(Editor);Cuong, Nguyen Ha Huy(Editor) | 2021 | CRC Press | |
826 | Rethinking Cybercrime: Critical Debates | Tim Owen, Jessica Marshall | 2021 | Palgrave Macmillan | |
827 | CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) | Brent Chapman | 2021 | McGraw-Hill Education | |
828 | Cybersecurity in Digital Transformation: Scope and Applications | Dietmar P.F. Möller | 2021 | Springer | |
829 | CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) | Bobby E. Rogers | 2021 | McGraw-Hill | |
830 | Machine Intelligence and Big Data Analytics for Cybersecurity Applications | Yassine Maleh, Mohammad Shojafar, Mamoun Alazab, Youssef Baddi | 2021 | Springer | |
831 | Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers | Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell | 2021 | Springer | |
832 | Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers | Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha | 2021 | Springer | |
833 | Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) | Andrew A. Bochman; Sarah Freeman | 2021 | CRC Press | |
834 | Practical AI for Cybersecurity | Ravi Das | 2021 | CRC Press | |
835 | Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital | Pardeep Kumar, Vasaki Ponnusamy, Vishal Jain | 2021 | Engineering Science Reference | |
836 | Cybersecurity: An Ultimate Guide to Cybersecurity, Cyberattacks, and Everything You Should Know About Being Safe on The Internet | Snowden, John | 2021 | | |
837 | Data-Centric Business and Applications: ICT Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity | Tamara Radivilova, Dmytro Ageyev, Natalia Kryvinska | 2021 | Springer International Publishing;Springer | |
838 | ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering | Amit Kumar, Stefan Mozar | 2021 | Springer Singapore;Springer | |
839 | Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2020, 28-29 December 2020, Shanghai, China | Mohammed Atiquzzaman, Neil Yen, Zheng Xu | 2021 | Springer Singapore;Springer | |
840 | Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security | Marshall Copeland, Matthew Jacobs | 2021 | Apress | |
841 | THE NEW CYBERSECURITY FOR BEGINNERS AND DUMMIES: Extensive Guide To Getting Started In Cybersecurity | JEFF, DR. PATRICK | 2021 | | |
842 | Cybersecurity Research Analysis Report for Europe and Japan: Cybersecurity and Privacy Dialogue Between Europe and Japan | Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc | 2021 | Springer International Publishing;Springer | |
843 | National Cyber Summit (NCS) Research Track 2020 | Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, Eric Imsand | 2021 | Springer International Publishing;Springer | |
844 | Artificial Intelligence and Industrial Applications: Artificial Intelligence Techniques for Cyber-Physical, Digital Twin Systems and Engineering Applications | Tawfik Masrour, Ibtissam El Hassani, Anass Cherrafi | 2021 | Springer International Publishing;Springer | |
845 | 2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020) | Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman | 2021 | Springer International Publishing;Springer | |
846 | A Journey of Embedded and Cyber-Physical Systems: Essays Dedicated to Peter Marwedel on the Occasion of His 70th Birthday | Jian-Jia Chen | 2021 | Springer International Publishing;Springer | |
847 | Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity | Grid, Alan | 2021 | | |
848 | The Philosophy of Lines: From Art Nouveau to Cyberspace | Thorsten Botz-Bornstein | 2021 | Springer Nature | |
849 | This Is How They Tell Me the World Ends: The Cyberweapons Arms Race | Nicole Perlroth | 2021 | Bloomsbury Publishing USA | |
850 | Privacy, Regulations, and Cybersecurity: The Essential Business Guide | Chris Moschovitis | 2021 | | |
851 | A Profound Guide On Cyber Security: Getting Protected At Ease As a Professional And a Beginner | Amelia Mike | 2021 | | |
852 | Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents | Erdal Ozkaya | 2021 | Packt Publishing | |
853 | Ransomware Revolution: The Rise Of A Prodigious Cyber Threat | Matthew Ryan | 2021 | Springer | |
854 | CyberBRICS: Cybersecurity Regulations In The BRICS Countries | Luca Belli | 2021 | Springer | |
855 | Big Breaches: Cybersecurity Lessons For Everyone | Neil Daswani, Moudy Elbayadi | 2021 | Apress | |
856 | How Cybersecurity Really Works: A Hands-On Guide for Total Beginners - EARLY ACCESS | Sam Grubb | 2021 | No Starch Press | |
857 | Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success | Tyler Wall; Jarrett Rodrick | 2021 | Apress | |
858 | Cyberjutsu: Cybersecurity for the Modern Ninja | Ben McCarty | 2021 | No Starch Press | |
859 | The Game Has Changed:: Small Business Security And IT Advice In The Age Of Cybercrime | Javaheri, David | 2021 | | |
860 | Inhabiting Cyberspace in India: Theory, Perspectives, and Challenges | Simi Malhotra, Kanika Sharma, Sakshi Dogra | 2021 | Springer | |
861 | Cybersecurity for SCADA Systems | William T. Shaw | 2021 | PennWell Books | |
862 | Present And Future Paradigms Of Cyberculture In The 21st Century | Simber Atay, Gülsün Kurubacak-Meriç, Serap Sisman-Ugur | 2021 | IGI Global | |
863 | Cyberjutsu: Cybersecurity for the Modern Ninja | Ben McCarty | 2021 | No Starch Press | |
864 | Cyberjutsu: Cybersecurity for the Modern Ninja | McCarty, Ben | 2021 | | |
865 | Privacy, Regulations, And Cybersecurity: The Essential Business Guide | Chris Moschovitis | 2021 | John Wiley & Sons | |
866 | Transforming Cybersecurity Solutions Using Blockchain | Rashmi Agrawal, Neha Gupta | 2021 | Springer | |
867 | Understanding Communications Networks for Cybernetics Applications | Kaveh Pahlavan | 2021 | River Publishers | |
868 | The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks | Purackal, Rachel Sebastian | 2021 | | |
869 | Start-up Secure: Baking Cybersecurity into Your Company from Founding to Exit | Chris Castaldo | 2021 | | |
870 | Cyberjutsu: Cybersecurity for the Modern Ninja | Ben McCarty | 2021 | No Starch Press | |
871 | Shadow Warfare: Cyberwar Policy in the United States, Russia and China | Elizabeth Van Wie Davis | 2021 | Rowman & Littlefield | |
872 | Neoliberalism and Cyberpunk Science Fiction: Living on the Edge of Burnout | Caroline Alphin | 2021 | Routledge | |
873 | Emergence of Cyber Physical System and IoT in Smart Automation and Robotics: Computer Engineering in Automation | Krishna Kant Singh, Anand Nayyar, Sudeep Tanwar, Mohamed Abouhawwash | 2021 | Springer | |
874 | Artificial Intelligence and Blockchain for Future Cybersecurity Applications | Yassine Maleh, Youssef Baddi, Mamoun Alazab, Loai Tawalbeh, Imed Romdhani | 2021 | Springer | |
875 | Cybercrime in Context: The human factor in victimization, offending, and policing | Marleen Weulen Kranenbarg, Rutger Leukfeldt | 2021 | Springer | |
876 | Routledge Companion to Global Cyber-Security Strategy | Scott N. Romaniuk (editor), Mary Manjikian (editor) | 2021 | Routledge | |
877 | Cyber-Security Threats, Actors, and Dynamic Mitigation | Nicholas Kolokotronis and Stavros Shiaeles | 2021 | CRC Press | |
878 | How Cybersecurity Really Works: A Hands-On Guide for Total Beginners | Sam Grubb | 2021 | No Starch Press | |
879 | Adversarial Tradecraft in Cybersecurity | Dan Borges | 2021 | Packt | |
880 | Modern Cryptography for Cyber Security Professionals(2021)[Bock][9781838644352] | Lisa Bock | 2021 | Packt Publishing Pvt Ltd | |
881 | Modern Cryptography for Cybersecurity Professionals | Lisa Bock | 2021 | Packt Publishing Pvt Ltd | |
882 | Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data | Lisa Bock | 2021 | Packt Publishing | |
883 | Cyberpunk Culture and Psychology: Seeing through the Mirrorshades | Anna McFarlane | 2021 | Routledge | |
884 | Cyber Security Meets Machine Learning | Xiaofeng Chen, Willy Susilo, Elisa Bertino | 2021 | Springer | |
885 | Practical AI for Cybersecurity | Ravi Das | 2021 | Auerbach Publications | |
886 | Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings | Shlomi Dolev; Oded Margalit; Benny Pinkas; Alexander Schwarzmann | 2021 | Springer | |
887 | Information-Driven Planning and Control (Cyber Physical Systems Series) | Silvia Ferrari, Thomas A. Wettergren | 2021 | MIT Press | |
888 | Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data | Lisa Bock | 2021 | Packt Publishing | |
889 | Security Incidents & Response Against Cyber Attacks | Akashdeep Bhardwaj, Varun Sapra | 2021 | Springer | |
890 | Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners | Alexander J. Roxon | 2021 | Apress | |
891 | Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success | Tyler Wall, Jarrett Rodrick | 2021 | Apress | |
892 | Further Advances in Internet of Things in Biomedical and Cyber Physical Systems: 193 (Intelligent Systems Reference Library, 193) | Valentina E. Balas (editor), Vijender Kumar Solanki (editor), Raghvendra Kumar (editor) | 2021 | Springer | |
893 | Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators | Majeed Khader, Loo Seng Neo, Whistine Xiau Ting Chai | 2021 | World Scientific Pub Co Inc | |
894 | Introduction to Cyber Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators | Majeed Khader, Whistine Xiau Ting Chai, Loo Seng Neo, Khader (editor), Majeed (editor), Neo (editor), Loo Seng (editor), Chai (editor), Whistine Xiau Ting (editor) | 2021 | World Scientific Publishing Co | |
895 | CyRM: Mastering the Management of Cybersecurity (Internal Audit and IT Audit) | David X Martin | 2021 | CRC Press | |
896 | Cyberpolitics: Political Philosophy of the future | Constantino Pereira Martins ( ed.) | 2021 | IEF Coimbra University | |
897 | State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law | Eliza Watt | 2021 | Edward Elgar Publishing | |
898 | Cyber Security For Beginners: Learn How To Be Secure Online | Hazel, Riley Zoey. | 2021 | | |
899 | Optimal Spending on Cybersecurity Measures: Risk Management | Tara Kissoon | 2021 | Routledge | |
900 | Assessing and Insuring Cybersecurity Risk | Ravi Das | 2021 | CRC Press | |
901 | IT And Cyber Security For Beginners 2 Books in 1: Learn How To master IT and Cyber Security | Hazel , Riley Zoey. | 2021 | | |
902 | Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications | Gautam Kumar (editor), Om Prakash Singh (editor), Hemraj Saini (editor) | 2021 | CRC Press | |
903 | Design, Applications, and Maintenance of Cyber-Physical Systems | Pierluigi Rea, Erika Ottaviano, José Machado, and Katarzyna Antosz | 2021 | Engineering Science Reference (IGI Global) | |
904 | Cyberspace, Data Analytics, and Policing | David Skillicorn | 2021 | Chapman and Hall/CRC | |
905 | Securing Social Networks in Cyberspace | Al-Sakib Khan Pathan (editor) | 2021 | CRC Press | |
906 | Auditing Information and Cyber Security Governance: A Controls-Based Approach | Robert E. Davis | 2021 | CRC Press | |
907 | 2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) ... Data Engineering and Communications Technol) | Jemal Abawajy (editor), Zheng Xu (editor), Mohammed Atiquzzaman (editor), Xiaolu Zhang (editor) | 2021 | Springer Nature Switzerland AG | |
908 | Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science, 1436) | Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor) | 2021 | Springer | |
909 | National Cyber Summit (NCS) Research Track 2021 (Lecture Notes in Networks and Systems, 310) | Kim-Kwang Raymond Choo (editor), Tommy Morris (editor), Gilbert Peterson (editor), Eric Imsand (editor) | 2021 | Springer | |
910 | The Cybersecurity Manager's Guide: The Art of Building Your Security Program | Todd Barnum | 2021 | O'Reilly Media | |
911 | Cyber Security And Supply Chain Management: Risks, Challenges And Solutions: 0 (Trends, Challenges And Solutions In Contemporary Supply Chain Management): 1 | Steven Carnovale, Sengun Yeniyurt, Carnovale (editor), Steven (editor), Yeniyurt (editor), Sengun (editor) | 2021 | World Scientific Publishing Co Pte Ltd | |
912 | Cybersecurity Fundamentals | Rajesh Kumar Goutam | 2021 | BPB Publications | |
913 | Cyber Threats and Nuclear Weapons | Lin, Herbert; | 2021 | Stanford University Press | |
914 | Cyber Threats and Nuclear Weapons | Herbert Lin | 2021 | Stanford University Press | |
915 | The Cybersecurity Self-Help Guide | Arun Soni | 2021 | CRC Press | |
916 | A Simple Cyber Resilience Guide for Business | Crawley, Kim; | 2021 | Wiley | |
917 | 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business | Kim Crawley | 2021 | Wiley | |
918 | Cyber Risks and Insurance: the Legal Principles | QC, Dean Armstrong; Steward, Thomas; Thakerar, Shyam | 2021 | Bloomsbury Publishing Plc | |
919 | Cyberjutsu | McCarty, Ben | 2021 | No Starch Press | |
920 | A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems (Intelligent Systems Reference Library, 210) | Pardeep Kumar (editor), Ahmed Jabbar Obaid (editor), Korhan Cengiz (editor), Ashish Khanna (editor), Valentina Emilia Balas (editor) | 2021 | Springer | |
921 | Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications | Huadong Mo, Giovanni Sansavini, Min Xie | 2021 | Wiley | |
922 | Cybersecurity for Project Managers. A PRACTICAL GUIDE | Niharika Srivastav & Sanjay Saxena | 2021 | | |
923 | Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics) | Anand Handa (editor), Rohit Negi (editor), Sandeep K. Shukla (editor) | 2021 | River Publishers | |
924 | Cybersecurity Issues in Emerging Technologies | Leandros Maglaras (editor), Ioanna Kantzavelou (editor) | 2021 | CRC Press | |
925 | Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and Trends (Future of Business and Finance) | Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari | 2021 | Springer | |
926 | Cyber Forensics: Examining Emerging and Hybrid Technologies | Albert J. Marcella (editor) | 2021 | CRC Press | |
927 | Cyber Law and Ethics: Regulation of the Connected World | Mark Grabowski, Eric P. Robinson | 2021 | Routledge | |
928 | Game Theory and Machine Learning for Cyber Security | Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) | 2021 | Wiley-IEEE Press | |
929 | Cyber Curiosity: A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World | Lakeidra Smith | 2021 | New Degree Press | |
930 | Securing India in the Cyber Era | Sameer Patil | 2021 | Routledge | |
931 | Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders | Renee Tarun | 2021 | Wiley | |
932 | Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks | Chris Peiris, Binil Pillai, Abbas Kudrati | 2021 | Wiley | |
933 | Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks | Chris Peiris, Binil Pillai, Abbas Kudrati | 2021 | Wiley | |
934 | Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders | Renee Tarun | 2021 | Wiley | |
935 | Cybersecurity and Third-Party Risk: Third Party Threat Hunting | Gregory C. Rasner | 2021 | Wiley | |
936 | Cybersecurity and Third-Party Risk: Third Party Threat Hunting | Gregory C. Rasner | 2021 | Wiley | |
937 | The Smart Cyber Ecosystem for Sustainable Development: Principles, Building Blocks, and Paradigms | Pardeep Kumar (editor), Vishal Jain (editor), Vasaki Ponnusamy (editor) | 2021 | Wiley-Scrivener | |
938 | Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career | Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen | 2021 | Packt Publishing | |
939 | Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career | Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen | 2021 | Packt Publishing | |
940 | The Smart Cyber Ecosystem for Sustainable Development: Principles, Building Blocks, and Paradigms | Pardeep Kumar (editor), Vishal Jain (editor), Vasaki Ponnusamy (editor) | 2021 | Wiley-Scrivener | |
941 | Cybersecurity | Duane C. Wilson | 2021 | The MIT Press | |
942 | Innovations in Cyber Physical Systems: Select Proceedings of ICICPS 2020 | Jawar Singh, Sudhir Kumar, Umakanta Choudhury | 2021 | Springer | |
943 | Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) | Rajesh Kumar Goutam | 2021 | BPB Publications | |
944 | Game Theory for Cyber Deception: From Theory to Applications | Jeffrey Pawlick, Quanyan Zhu | 2021 | Birkhäuser | |
945 | The Ultimate Guide on Cybersecurity + Data Science: 2 Books in 1. From Big Data to Knowledge Management + Data Analytics with R and the Blockchain for Your Business Success | Adam Walker, Keith Hughes | 2021 | | |
946 | Verifying Cyber-Physical Systems: A Path to Safe Autonomy (Cyber Physical Systems Series) | Sayan Mitra | 2021 | The MIT Press | |
947 | How Cybersecurity Really Works: A Hands-On Guide for Total Beginners | Sam Grubb | 2021 | No Starch Press | |
948 | Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders | Renee Tarun | 2021 | Wiley | |
949 | Cyberwarfare: Information Operations in a Connected World | Mike Chapple, David Seidl | 2021 | Jones & Bartlett Learning | |
950 | [Dissertation] Co-Design of Resilient Timing-Constrained Cyber-Physical Systems | Hengyi Liang | 2021 | Northwestern University | |
951 | Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices | Alex Alexandrou | 2021 | CRC Press | |
952 | Cybersecurity Data Science: Best Practices in an Emerging Profession | Scott Mongeau, Andrzej Hajdasinski | 2021 | Springer | |
953 | Cybersecurity Data Science: Best Practices in an Emerging Profession | Scott Mongeau, Andrzej Hajdasinski | 2021 | Springer | |
954 | Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 | Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor) | 2021 | Springer | |
955 | Cybersecurity | Duane C. Wilson | 2021 | The MIT Press | |
956 | Cyber Intelligence and Information Retrieval: Proceedings of CIIR 2021 | João Manuel R. S. Tavares (editor), Paramartha Dutta (editor), Soumi Dutta (editor), Debabrata Samanta (editor) | 2021 | Springer | |
957 | Practical AI for Cybersecurity | Ravi Das | 2021 | Auerbach Publications | |
958 | Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment | Pascal Ackerman | 2021 | Packt Publishing | |
959 | Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment | Pascal Ackerman | 2021 | Packt Publishing | |
960 | Cybernetics for the Social Sciences | Bernard Scott | 2021 | BRILL | |
961 | Security of Cyber-Physical Systems: State Estimation and Control | Chengwei Wu, Weiran Yao, Guanghui Sun, Ligang Wu | 2021 | Springer | |
962 | Security of Cyber-Physical Systems: State Estimation and Control | Chengwei Wu, Weiran Yao, Guanghui Sun, Ligang Wu | 2021 | Springer | |
963 | Cyber Victimology: Decoding Cyber-Crime Victimisation | Debarati Halder | 2021 | Routledge | |
964 | Network Security And Cyber Defense (CNSS) | Singh, Gurpej | 2021 | | |
965 | Explainable AI Within the Digital Transformation and Cyber Physical Systems: XAI Methods and Applications | Moamar Sayed-Mouchaweh | 2021 | Springer | |
966 | Explainable AI Within the Digital Transformation and Cyber Physical Systems: XAI Methods and Applications | Moamar Sayed-Mouchaweh | 2021 | Springer | |
967 | Cybersecurity Data Science Best Practices in an Emerging Profession | Scott Mongeau, Andrzej Hajdasinski | 2021 | Springer | |
968 | Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment | Pascal Ackerman | 2021 | Packt Publishing | |
969 | Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program | John Jackson | 2021 | Wiley-IEEE Press | |
970 | Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) | Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop | 2021 | Springer | |
971 | Advanced Smart Computing Technologies in Cybersecurity and Forensics | Keshav Kaushik (editor), Shubham Tayal (editor), Akashdeep Bhardwaj (editor), Manoj Kumar (editor) | 2021 | CRC Press | |
972 | Cyber Forensics | Robert Karamagi | 2021 | | |
973 | Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite | Helen E. Patton | 2021 | Wiley | |
974 | Cyberwars in the Middle East | Ahmed Al-Rawi | 2021 | Rutgers University Press | |
975 | Cyber-Physical, IoT, and Autonomous Systems in Industry 4.0 | Vikram Bali, Vishal Bhatnagar, Deepti Aggarwal, Shivani Bali, Mario José Diván | 2021 | CRC Press | |
976 | Types of Cyberbullying | Herbert Scheithauer, Anja Schultze-Krumbholz, Jan Pfetsch, Markus Hess | 2021 | Wiley Blackwell | |
977 | Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite | Helen E. Patton | 2021 | Wiley | |
978 | Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Lecture Notes in Computer Science) | Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) | 2021 | Springer | |
979 | Self-organising Multi-agent Systems: Algorithmic Foundations Of Cyber-anarcho-socialism | Jeremy Pitt | 2021 | WSPC (EUROPE) | |
980 | Smart and Intelligent Systems: The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity (The Human Element in Smart and Intelligent Systems) | Abbas Moallem (editor) | 2021 | CRC Press | |
981 | Cybermedia: Explorations in Science, Sound, and Vision | Jonathan Leal (editor), Selmin Kara (editor) | 2021 | Bloomsbury Academic | |
982 | Cyber Security Defense with Microsoft Defender | Kawula, Dave; O'Neill Sr, John; Kawula, Cristal; Cabot, Emile; Sun, Cary | 2021 | | |
983 | Networking for Beginners: Simple Guide to Study Basic/Advanced Computer Network, Hardware, Wireless, and Cabling. LTE, Internet, and Cyber Security | Mathew, Jack | 2021 | | |
984 | Artificial Intelligence and Blockchain for Future Cybersecurity Applications (Studies in Big Data, 90) | Yassine Maleh (editor), Youssef Baddi (editor), Mamoun Alazab (editor), Loai Tawalbeh (editor), Imed Romdhani (editor) | 2021 | Springer | |
985 | Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions | Daniel Lohrmann, Shamane Tan | 2021 | Wiley | |
986 | How Cybersecurity Really Works | Sam Grubb | 2021 | | |
987 | Cybersecurity in the COVID-19 Pandemic | Kenneth Okereafor | 2021 | CRC Press | |
988 | Cybersecurity Lessons from CoVID-19 | Robert Slade | 2021 | CRC Press | |
989 | Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents | Glen D. Singh | 2021 | Packt Publishing | |
990 | Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity | Gregory J. Falco, Eric Rosenbach | 2021 | Oxford University Press | |
991 | Cyber Forensics: Examining Emerging and Hybrid Technologies | Albert J. Marcella (editor) | 2021 | CRC Press | |
992 | Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 | Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) | 2021 | Springer | |
993 | Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities | Sanjay Misra (editor), Amit Kumar Tyagi (editor) | 2021 | Springer | |
994 | Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities | Sanjay Misra (editor), Amit Kumar Tyagi (editor) | 2021 | Springer | |
995 | IT Governance and Information Security: Guides, Standards and Frameworks (Advances in Cybersecurity Management) | Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui | 2021 | CRC Press | |
996 | Cyber Litigation: The Legal Principles | Dean Armstrong, Fergus McCombie, Ceri Davis | 2021 | Bloomsbury Professional | |
997 | Data Analytics: Systems Engineering - Cybersecurity - Project Management | Christopher Greco | 2021 | Mercury Learning and Information | |
998 | Cyber Litigation: The Legal Principles | Dean Armstrong QC, Fergus McCombie, Ceri Davis | 2021 | Bloomsbury Professional | |
999 | Cybersecurity Lessons from COVID-19 | Robert Slade | 2021 | CRC Press | |
1000 | Advances in Cybersecurity Management | Kevin Daimi (editor), Cathryn Peoples (editor) | 2021 | Springer | |
1001 | Cybersecurity for Connected Medical Devices | Arnab Ray | 2021 | Academic Press | |
1002 | Cybersecurity and Third-Party Risk: Third Party Threat Hunting | Gregory C. Rasner | 2021 | John Wiley & Sons | |
1003 | Cybersecurity for Connected Medical Devices | Arnab Ray | 2021 | Academic Press | |
1004 | The Two Michaels: Innocent Canadian Captives and High Stakes Espionage in the US-China Cyber War | Mike Blanchfield; Fen Osler Hampson | 2021 | | |
1005 | Process Operational Safety and Cybersecurity. A Feedback Control Approach | Zhe Wu, Panagiotis D. Christofides | 2021 | Springer | |
1006 | Process Operational Safety and Cybersecurity: A Feedback Control Approach (Advances in Industrial Control) | Zhe Wu, Panagiotis D. Christofides | 2021 | Springer | |
1007 | Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) | Andrew A. Bochman, Sarah Freeman | 2021 | CRC Press | |
1008 | Cyber Crisis Management: The Practical Handbook On Crisis Management And Crisis Communication | Holger Kaschner | 2021 | Springer | |
1009 | International Law As We Know It: Cyberwar Discourse and the Construction of Knowledge in International Legal Scholarship | Lianne J. M. Boer | 2021 | Cambridge University Press | |
1010 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2021 | Apress | |
1011 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2021 | Apress | |
1012 | Research Handbook on International Law and Cyberspace | Nicholas Tsagourias (editor), Russell Buchan (editor) | 2021 | Edward Elgar Publishing Ltd | |
1013 | Advanced Cybersecurity Technologies | Ralph Moseley | 2021 | CRC Press | |
1014 | Advanced Cybersecurity Technologies | Ralph Moseley | 2021 | CRC Press | |
1015 | Strategies for e-Service, e-Governance, and Cyber Security: Challenges and Solutions for Efficiency and Sustainability | Bhaswati Sahoo, Ranbindra Narayana Behera, Sasmita Rani Samanta, Prasant Kumar Pattnaik | 2021 | Apple Academic Press | |
1016 | CyRM: Mastering the Management of Cybersecurity (Internal Audit and IT Audit) | David X Martin | 2021 | CRC Press | |
1017 | Research Anthology on Business Aspects of Cybersecurity | Information Reso Management Association | 2021 | Information Science Reference | |
1018 | Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense | Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian | 2021 | Cambridge University Press | |
1019 | Cybersecurity: Ethics, Legal, Risks, and Policies | Ishaani Priyadarshini, Chase Cotton | 2021 | Apple Academic Press | |
1020 | Handbook of Research on Cyberchondria, Health Literacy, and the Role of Media in Society's Perception of Medical Information | Hacer Aker, Mary Aiken | 2021 | Information Science Reference | |
1021 | Cyberspace in Peace and War | Martin Libicki | 2021 | Naval Institute Press | |
1022 | Cyberspace in Peace and War | Martin Libicki | 2021 | Naval Institute Press | |
1023 | Dynamically Enabled Cyber Defense | Lin Yang, Quan Yu | 2021 | World Scientific Publishing Company | |
1024 | IEEE Systems, Man, & Cybernetics Magazine | | 2021 | | |
1025 | IEEE Systems, Man, & Cybernetics Magazine | | 2021 | | |
1026 | IEEE Systems, Man, & Cybernetics Magazine | | 2021 | | |
1027 | Handbook of Research on Advancing Cybersecurity for Digital Transformation | Kamaljeet Sandhu (editor) | 2021 | Information Science Reference | |
1028 | Handbook of Research on Advancing Cybersecurity for Digital Transformation | Kamaljeet Sandhu (editor) | 2021 | Information Science Reference | |
1029 | Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention | Nabie Y. Conteh | 2021 | IGI Global | |
1030 | 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 103) | Mohammed Atiquzzaman (editor), Neil Yen (editor), Zheng Xu (editor) | 2021 | Springer | |
1031 | RUSSIA’S STRATEGY IN CYBERSPACE | Janne Hakala, Jazlyn Melnychuk | 2021 | NATO StratCom COE and NATO Cooperative Cyber Defence COE | |
1032 | Agricultural Cybernetics | Yanbo Huang, Qin Zhang | 2021 | Springer | |
1033 | Bitskrieg: The New Challenge of Cyberwarfare | John Arquilla | 2021 | Polity | |
1034 | Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers | Aaron Roberts | 2021 | | |
1035 | Security Risk Models for Cyber Insurance | David Rios Insua, Caroline Baylon, Jose Vila | 2021 | | |
1036 | Modern Cryptography for Cybersecurity Professionals: Learn How You Can Use Encryption to Better Secure Your Organization's Data | Lisa Bock | 2021 | Packt Publishing | |
1037 | Cybersecurity Management: An Organizational and Strategic Approach | Nir Kshetri | 2021 | University of Toronto Press | |
1038 | Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare | A.J. Jenkinson | 2021 | CRC Press | |
1039 | The Cyber Security Body of Knowledge 1.1.0 | Cybok | 2021 | Cybok.org | |
1040 | How to get a job in cybersecurity earning over six figures : Zero to Cyber Hero | Lina Lau | 2021 | | |
1041 | Cyber-Physical Systems: AI and COVID-19 | Ramesh Poonia, Basant Agarwal, Sandeep Kumar, Mohammad Khan, Goncalo Marques, Janmenjoy Nayak | 2021 | Academic Press | |
1042 | 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business | Kim Crawley | 2021 | Wiley | |
1043 | Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions | Daniel Lohrmann; Shamane Tan | 2021 | Wiley | |
1044 | The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity | Christian Espinosa | 2021 | BookBaby | |
1045 | Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World | Eric Cole | 2021 | BenBella Books | |
1046 | Heterogeneous Cyber Physical Systems of Systems | Ioannis Papaefstathiou, Alkis Hatzopoulos | 2021 | River Publishers | |
1047 | Strategic Foresight and the EU Cyber Threat Landscape in 2025 : A Workshop Report | Valentin Weber, Victoria Cygne Lara Toriser | 2021 | Deutsche Gesellschaft für Auswärtige Politik | |
1048 | Heterogeneous Cyber Physical Systems of Systems | Ioannis Papaefstathiou, Alkis Hatzopoulos | 2021 | River Publishers | |
1049 | Self-organising Multi-agent Systems: Algorithmic Foundations Of Cyber-anarcho-socialism | Jeremy Pitt | 2021 | WSPC (EUROPE) | |
1050 | The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity | Christian Espinosa | 2021 | Lioncrest Publishing | |
1051 | Introduction to Cybersemiotics: A Transdisciplinary Perspective | Carlos Vidales, Søren Brier | 2021 | Springer | |
1052 | Cybersecurity | Duane Wilson | 2021 | MIT Press | |
1053 | Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism | Michael Miller | 2021 | Lerner Publishing Group | |
1054 | Cybercrime and Preventive Measures: A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition) | Priyanka Tomar, Sanjay Gautam | 2021 | BPB Publications | |
1055 | Heterogeneous Cyber Physical Systems of Systems | Amara Amara, Yen-Kuang Chen, Yoshifumi Nishio | 2021 | Routledge. Taylor & Francis Group | |
1056 | Cyberphysical Infrastructures in Power Systems: Architectures and Vulnerabilities | Magdi S. Mahmoud, Haris M. Khalid, Mutaz M. Hamdan | 2021 | Academic Press | |
1057 | Cyberwarfare: Information Operations in a Connected World | Mike Chapple, David Seidl | 2021 | Jones & Bartlett Learning | |
1058 | Cyber Touch Class - 7 | Picture Book | 2021 | | |
1059 | Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context | R.V. Gundur, Michael Levi | 2021 | | |
1060 | Data Analytics: Systems Engineering - Cybersecurity - Project Management | Christopher Greco | 2021 | Mercury Learning and Information | |
1061 | Cyber Risks and Insurance: The Legal Principles | Dean Armstrong; Thomas Steward; Shyam Thakerar | 2021 | Bloomsbury Professional | |
1062 | Concerning Stephen Willats and the Social Function of Art: Experiments in Cybernetics and Society | Sharon Irish | 2021 | Bloomsbury Visual Arts | |
1063 | Cyber Litigation: The Legal Principles | Dean Armstrong; Fergus McCombie; Ceri Davis | 2021 | Bloomsbury Professional | |
1064 | Cyber Crime and Forensic Computing: Modern Principles, Practices, and Algorithms | Gulshan Shrivastava (editor); Deepak Gupta (editor); Kavita Sharma (editor) | 2021 | De Gruyter | |
1065 | Cyber Crime and Forensic Computing: Modern Principles, Practices, and Algorithms | Gulshan Shrivastava (editor); Deepak Gupta (editor); Kavita Sharma (editor) | 2021 | De Gruyter | |
1066 | Cyberspies: Inside the World of Hacking, Online Privacy, and Cyberterrorism | Michael Miller | 2021 | Twenty-First Century Books ™ | |
1067 | Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices | Alex Alexandrou | 2021 | CRC Press | |
1068 | Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices | Alex Alexandrou | 2021 | CRC Press | |
1069 | Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices | Alex Alexandrou | 2021 | CRC Press | |
1070 | The Cybersecurity Manager's Guide: The Art of Building Your Security Program | Todd Barnum | 2021 | O'Reilly Media | |
1071 | The Cybersecurity Manager's Guide: The Art of Building Your Security Program | Todd Barnum | 2021 | O'Reilly Media | |
1072 | The Cybersecurity Manager's Guide: The Art of Building Your Security Program | Todd Barnum | 2021 | O'Reilly Media | |
1073 | Backdoor: Bypassing the Gatekeepers in Cybersecurity | Femi Reis | 2021 | Oluwafemi Reis | |
1074 | Cyberspace and Security: A fundamentally New Approach | Victor Sheymov | 2021 | 163541 | |
1075 | Cyberspace and Security: A fundamentally New Approach | Victor Sheymov | 2021 | 163541 | |
1076 | Cyberspace and Security: A fundamentally New Approach | Victor Sheymov | 2021 | 163541 | |
1077 | Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems, and the Internet of Things | Peter Marwedel | 2021 | Springer Nature | |
1078 | I Am Being Cyberbullied...What's Next? | C. R. McKay | 2021 | The Rosen Publishing Group, Inc | |
1079 | Be Cyber Secure : Tales, Tools and Threats | Jonathan Reuvid | 2021 | Legend Business Books | |
1080 | From City Space to Cyberspace: Art, Squatting, and Internet Culture in the Netherlands | Amanda Wasielewski | 2021 | Amsterdam University Press | |
1081 | Cyberflashing: Recognising Harms, Reforming Laws | Clare McGlynn; Kelly Johnson | 2021 | Bristol University Press | |
1082 | The Politics of Cybersecurity in the Middle East | James Shires | 2021 | Hurst Publishers | |
1083 | Cyber Threats and Nuclear Weapons | Herbert Lin | 2021 | Stanford University Press | |
1084 | Cyberwars in the Middle East | Ahmed Al-Rawi | 2021 | Rutgers University Press | |
1085 | The Cybernetic Theory of Decision: New Dimensions of Political Analysis | John D. Steinbruner | 2021 | Princeton University Press | |
1086 | Quantum Computing in Cybersecurity | Romil Rawat, Rajesh Kumar, Chakrawarti Sanjaya, Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, Hitesh Rawat | 2021 | Wiley | |
1087 | Cyber Intelligence: Actors, Policies, Practices | Constance S. Uthoff | 2021 | Lynne Rienner Publishers, Inc. | |
1088 | The Two Michaels: Innocent Canadian Captives and High Stakes Espionage in the US-China Cyber War | Fen Hampson, Mike Blanchfield | 2021 | Sutherland House Books | |
1089 | Game Theory and Machine Learning for Cyber Security | Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (editor), Quanyan Zhu (editor) | 2021 | Wiley-IEEE Press | |
1090 | Cybernetic Architectures: Informational Thinking and Digital Design (Routledge Research in Architecture) | Camilo Andrés Cifuentes Quin | 2021 | Routledge | |
1091 | Cybernetic Architectures: Informational Thinking and Digital Design (Routledge Research in Architecture) | Camilo Andrés Cifuentes Quin | 2021 | Routledge | |
1092 | Adversary-Aware Learning Techniques and Trends in Cybersecurity | Prithviraj Dasgupta (editor), Joseph B. Collins (editor), Ranjeev Mittu (editor) | 2021 | Springer | |
1093 | Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity (Lecture Notes in Networks and Systems) | Matteo Zallio (editor), Carlos Raymundo Ibañez (editor), Jesus Hechavarria Hernandez (editor) | 2021 | Springer | |
1094 | Adolescent Risk Behavior and Self-Regulation: A Cybernetic Perspective | Franz Resch, Peter Parzer | 2021 | Springer | |
1095 | Cyber Forensics | Karamagi, Robert | 2021 | Hewlett-Packard Company | |
1096 | Biocybernetics and Biomedical Engineering – Current Trends and Challenges: Proceedings of the 22nd Polish Conference on Biocybernetics and Biomedical ... 2021 (Lecture Notes in Networks and Systems) | Dorota G. Pijanowska (editor), Krzysztof Zielinski (editor), Adam Liebert (editor), Janusz Kacprzyk (editor) | 2021 | Springer | |
1097 | Cybersecurity Risk of IoT on Smart Cities | Roberto O. Andrade, Luis Tello-Oquendo, Iván Ortiz | 2021 | Springer | |
1098 | Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony (SpringerBriefs on Cyber Security Systems and Networks) | Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra | 2021 | Springer | |
1099 | Cyber Security, Artificial Intelligence, Data Protection & the Law | Robert Walters, Marko Novak | 2021 | Springer | |
1100 | Cyber Physical, Computer and Automation System: A Study of New Technologies (Advances in Intelligent Systems and Computing) | Endra Joelianto (editor), Arjon Turnip (editor), Augie Widyotriatmo (editor) | 2021 | Springer | |
1101 | Cybercrime in Context: The human factor in victimization, offending, and policing (Crime and Justice in Digital Society, I) | Marleen Weulen Kranenbarg (editor), Rutger Leukfeldt (editor) | 2021 | Springer | |
1102 | Cyber-Physical Systems: Modelling and Intelligent Control (Studies in Systems, Decision and Control, 338) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor) | 2021 | Springer | |
1103 | Cybersecurity, Privacy and Freedom Protection in the Connected World: Proceedings of the 13th International Conference on Global Security, Safety and ... and Technologies for Security Applications) | Hamid Jahankhani (editor), Arshad Jamal (editor), Shaun Lawson (editor) | 2021 | Springer | |
1104 | Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (Lecture Notes on Data Engineering and Communications Technologies) | Kavita Khanna (editor), Vania Vieira Estrela (editor), Joel José Puga Coelho Rodrigues (editor) | 2021 | Springer | |
1105 | Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Communications in Computer and Information Science) | Wei Lu (editor), Qiaoyan Wen (editor), Yuqing Zhang (editor), Bo Lang (editor), Weiping Wen (editor), Hanbing Yan (editor), Chao Li (editor), Li Ding (editor), Ruiguang Li (editor) | 2021 | Springer | |
1106 | Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers ... in Computer and Information Science) | Rajeev Agrawal (editor), Goutam Sanyal (editor), Kevin Curran (editor), Valentina Emilia Balas (editor), Madhu Sharma Gaur (editor) | 2021 | Springer | |
1107 | Cyber-Physical Microgrids | Yan Li | 2021 | Springer | |
1108 | Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020 (Algorithms for Intelligent Systems) | Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor) | 2021 | Springer | |
1109 | Data-Centric Business and Applications: ICT Systems—Theory, Radio-Electronics, Information Technologies and Cybersecurity (Lecture Notes on Data Engineering and Communications Technologies) | Dmytro Ageyev (editor), Tamara Radivilova (editor), Natalia Kryvinska (editor) | 2021 | Springer | |
1110 | Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, ... Papers (Lecture Notes in Computer Science) | Habtamu Abie (editor), Silvio Ranise (editor), Luca Verderame (editor), Enrico Cambiaso (editor), Rita Ugarelli (editor), Gabriele Giunta (editor), Isabel Praça (editor), Federica Battisti (editor) | 2021 | Springer | |
1111 | Cyber Security: Issues and Current Trends (Studies in Computational Intelligence, 995) | Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop | 2021 | Springer | |
1112 | Cyber-Physical Systems: Design and Application for Industry 4.0 (Studies in Systems, Decision and Control, 342) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor) | 2021 | Springer | |
1113 | Cyber-Physical Systems: Digital Technologies and Applications (Studies in Systems, Decision and Control, 350) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim V. Shcherbakov (editor) | 2021 | Springer | |
1114 | Digital Convergence in Contemporary Newsrooms: Media Innovation, Content Adaptation, Digital Transformation, and Cyber Journalism (Studies in Systems, Decision and Control, 370) | Benedito Medeiros Neto (editor), Inês Amaral (editor), George Ghinea (editor) | 2021 | Springer | |
1115 | Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings | Sanjay Goel (editor), Pavel Gladyshev (editor), Daryl Johnson (editor), Makan Pourzandi (editor), Suryadipta Majumdar (editor) | 2021 | Springer | |
1116 | Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program | Ryan Leirvik | 2021 | Apress | |
1117 | 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 103) | Mohammed Atiquzzaman (editor), Neil Yen (editor), Zheng Xu (editor) | 2021 | Springer | |
1118 | 2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) ... and Communications Technologies, 81) | Jemal Abawajy (editor), Zheng Xu (editor), Mohammed Atiquzzaman (editor), Xiaolu Zhang (editor) | 2021 | Springer | |
1119 | Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and Trends | Gurdip Kaur; Ziba Habibi Lashkari; Arash Habibi Lashkari | 2021 | Springer Nature | |
1120 | 2021 International Conference on Big Data Analytics for Cyber-Physical System in Smart City: Volume 1 | Mohammed Atiquzzaman; Neil Yen; Zheng Xu | 2021 | Springer Nature | |
1121 | 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems: DPTA 2020 | Chuanchao Huang; Yu-Wei Chan; Neil Yen | 2021 | Springer Nature | |
1122 | 2021 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1 | Jemal Abawajy; Zheng Xu; Mohammed Atiquzzaman; Xiaolu Zhang | 2021 | Springer Nature | |
1123 | Cyberspace Safety and Security: 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings | Jieren Cheng; Xiangyan Tang; Xiaozhang Liu | 2021 | Springer | |
1124 | Eingebettete Systeme: Grundlagen Eingebetteter Systeme in Cyber-Physikalischen Systemen (German Edition) | Peter Marwedel | 2021 | Springer Vieweg | |
1125 | Game Theory for Cyber Deception: From Theory to Applications (Static & Dynamic Game Theory: Foundations & Applications) | Jeffrey Pawlick, Quanyan Zhu | 2021 | Birkhäuser | |
1126 | Further Advances in Internet of Things in Biomedical and Cyber Physical Systems (Intelligent Systems Reference Library, 193) | Valentina E. Balas (editor), Vijender Kumar Solanki (editor), Raghvendra Kumar (editor) | 2021 | Springer | |
1127 | Information Security Education for Cyber Resilience: 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22–24, 2021, Proceedings (IFIP ... and Communication Technology, 615) | Lynette Drevin (editor), Natalia Miloslavskaya (editor), Wai Sze Leung (editor), Suné von Solms (editor) | 2021 | Springer | |
1128 | Outer Space and Cyber Space: Similarities, Interrelations and Legal Perspectives (Studies in Space Policy, 33) | Annette Froehlich (editor) | 2021 | Springer | |
1129 | National Cyber Summit (NCS) Research Track 2021 (Lecture Notes in Networks and Systems) | Kim-Kwang Raymond Choo (editor), Tommy Morris (editor), Gilbert Peterson (editor), Eric Imsand (editor) | 2021 | Springer | |
1130 | Privacy-Preserving Deep Learning: A Comprehensive Survey (SpringerBriefs on Cyber Security Systems and Networks) | Kwangjo Kim, Harry Chandra Tanuwidjaja | 2021 | Springer | |
1131 | Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches | Anita Lavorgna (editor), Thomas J. Holt (editor) | 2021 | Palgrave Macmillan | |
1132 | Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing) | Akashdeep Bhardwaj (editor), Varun Sapra (editor) | 2021 | Springer | |
1133 | Society 5.0: Cyberspace for Advanced Human-Centered Society (Studies in Systems, Decision and Control, 333) | Alla G. Kravets (editor), Alexander A. Bolshakov (editor), Maxim Shcherbakov (editor) | 2021 | Springer | |
1134 | Security in Cyber-Physical Systems: Foundations and Applications (Studies in Systems, Decision and Control, 339) | Ali Ismail Awad (editor), Steven Furnell (editor), Marcin Paprzycki (editor), Sudhir Kumar Sharma (editor) | 2021 | Springer | |
1135 | Recent Advances in Soft Computing and Cybernetics (Studies in Fuzziness and Soft Computing, 403) | Radek Matoušek (editor), Jakub Kudela (editor) | 2021 | Springer | |
1136 | Safety, Security and Privacy for Cyber-Physical Systems (Lecture Notes in Control and Information Sciences, 486) | Riccardo M.G. Ferrari (editor), André M. H. Teixeira (editor) | 2021 | Springer | |
1137 | Proceedings of Second International Conference on Computing, Communications, and Cyber-Security: IC4S 2020 (Lecture Notes in Networks and Systems, 203) | Pradeep Kumar Singh (editor), Slawomir T. Wierzchon (editor), Sudeep Tanwar (editor), Maria Ganzha (editor), Joel J. P. C. Rodrigues (editor) | 2021 | Springer | |
1138 | Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13–15, 2021, Revised Selected Papers (Security and Cryptology) | Wenlian Lu (editor), Kun Sun (editor), Moti Yung (editor), Feng Liu (editor) | 2021 | Springer | |
1139 | Using Science in Cybersecurity | Leigh Metcalf, Jonathan Spring | 2021 | World Scientific | |
1140 | HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII ... Applications, incl. Internet/Web, and HCI) | Abbas Moallem (editor) | 2021 | Springer | |
1141 | Cybersecurity For Dummies | Steinberg, Joseph | 2020 | Wiley;For Dummies | |
1142 | Cybersecurity: Politics, Governance and Conflict in Cyberspace | Damien Van Puyvelde, Aaron F. Brantly | 2020 | Wiley | |
1143 | The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats | Richard A. Clarke, Robert K. Knake | 2020 | Penguin Press | |
1144 | Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line | Paul Troncone, Carl Albing | 2020 | O’Reilly Media | |
1145 | The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime | Scott Augenbaum | 2020 | Forefront Books | |
1146 | The Cybernetic Brain: Sketches of Another Future | Andrew Pickering | 2020 | University of Chicago Press | |
1147 | Cyber Security Intelligence and Analytics | Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza Parizi, Mohammad Hammoudeh | 2020 | Springer International Publishing | |
1148 | Embedded, Cyber-Physical, and IoT Systems: Essays Dedicated to Marilyn Wolf on the Occasion of Her 60th Birthday | Shuvra S. Bhattacharyya, Miodrag Potkonjak, Senem Velipasalar | 2020 | Springer International Publishing | |
1149 | Secure and Trustworthy Cyberphysical Microfluidic Biochips: A practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips | Jack Tang, Mohamed Ibrahim, Krishnendu Chakrabarty, Ramesh Karri | 2020 | Springer International Publishing | |
1150 | Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA | Tareq Ahram, Waldemar Karwowski | 2020 | Springer International Publishing | |
1151 | Cyber-physical Systems and Digital Twins: Proceedings of the 16th International Conference on Remote Engineering and Virtual Instrumentation | Michael E. Auer, Kalyan Ram B. | 2020 | Springer International Publishing | |
1152 | A Handbook of Internet of Things in Biomedical and Cyber Physical System | Valentina E. Balas, Vijender Kumar Solanki, Raghvendra Kumar, Md. Atiqur Rahman Ahad | 2020 | Springer International Publishing | |
1153 | Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics – 2019 | Gheorghe Ion Gheorghe | 2020 | Springer International Publishing | |
1154 | Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2017 | Jürgen Beyerer, Alexander Maier, Oliver Niggemann | 2020 | Springer Berlin Heidelberg; Springer Vieweg | |
1155 | Cybercrime Investigators Handbook | Graeme Edwards | 2020 | John Wiley & Sons | |
1156 | Cyber Security: The Lifeline Of Information And Communication Technology | Ramjee Prasad, Vandana Rohokale | 2020 | Springer | |
1157 | New Paradigm Of Industry 4.0: Internet Of Things, Big Data & Cyber Physical Systems | Srikanta Patnaik | 2020 | Springer | |
1158 | Cyberspace Mimic Defense: Generalized Robust Control And Endogenous Security | Jiangxing Wu | 2020 | Springer | |
1159 | Machine Learning Approaches In Cyber Security Analytics | Tony Thomas, Athira P Vijayaraghavan, Sabu Emmanuel | 2020 | Springer | |
1160 | Handbook Of Computer Networks And Cyber Security: Principles And Paradigms | Brij Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta | 2020 | Springer | |
1161 | The Routledge Companion To Cyberpunk Culture | Anna McFarlane, Lars Schmeink, Graham Murphy | 2020 | Routledge/Taylor & Francis Group | |
1162 | The Human Factor of Cybercrime | Rutger Leukfeldt; Thomas J. Holt | 2020 | Routledge | |
1163 | Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques | Vinny Troia | 2020 | Wiley | |
1164 | International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence | Jemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman | 2020 | Springer International Publishing | |
1165 | Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems | Marilyn Wolf, Dimitrios Serpanos | 2020 | Springer International Publishing | |
1166 | Current Trends in Biomedical Engineering and Bioimages Analysis: Proceedings of the 21st Polish Conference on Biocybernetics and Biomedical Engineering | Józef Korbicz, Roman Maniewski, Krzysztof Patan, Marek Kowal | 2020 | Springer International Publishing | |
1167 | Future Trends in Biomedical and Health Informatics and Cybersecurity in Medical Devices: Proceedings of the International Conference on Biomedical and Health Informatics, ICBHI 2019, 17-20 April 2019, Taipei, Taiwan | Kang-Ping Lin, Ratko Magjarevic, Paulo de Carvalho | 2020 | Springer International Publishing | |
1168 | National Cyber Summit (NCS) Research Track | Kim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L. Peterson | 2020 | Springer International Publishing | |
1169 | Cyber-Physical Systems: Advances in Design & Modelling | Alla G. Kravets, Alexander A. Bolshakov, Maxim V. Shcherbakov | 2020 | Springer International Publishing | |
1170 | Cyber-Physical Systems: Industry 4.0 Challenges | Alla G. Kravets, Alexander A. Bolshakov, Maxim V. Shcherbakov | 2020 | Springer International Publishing | |
1171 | Cyber-Physical Systems and Control | Dmitry G. Arseniev, Ludger Overmeyer, Heikki Kälviäinen, Branko Katalinic | 2020 | Springer International Publishing | |
1172 | Reliable Communications within Cyber-Physical Systems Using the Internet (RC4CPS) | Mohammad Elattar | 2020 | Springer Berlin Heidelberg;Springer Vieweg | |
1173 | ICCCE 2019: Proceedings of the 2nd International Conference on Communications and Cyber Physical Engineering | Amit Kumar, Stefan Mozar | 2020 | Springer Singapore | |
1174 | Cyber-Physical Energy and Power Systems: Modeling, Analysis and Application | Yijia Cao, Yong Li, Xuan Liu, Christian Rehtanz | 2020 | Springer Singapore | |
1175 | The Ethics Of Cybersecurity | Markus Christen, Bert Gordijn, Michele Loi | 2020 | Springer | |
1176 | Data Science In Cybersecurity And Cyberthreat Intelligence | Leslie F. Sikos, Kim-Kwang Raymond Choo | 2020 | Springer | |
1177 | Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques | Vinny Troia | 2020 | Wiley | |
1178 | Human Dimensions of Cybersecurity | Terry Bossomaier; Steven D'Alessandro; Roger Bradbury | 2020 | CRC Press | |
1179 | Cybercrime investigators handbook | Edwards, Graeme | 2020 | John Wiley & Sons | |
1180 | Mastering Linux Security And Hardening: Protect Your Linux Systems From Intruders, Malware Attacks, And Other Cyber Threats | Donald A. Tevault | 2020 | Packtpub | |
1181 | Secrets of a Cyber Security Architect | Brook S. E. Schoenfield | 2020 | CRC Press | |
1182 | Cybersecurity Attacks - Red Team Strategies: A practical guide to building a penetration testing program having homefield advantage | Johann Rehberger | 2020 | Packt Publishing | |
1183 | The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack | West, Levi | 2020 | | |
1184 | The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics | Ben Buchanan | 2020 | Harvard University Press | |
1185 | A Tangled Web: A Cyberstalker, a Deadly Obsession, and the Twisting Path | Leslie Rule | 2020 | | |
1186 | The Cybernetic Hypothesis | Tiqqun, Robert Hurley | 2020 | Semiotext(e) | |
1187 | Cybersecurity Fundamentals: A Real-World Perspective | Kutub Thakur; Al-Sakib Khan Pathan | 2020 | CRC Press | |
1188 | Cybersecurity Fundamentals: A Real-World Perspective | Kutub Thakur, Al-Sakib Khan Pathan | 2020 | CRC Press/Taylor & Francis Group | |
1189 | 25 Myths About Bullying And Cyberbullying | Elizabeth Kandel Englander | 2020 | Wiley-Blackwell | |
1190 | Distributed Control Methods and Cyber Security Issues in Microgrids | Wenchao Meng (editor), Xiaoyu Wang (editor), Shichao Liu (editor) | 2020 | Academic Press | |
1191 | Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... Systems and Computing (1147), Band 1147) | Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) | 2020 | Springer | |
1192 | Cyber-Physical Vehicle Systems: Methodology and Applications (Synthesis Lectures on Advances in Automotive Technology) | Chen Lv, Yang Xing, Junzhi Zhang | 2020 | MORGAN & CLAYPOOL | |
1193 | Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) | Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) | 2020 | Information Science Reference | |
1194 | Cyber Operations and International Law | François Delerue | 2020 | Cambridge University Press | |
1195 | Cyber Threat Intelligence for the Internet of Things | Elias Bou-Harb; Nataliia Neshenko | 2020 | Springer Nature | |
1196 | Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks | Tim Rains | 2020 | Packt Publishing | |
1197 | Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks | Tim Rains | 2020 | Packt Publishing | |
1198 | The Palgrave Handbook Of International Cybercrime And Cyberdeviance | Thomas J. Holt, Adam M. Bossler | 2020 | Palgrave Macmillan | |
1199 | Privileged Attack Vectors: Building Effective Cyber-defense Strategies to Protect Organizations | Morey J. Haber | 2020 | Apress | |
1200 | Cyber Operations And International Law | François Delerue | 2020 | Cambridge University Press | |
1201 | Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk | Gorecki | 2020 | Wiley | |
1202 | COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing | Dylan Mach | 2020 | | |
1203 | COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing | Mach, Dylan | 2020 | | |
1204 | COMPUTER PROGRAMMING FOR BEGINNERS: 4 Books in 1. LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing | Mach, Dylan | 2020 | | |
1205 | Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk | Andrew Gorecki | 2020 | John Wiley & Sons Inc | |
1206 | Cybercrime Investigations: A Comprehensive Resource For Everyone | John Bandler, Antonia Merzon | 2020 | CRC Press/Routledge/Taylor & Francis Group | |
1207 | Adaptive Autonomous Secure Cyber Systems | Sushil Jajodia (editor), George Cybenko (editor), V.S. Subrahmanian (editor), Vipin Swarup (editor), Cliff Wang (editor), Michael Wellman (editor) | 2020 | Springer | |
1208 | Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications) | Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu | 2020 | Springer | |
1209 | Cyber-security in Critical Infrastructures: A Game-theoretic Approach | Stefan Raß, Stefan Schauer, Sandra König, Quanyan Zhu | 2020 | Springer-Nature New York Inc | |
1210 | Cybercrime Investigations: A Comprehensive Resource for Everyone | John Bandler, Antonia Merzon | 2020 | CRC Press | |
1211 | The Hacker And The State: Cyber Attacks And The New Normal Of Geopolitics | Ben Buchanan | 2020 | Harvard University Press | |
1212 | The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics | Ben Buchanan | 2020 | Harvard University Press | |
1213 | The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics | Ben Buchanan | 2020 | Harvard University Press | |
1214 | Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats | Mark Dunkerley, Matt Tumbarello | 2020 | Packt Publishing - ebooks Account | |
1215 | Cyberwarfare: An Introduction To Information-Age Conflict | Isaac R. Porche III | 2020 | Artech House | |
1216 | Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats | Mark Dunkerley; Matt Tumbarello | 2020 | Packt Publishing Ltd | |
1217 | Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats | Mark Dunkerley; Matt Tumbarello | 2020 | Packt Publishing Ltd | |
1218 | Security And Law: Legal And Ethical Aspects Of Public Security, Cyber Security And Critical Infrastructure Security | Anton Vedder , Jessica Schroers , Charlotte Ducuing , Peggy Valcke | 2020 | Intersentia | |
1219 | Cyber Arms: Security in Cyberspace | Stanislav Abaimov, Maurizio Martellini | 2020 | CRC Press | |
1220 | Cyber Arms: Security in Cyberspace | Stanislav Abaimov, Maurizio Martellini | 2020 | CRC Press | |
1221 | Cybersecurity for Information Professionals: Concepts and Applications | Suliman Hawamdeh (editor), Hsia-Ching Chang (editor) | 2020 | Auerbach Publications | |
1222 | Cyber Strategy: Risk-Driven Security and Resiliency | Carol A. Siegel, Mark Sweeney | 2020 | Auerbach Publications | |
1223 | Cyber And Digital Forensic Investigations: A Law Enforcement Practitioner’s Perspective | Nhien An Le Khac, Kim-Kwang Raymond Choo | 2020 | Springer | |
1224 | Cyber and Digital Forensic Investigations: A Law Enforcement Practitioner’s Perspective (Studies in Big Data (74)) | Nhien-An Le-Khac (editor), Kim-Kwang Raymond Choo (editor) | 2020 | Springer | |
1225 | The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity | Dan Shoemaker; Anne Kohnke; Ken Sigler | 2020 | CRC Press | |
1226 | CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide, 2ed Edition | Troy McMillan | 2020 | Pearson | |
1227 | Your Cybersecurity Survival Guide: Your Simple Solution to Spot Social Engineering, Stop Ransomware, and Sleep Soundly at Night | McHale, David | 2020 | | |
1228 | The Pocket Guide to Cyber Security | H, James; D, Usha | 2020 | Usha D & James H | |
1229 | Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership | Marcus J. Carey; Jennifer Jin | 2020 | John Wiley & Sons | |
1230 | Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) | Gautam Kumar (editor), Dinesh Kumar Saini (editor), Nguyen Ha Huy Cuong (editor) | 2020 | CRC Press | |
1231 | Blockchain for Cybersecurity and Privacy (Internal Audit and IT Audit) | Yassine Maleh (editor) | 2020 | CRC Press | |
1232 | Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial Intelligence | Callaway, Jason | 2020 | | |
1233 | Computer Networking for Beginners: The Complete Guide to Network Systems, Wireless Technology, IP Subnetting, Including the Basics of Cybersecurity & the ... of Things for Artificial Intelligence | Callaway, Jason | 2020 | | |
1234 | Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber Hacker | Bladen, Brian | 2020 | Zepp Media | |
1235 | Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber Hacker | Bladen, Brian | 2020 | Zepp Media | |
1236 | ethical Hacking; Learn Penetration Testing, Cybersecurity with Advanced Ethical Hacking Techniques and Methods | Grant, Joe | 2020 | | |
1237 | Tribe of Hackers Blue Team: Tribal Knowledge from the best in Defensive Cybersecurity | Marcus J. Carey, Jennifer Jin | 2020 | Wiley | |
1238 | THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business | McKINNON, GUY | 2020 | UNKNOWN | |
1239 | The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack | Levi West | 2020 | | |
1240 | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats | Gerard Johansen | 2020 | | |
1241 | Secure Beyond Breach: A Practical Guide: Building a Defense-in-Depth Cybersecurity Strategy Through Micro-Segmentation | Jonathan Reiber et al. | 2020 | Illumio | |
1242 | Distributed Blackness: African American Cybercultures | André Brock, Jr. | 2020 | NYU Press | |
1243 | Cyber-Physical Systems: A Model-Based Approach | Walid M. Taha, Abd-Elhamid M. Taha, Johan Thunberg | 2020 | Springer | |
1244 | Cyber-Physical Systems: A Model-Based Approach | Walid M. Taha, Abd-Elhamid M. Taha, Johan Thunberg | 2020 | Springer | |
1245 | Computer Networking and Cybersecurity: A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats | Kiser, Quinn | 2020 | | |
1246 | Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Certification Guide) | Omar Santos | 2020 | Cisco Press | |
1247 | Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Certification Guide) | Omar Santos | 2020 | Cisco Press | |
1248 | Constitution and Production of Mathematics in the Cyberspace: A Phenomenological Approach | Maria Aparecida Viggiani Bicudo | 2020 | Springer International Publishing;Springer | |
1249 | Cyber Republic: Reinventing Democracy in the Age of Intelligent Machines | George Zarkadakis | 2020 | MIT Press | |
1250 | Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk | Andrew Magnusson | 2020 | No Starch Press | |
1251 | Cyber Security Handbook: Protect Yourself Against Cyber Crime | Greenwood, W. Muse | 2020 | | |
1252 | Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 | Knowles, John; Knowles, John | 2020 | | |
1253 | Tribe of hackers blue team: tribal knowledge from the best in defensive cybersecurity | Carey, Marcus J.; Jin, Jennifer | 2020 | Wiley | |
1254 | From Lambda calculus to cybersecurity through program analysis | | 2020 | Springer | |
1255 | Cybercrime: An Encyclopedia Of Digital Crime | Nancy E. Marion, Jason Twede | 2020 | ABC-CLIO | |
1256 | Cyber Security | Jocelyn O. Padallan | 2020 | Arcler Press | |
1257 | Cybersecurity In Humanities And Social Sciences: A Research Methods Approach | Hugo Loiseau, Daniel Ventre, Hartmut Aden | 2020 | John Wiley & Sons/ISTE | |
1258 | Behind the Enigma: The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency | John Ferris | 2020 | Bloomsbury Publishing | |
1259 | Cyber Privacy | April Falcon Doss | 2020 | BenBella Books, Inc. | |
1260 | Cybersecurity for Beginners: How to prevent Phishing & Social Engineering Attacks | Miller, Mike; Miller, Mike | 2020 | | |
1261 | Cybersecurity for Beginners : Incident Management Best Practices | Miller, Mike; Miller, Mike | 2020 | | |
1262 | Cybersecurity Law, Standards And Regulations | Tari Schreider | 2020 | Rothstein Publishing | |
1263 | Cybersecurity Law, Standards and Regulations | Schreider Tari | 2020 | Rothstein Publishing | |
1264 | The ABC of Cybersecurity: How to prevent Phishing & Social Engineering Attacks, Incident Management Best Practices and Cybersecurity Awareness for Employees | Miller, Mike; Miller, Mike | 2020 | | |
1265 | Gaian Systems: Lynn Margulis, Neocybernetics, and the End of the Anthropocene | Bruce Clarke | 2020 | University of Minnesota Press | |
1266 | Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems | Beibei Li, Rongxing Lu, Gaoxi Xiao | 2020 | Springer | |
1267 | Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context | José L. Risco Martín, Saurabh Mittal, Tuncer Ören | 2020 | Springer | |
1268 | CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide (2nd Edition) (Certification Guide) | Troy McMillan | 2020 | Pearson IT Certification | |
1269 | CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide (2nd Edition) (Certification Guide) | Troy McMillan | 2020 | Pearson IT Certification | |
1270 | First Line of Defense: The Beginners Book of Cyber Security | Nelson, Christopher | 2020 | | |
1271 | Model-driven Simulation and Training Environments for Cybersecurity Second International Workshop, MSTEC 2020.pdf | | 2020 | Springer | |
1272 | Cyber-Physical-Social Intelligence: On Human-Machine-Nature Symbiosis | Hai Zhuge | 2020 | Springer Singapore | |
1273 | Handbook of Integration of Cloud Computing, Cyber Physical Systems and Internet of Things | Rajiv Ranjan, Karan Mitra, Prem Prakash Jayaraman, Lizhe Wang, Albert Y. Zomaya | 2020 | Springer | |
1274 | The Cyber Security Network Guide | Fiedelholtz | 2020 | Springer | |
1275 | Artificial Intelligence and the Law: Cybercrime and Criminal Liability | Dennis J. Baker, Paul H. Robinson | 2020 | Routledge | |
1276 | Machine Learning Approaches in Cyber Security Analytics | Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel | 2020 | Springer | |
1277 | Practical Cybersecurity Architecture | Ed Moyle, Diana Kelley | 2020 | Packt Publishing Pvt Ltd | |
1278 | Valuations of Early-Stage Companies and Disruptive Technologies: How to Value Life Science, Cybersecurity and ICT Start-ups, and their Technologies | Tiran Rothman | 2020 | Palgrave Macmillan | |
1279 | Artificial Intelligence, Cybersecurity and Cyber Defence | Daniel Ventre | 2020 | Wiley-ISTE | |
1280 | Artificial Intelligence, Cybersecurity and Cyber Defence Book | Daniel Ventre | 2020 | | |
1281 | LINUX FOR HACKERS: LEARN CYBERSECURITY PRINCIPLES WITH SHELL,PYTHON,BASH PROGRAMMING USING KALI LINUX TOOLS. A COMPLETE GUIDE FOR BEGINNERS | DARWIN, TYE | 2020 | GVS PUBLICATIONS | |
1282 | Transdisciplinary Perspectives on Risk Management and Cyber Intelligence | Luisa Dall'Acqua, Irene Maria Gironacci | 2020 | Information Science Reference | |
1283 | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM | Regner Sabillon | 2020 | | |
1284 | Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020): 149 (Lecture Notes in Networks and Systems) | Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar | 2020 | Springer Singapore | |
1285 | Cybersecurity and Information Security Analysts: A Practical Career Guide | Kezia Endsley | 2020 | Rowman & Littlefield | |
1286 | Cybersecurity for Everyone | David B. Skillicorn | 2020 | CRC Press | |
1287 | A Tangled Web: A Cyberstalker, a Deadly Obsession, and the Twisting Path to Justice | Rule, Leslie | 2020 | Citadel Press; Kensington Publishing Corp | |
1288 | Quantum Cryptography and the Future of Cyber Security | Nirbhay Kumar Chaubey, Bhavesh B. Prajapati | 2020 | Information Science Reference | |
1289 | Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment | Dan Blum | 2020 | Apress | |
1290 | Cyber-Physical Systems in the Built Environment | Chimay J. Anumba, Nazila Roofigari-Esfahan | 2020 | Springer International Publishing;Springer | |
1291 | Big Data Analytics for Cyber-Physical Systems | Shiyan Hu, Bei Yu | 2020 | Springer International Publishing;Springer | |
1292 | Open Source Intelligence and Cyber Crime: Social Media Analytics | Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn | 2020 | Springer International Publishing;Springer | |
1293 | Security of Cyber-Physical Systems: Vulnerability and Impact | Hadis Karimipour, Pirathayini Srikantha, Hany Farag, Jin Wei-Kocsis | 2020 | Springer International Publishing;Springer | |
1294 | Automotive Cyber Security: Introduction, Challenges, and Standardization | Shiho Kim, Rakesh Shrestha | 2020 | Springer Singapore;Springer | |
1295 | Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers | Suresh Balusamy, Alexander N. Dudin, Manuel Graña, A. Kaja Mohideen, N. K. Sreelaja, B. Malar | 2020 | Springer Singapore;Springer | |
1296 | Frontiers in Cyber Security: Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings | Guangquan Xu, Kaitai Liang, Chunhua Su | 2020 | Springer Singapore;Springer | |
1297 | Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2020 Cyberspace Congress, CyberDI/CyberLife 2020, Beijing, China, December 10–12, 2020, Proceedings | Huansheng Ning, Feifei Shi | 2020 | Springer Singapore;Springer | |
1298 | Cyber-Physical-Social Intelligence: On Human-Machine-Nature Symbiosis | Hai Zhuge | 2020 | Springer Singapore;Springer | |
1299 | Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage | Timo Steffens | 2020 | Springer Berlin Heidelberg;Springer Vieweg | |
1300 | Machine Learning for Authorship Attribution and Cyber Forensics | Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung | 2020 | Springer International Publishing;Springer | |
1301 | Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I | Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang | 2020 | Springer International Publishing;Springer | |
1302 | Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II | Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang | 2020 | Springer International Publishing;Springer | |
1303 | Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part III | Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang | 2020 | Springer International Publishing;Springer | |
1304 | Getting Rid of Cybersickness: In Virtual Reality, Augmented Reality, and Simulators | Andras Kemeny, Jean-Rémy Chardonnet, Florent Colombet | 2020 | Springer International Publishing;Springer | |
1305 | Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach | Quanyan Zhu, Zhiheng Xu | 2020 | Springer International Publishing;Springer | |
1306 | Cybersecurity in Digital Transformation: Scope and Applications | Dietmar P.F. Möller | 2020 | Springer International Publishing;Springer | |
1307 | The Palgrave Handbook of International Cybercrime and Cyberdeviance | Thomas J. Holt, Adam M. Bossler | 2020 | Springer International Publishing;Palgrave Macmillan | |
1308 | Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA | Isabella Corradini, Enrico Nardelli, Tareq Ahram | 2020 | Springer International Publishing;Springer | |
1309 | Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings | Touhid Bhuiyan, Md. Mostafijur Rahman, Md. Asraf Ali | 2020 | Springer International Publishing;Springer | |
1310 | Proceedings of the International Conference of Mechatronics and Cyber- MixMechatronics - 2020 | Gheorghe Ion Gheorghe | 2020 | Springer International Publishing;Springer | |
1311 | Countering Cyber Threats to Financial Institutions: A Private and Public Partnership Approach to Critical Infrastructure Protection | Pierre-Luc Pomerleau, David L. Lowery | 2020 | Springer International Publishing;Palgrave Macmillan | |
1312 | Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings | Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss | 2020 | Springer International Publishing;Springer | |
1313 | Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of the 9th Computer Science On-line Conference 2020, Volume 3 | Radek Silhavy | 2020 | Springer International Publishing;Springer | |
1314 | Innovations in Cybersecurity Education | Kevin Daimi, Guillermo Francia III | 2020 | Springer International Publishing;Springer | |
1315 | HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings | Abbas Moallem | 2020 | Springer International Publishing;Springer | |
1316 | CyberKnife NeuroRadiosurgery : A practical Guide | Alfredo Conti, Pantaleo Romanelli, Evangelos Pantelis, Scott G. Soltys, Young Hyun Cho, Michael Lim | 2020 | Springer International Publishing;Springer | |
1317 | Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach | Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu | 2020 | Springer International Publishing;Springer | |
1318 | Digitalisation and Human Security: A Multi-Disciplinary Approach to Cybersecurity in the European High North | Mirva Salminen, Gerald Zojer, Kamrul Hossain | 2020 | Springer International Publishing;Palgrave Macmillan | |
1319 | FICTION Cyberpunk RED: Digital Edition (v1.24) | Mike Pondsmith, James Hutt, Cody Pondsmith, Jay Parker, J Gray, David Ackerman, Jaye Kovach | 2020 | R. Talsorian Games Inc. | |
1320 | Information Warfare in the Age of Cyber Conflict | Christopher Whyte, A. Trevor Thrall, Brian M. Mazanec | 2020 | Routledge | |
1321 | Digital forensics and incident response : incident response techniques and procedures to respond to modern cyber threats | Gerard Johansen | 2020 | | |
1322 | The Digital War: How China’s Tech Power Shapes the Future of AI, Blockchain, and Cyberspace | Winston Ma; Anthony Scaramucci | 2020 | | |
1323 | The Book of Random Tables: Cyberpunk | Matt Davids | 2020 | dicegeeks.com | |
1324 | Cybersecurity Law | Jeff Kosseff | 2020 | John Wiley & Sons | |
1325 | EMBEDDED SYSTEM DESIGN embedded systems foundations of cyber-physical systems, and the... internet of things. | PETER MARWEDEL | 2020 | SPRINGER NATURE | |
1326 | Cyberethics: Morality and Law in Cyberspace | Richard A. Spinello | 2020 | Jones & Bartlett Publishers | |
1327 | Big Breaches: Cybersecurity Lessons for Everyone | Neil Daswani; Moudy Elbayadi | 2020 | Apress | |
1328 | Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership | Marcus J. Carey, Jennifer Jin | 2020 | John Wiley & Sons | |
1329 | Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership | Jennifer Jin and Marcus J. Carey | 2020 | | |
1330 | Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity | Marcus J. Carey, Jennifer Jin | 2020 | John Wiley & Sons Inc | |
1331 | Tribe Of Hackers Security Leaders: Tribal Knowledge From The Best In Cybersecurity Leadership | Marcus J. Carey, Jennifer Jin | 2020 | John Wiley & Sons | |
1332 | Real-Time and Retrospective Analyses of Cyber Security | David Anthony Bird | 2020 | IGI Global | |
1333 | Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats | Aditya Mukherjee | 2020 | Packt Publishing Ltd | |
1334 | Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk | Andrew Magnusson | 2020 | No Starch Pr | |
1335 | Anarchist Cybernetics: Control and Communication in Radical Politics | Thomas Swann | 2020 | Bristol University Press | |
1336 | Routledge Handbook Of International Cybersecurity | Eneken Tikk, Mika Kerttunen | 2020 | Routledge/Taylor & Francis Group | |
1337 | Cybersecurity Analytics | Rakesh M. Verma; David J. Marchette | 2020 | CRC Press | |
1338 | Governing Cyberspace: Behavior, Power, and Diplomacy | Dennis Broeders (editor), Bibi van den Berg (editor) | 2020 | Rowman & Littlefield | |
1339 | Cybersecurity | Lewis, Elijah | 2020 | | |
1340 | The Cyber Intelligence Analyst’s Cookbook. Volume 1: A primer for Open Source Intelligence Collection and Applied Research | Open Source Researchers | 2020 | The Open Source Research Society | |
1341 | Myths and Realities of Cyber Warfare: Conflict in the Digital Realm | Nicholas Michael Sambaluk | 2020 | Praeger | |
1342 | Russian Cyber Operations: Coding the Boundaries of Conflict | Scott Jasper | 2020 | Georgetown University Press | |
1343 | Cyberwarfare: An Introduction To Information-Age Conflict | Porsche I. | 2020 | | |
1344 | Constructing cybersecurity: Power, expertise and the internet security industry (Manchester University Press) | Andrew Whiting | 2020 | Manchester University Press | |
1345 | Confluence of AI, Machine, and Deep Learning in Cyber Forensics | Sanjay Misra (editor), Chamundeswari Arumugam (editor), Suresh Jaganathan (editor) | 2020 | Information Science Reference | |
1346 | Artificial Intelligence Paradigms for Smart Cyber-Physical Systems | Ashish Kumar Luhach (editor), Atilla Elçi (editor) | 2020 | Engineering Science Reference | |
1347 | A Closer Look at Cybersecurity and Cryptanalysis | C. Rupa (editor), Sirajuddin (editor) | 2020 | Nova Science Pub Inc | |
1348 | Distributed Blackness: African American Cybercultures: 9 (Critical Cultural Communication) | Jr. André Brock | 2020 | NYU Press | |
1349 | Strategy, Leadership, and AI in the Cyber Ecosystem: The Role of Digital Societies in Information Governance and Decision Making | Hamid Jahankhani, Liam M. O’Dell, Gordon Bowen, Daniel Hagan, Arshad Jamal | 2020 | Academic Press | |
1350 | Governing New Frontiers In The Information Age: Toward Cyber Peace | Scott J. Shackelford | 2020 | Cambridge University Press | |
1351 | Concerning Stephen Willats and the Social Function of Art: Experiments in Cybernetics and Society | Sharon Irish | 2020 | Bloomsbury Visual Arts | |
1352 | Cyber Risks and Insurance: The Legal Principles | Dean Armstrong; Thomas Steward; Shyam Thakerar | 2020 | Bloomsbury Professional | |
1353 | Drone Visions: A Brief Cyberpunk History of Killing Machines | Naief Yehya | 2020 | Hyperbole Books Digital | |
1354 | Multi-Paradigm Modelling Approaches for Cyber-Physical Systems | Bedir Tekinerdogan (editor), Dominique Blouin (editor), Hans Vangheluwe (editor), Miguel Goulão (editor), Paulo Carreira (editor), Vasco Amaral (editor) | 2020 | Academic Press | |
1355 | Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments | Ric Messier | 2020 | McGraw-Hill Education | |
1356 | Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources | US Department of Justice | 2020 | US Department of Justice | |
1357 | Distributed Blackness: African American Cybercultures: 9 (Critical Cultural Communication) | Jr. André Brock | 2020 | NYU Press | |
1358 | Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Advances in Information Security, Privacy, and Ethics) | Natalie Sjelin (editor) | 2020 | IGI Global | |
1359 | Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats | Aditya Mukherjee | 2020 | Packt Publishing | |
1360 | Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects | Ed Moyle, Diana Kelley | 2020 | Packt Publishing | |
1361 | Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse: and Everything in Between | 2020 Paperback | Identify Theft | Bitcoin | ... Online Security | Fake News (Survival Series) | Heather Vescent, Nick Selby | 2020 | Weldon Owen | |
1362 | Hacking with Kali Linux: A beginner’s guide to learning all the basic of Kali Linux and cybersecurity. Includes network defense strategies, penetration testing and hacking tools for computer | Laurence, Norman | 2020 | | |
1363 | Artificial Intelligence, Cybersecurity and Cyber Defence | Daniel Ventre | 2020 | Wiley-ISTE | |
1364 | Cyber Warfare | Chase Cunningham | 2020 | Packt Publishing | |
1365 | Medical Device Cybersecurity for Engineers and Manufacturers | Axel Wirth, Christopher Gates, Jason Smith | 2020 | Artech House | |
1366 | Developing a Cybersecurity Immune System for Industry 4.0 | Sergei Petrenko (author) | 2020 | River Publishers | |
1367 | Tackling Cyberbullying and Related Problems. Innovative Usage of Games, Apps and Manga | Yuichi Tod, Insoo Oh (eds.) | 2020 | Taylor & Francis | |
1368 | The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks | Alan Calder | 2020 | IT Governance Publishing Ltd | |
1369 | The Cyber Security Handbook - Prepare for, Respond to and Recover from Cyber Attacks | Alan Calder | 2020 | IT Governance Ltd | |
1370 | Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth | Theresa Payton | 2020 | Rowman & Littlefield Publishers | |
1371 | Cyber security A national priority of Bangladesh | Md. Shariful Islam | 2020 | Routledge | |
1372 | Cyber Strategy: Risk-Driven Security and Resiliency | Carol A. Siegel, Mark Sweeney | 2020 | Auerbach Publications | |
1373 | Successful Cybersecurity Professionals: How To Change Your Behavior to Protect Your Organization | Steven Brown | 2020 | Business Expert Press | |
1374 | Cyber Warfare: A Documentary And Reference Guide | Paul J. Springer | 2020 | Greenwood | ABC-CLIO | |
1375 | Cybersecurity for Small and Midsize Businesses | Marlon Bermudez | 2020 | BookBaby | |
1376 | IEEE Systems, Man, & Cybernetics Magazine | | 2020 | | |
1377 | IEEE Systems, Man, & Cybernetics Magazine | | 2020 | | |
1378 | IEEE Systems, Man, & Cybernetics Magazine | | 2020 | | |
1379 | IEEE Systems, Man, & Cybernetics Magazine | | 2020 | | |
1380 | Cybersecurity for Space: Protecting the Final Frontier | Jacob G. Oakley | 2020 | Apress | |
1381 | Cybersecurity and Decision Makers: Data Security and Digital Trust | Marie De Fréminville | 2020 | Wiley-ISTE | |
1382 | Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe | Shira Rubinoff | 2020 | Packt Publishing | |
1383 | A Visual History of Cybersecurity | Optiv (firm) | 2020 | optiv.com | |
1384 | AI in the Age of Cyber-Disorder. Actors, Trends, and Prospects | Fabio Rugge | 2020 | Ledizioni | |
1385 | Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization | Pascal Ackerman | 2020 | BPB Publications | |
1386 | Cyber Security Practitioner's Guide | Hamid Jahankhani (editor) | 2020 | WSPC | |
1387 | Cyber Security Practitioner's Guide | Hamid Jahankhani (editor) | 2020 | WSPC | |
1388 | Cyber Security Practitioner's Guide | Hamid Jahankhani (editor) | 2020 | WSPC | |
1389 | Artificial Intelligence, Cybersecurity and Cyber Defence | Daniel Ventre | 2020 | Wiley-ISTE | |
1390 | Ramble: An Irregular Cyberpunk Journey into the Musical Heart | D. B. Goodin | 2020 | David Goodin Author | |
1391 | Cyber Security ABCs: Delivering Awareness, Behaviours and Culture Change | Jessica Barker; Adrian Davis; Bruce Hallas; Ciarán Mc Mahon | 2020 | BCS, The Chartered Institute for IT | |
1392 | A Short & Happy Guide to Privacy and Cybersecurity Law | Jon M. Garon | 2020 | West Academic Publishing | |
1393 | Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers | Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, Reinhardt Botha | 2020 | Springer | |
1394 | Security Risk Models for Cyber Insurance | Caroline Baylon, Jose Vila, David Rios Insua | 2020 | CRC Press/Chapman & Hall | |
1395 | Psycho-Cybernetics and Self-Fulfillment | Maxwell Maltz | 2020 | BN Publishing | |
1396 | Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career | Jessica Barker | 2020 | Kogan Page | |
1397 | Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques | Vinny Troia | 2020 | Wiley | |
1398 | Cybersecurity and Resilience in the Arctic | Benjamin D. Trump, Kamrul Hossain, Igor Linkov | 2020 | IOS Press | |
1399 | Handbook of Computer Networks and Cyber Security. Principles and Paradigms | Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta | 2020 | Springer | |
1400 | Cyber Warfare – Truth, Tactics, and Strategies | Dr. Chase Cunningham | 2020 | Packt | |
1401 | Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare | Dr. Chase Cunningham | 2020 | Packt Publishing | |
1402 | Developing a Cybersecurity Immune System for Industry 4.0 | Sergei Petrenko; | 2020 | CRC Press (Unlimited) | |
1403 | Cyber Risk, Intellectual Property Theft and Cyberwarfare: Asia, Europe and the USA | Ruth Taplin | 2020 | Routledge | |
1404 | Cybercrimes: Critical Issues in a Global Context | | 2020 | Red Globe Press | |
1405 | CYBERSECURITY RISKS, PROGRESS, AND THE WAY FORWARD IN LATIN AMERICA AND THE CARIBBEAN | coll. | 2020 | Cybersecurity Report | |
1406 | Cyber Security Report 2020. | coll. | 2020 | CPR | |
1407 | Cybercrime: Current Threats and Responses A review of the research literature | Sheelagh Brady & Caitríona Heinl | 2020 | SAR Consultancy & EXEDEC | |
1408 | Cybernetic Psychology and Mental Health: A Circular Logic Of Control Beyond The Individual (Concepts for Critical Psychology) | Timothy J. Beck | 2020 | Routledge | |
1409 | Red Teaming Around Your Backyard While Drinking Our Juice in The Hood: Cyber Intelligence Report: 202 | Richard Medlin; Nitin Sharma; Justin Casey | 2020 | Independently Published | |
1410 | Privacy, Security, and Cyberspace, Revised Edition | Robert Plotkin | 2020 | Infobase Holdings, Inc | |
1411 | Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations | Morey J. Haber | 2020 | Apress | |
1412 | Cybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks | Trust Genics | 2020 | Thomas William | |
1413 | Cyber Security: Essential Principles to Secure Your Organisation | Alan Calder; Archie (Male Synthesized Voice) | 2020 | IT Governance Ltd | |
1414 | The Projected and Prophetic: Humanity in Cyberculture, Cyberspace, and Science Fiction | Jordan J. Copeland | 2020 | BRILL | |
1415 | Visions of the Human in Science Fiction and Cyberpunk | Marcus Leaning; Birgit Pretzsch | 2020 | BRILL | |
1416 | Distributed Blackness: African American Cybercultures | André Brock, Jr. | 2020 | New York University Press | |
1417 | Global Obscenities: Patriarchy, Capitalism, and the Lure of Cyberfantasy | Zillah Eisenstein | 2020 | New York University Press | |
1418 | Anarchist Cybernetics: Control and Communication in Radical Politics | Thomas Swann | 2020 | Bristol University Press | |
1419 | The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics | Ben Buchanan | 2020 | Harvard University Press | |
1420 | Constructing cybersecurity: Power, expertise and the internet security industry | Andrew Whiting | 2020 | Manchester University Press | |
1421 | The Risk Business: What CISOs Need to Know about Risk-Based Cybersecurity | Levi Gundert | 2020 | | |
1422 | Mastering Core Essentials Cyber Hacking Point of Sale and Credit Card Payments | Baig Mohsin | 2020 | | |
1423 | Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies (Lecture Notes in Electrical Engineering, 643) | Vinit Kumar Gunjan (editor), Sabrina Senatore (editor), Amit Kumar (editor), Xiao-Zhi Gao (editor), Suresh Merugu (editor) | 2020 | Springer | |
1424 | Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing) | Shishir K. Shandilya (editor), Neal Wagner (editor), Atulya K. Nagar (editor) | 2020 | Springer | |
1425 | Blockchain Cybersecurity, Trust and Privacy (Advances in Information Security, 79) | Kim-Kwang Raymond Choo (editor), Ali Dehghantanha (editor), Reza M. Parizi (editor) | 2020 | Springer | |
1426 | Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting | Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna | 2020 | Springer | |
1427 | Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats | Donald A. Tevault | 2020 | Packt | |
1428 | Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Series on Asian Criminology and Criminal Justice Research) | Balsing Rajput | 2020 | Springer | |
1429 | Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2019 (Algorithms for Intelligent Systems) | Vinit Kumar Gunjan (editor), P. N. Suganthan (editor), Jan Haase (editor), Amit Kumar (editor), Balasubramanian Raman (editor) | 2020 | Springer | |
1430 | Data-Driven Modeling of Cyber-Physical Systems using Side-Channel Analysis | Sujit Rokka Chhetri, Mohammad Abdullah Al Faruque | 2020 | Springer | |
1431 | Cyber Physical Systems. Model-Based Design: 9th International Workshop, CyPhy 2019, and 15th International Workshop, WESE 2019, New York City, NY, ... Applications, incl. Internet/Web, and HCI) | Roger Chamberlain (editor), Martin Edin Grimheden (editor), Walid Taha (editor) | 2020 | Springer | |
1432 | Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I (Lecture Notes in Computer Science, 11982) | Jaideep Vaidya (editor), Xiao Zhang (editor), Jin Li (editor) | 2020 | Springer | |
1433 | Cyber Security in India: Education, Research and Training (IITK Directions, 4) | Sandeep Kumar Shukla (editor), Manindra Agrawal (editor) | 2020 | Springer | |
1434 | Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity (Advanced Sciences and Technologies for Security Applications) | Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Nishan Chelvachandran (editor), Jaime Ibarra (editor) | 2020 | Springer | |
1435 | Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers (Security and Cryptology) | Sokratis Katsikas (editor), Frédéric Cuppens (editor), Nora Cuppens (editor), Costas Lambrinoudakis (editor), Christos Kalloniatis (editor), John Mylopoulos (editor), Annie Antón (editor), Stefanos Gritzalis (editor), Frank Pallas (editor) | 2020 | Springer | |
1436 | The NICE Cyber Security Framework: Cyber Security Management | Izzat Alsmadi, Chuck Easttom, Lo’ai Tawalbeh | 2020 | Springer | |
1437 | Transactions on Computational Science XXXVI: Special Issue on Cyberworlds and Cybersecurity | Marina L. Gavrilova (editor), C.J. Kenneth Tan (editor), Alexei Sourin (editor) | 2020 | Springer | |
1438 | Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1147) | Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) | 2020 | Springer | |
1439 | Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019) (Advances in Intelligent Systems and Computing, 1088) | Chuanchao Huang (editor), Yu-Wei Chan (editor), Neil Yen (editor) | 2020 | Springer | |
1440 | Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), ... in Intelligent Systems and Computing, 1146) | Zheng Xu (editor), Reza M. Parizi (editor), Mohammad Hammoudeh (editor), Octavio Loyola-González (editor) | 2020 | Springer | |
1441 | Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part II (Security and Cryptology) | Jaideep Vaidya (editor), Xiao Zhang (editor), Jin Li (editor) | 2020 | Springer | |
1442 | Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2019, 28-29 December 2019, Shenyang, China (Advances in Intelligent Systems and Computing, 1117) | Mohammed Atiquzzaman (editor), Neil Yen (editor), Zheng Xu (editor) | 2020 | Springer | |
1443 | Hypno-Cybernetics: Helping Yourself to a Rich New Life | Robert B. Stone; Sidney Petrie | 2020 | Dennis A. Stone | |
1444 | Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems | Paulo Carreira (editor), Vasco Amaral (editor), Hans Vangheluwe (editor) | 2020 | Springer | |
1445 | Information and Cyber Security: 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Communications in Computer and Information Science, 1166) | Hein Venter (editor), Marianne Loock (editor), Marijke Coetzee (editor), Mariki Eloff (editor), Jan Eloff (editor) | 2020 | Springer | |
1446 | Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019) (Lecture Notes in Networks and Systems, 121) | Pradeep Kumar Singh (editor), Wieslaw Pawlowski (editor), Sudeep Tanwar (editor), Neeraj Kumar (editor), Joel J. P. C. Rodrigues (editor), Mohammad Salameh Obaidat (editor) | 2020 | Springer | |
1447 | For the Love of Cybernetics: Personal Narratives by Cyberneticians | Jocelyn Chapman | 2020 | Routledge | |
1448 | Open Source Intelligence and Cyber Crime: Social Media Analytics | Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn | 2020 | Springer International Publishing | |
1449 | Understanding cyber warfare: politics, policy and strategy | Mazanec, Brian M.; Whyte, Christopher | 2019 | Routledge | |
1450 | Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts | Ethem Mining | 2019 | Independently published | |
1451 | Cyber Crisis Management: Overcoming the Challenges in Cyberspace | Rodney D Ryder, Ashwin Madhavan | 2019 | Bloomsbury India | |
1452 | Cyber Resilience of Systems and Networks | Alexander Kott, Igor Linkov | 2019 | Springer International Publishing | |
1453 | Cybernetics and Algorithms in Intelligent Systems | Radek Silhavy | 2019 | Springer International Publishing | |
1454 | Pathology of Learning in Cyber Space | Sayed Hadi Sadeghi | 2019 | Springer International Publishing | |
1455 | Advances in Human Factors in Cybersecurity | Tareq Z. Ahram, Denise Nicholson | 2019 | Springer International Publishing | |
1456 | CyberGIS for Geospatial Discovery and Innovation | Shaowen Wang, Michael F. Goodchild | 2019 | Springer Netherlands | |
1457 | Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks | Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun | 2019 | Springer Singapore | |
1458 | Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings | Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang | 2019 | Springer | |
1459 | Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions | Paul Rohmeyer, Jennifer L. Bayuk | 2019 | Apress | |
1460 | Intelligent Systems in Cybernetics and Automation Control Theory | Radek Silhavy, Petr Silhavy, Zdenka Prokopova | 2019 | Springer International Publishing | |
1461 | Preparing for the Next Cyber Revolution: How Our World Will Be Radically Transformed—Again! | Joseph N. Pelton | 2019 | Springer International Publishing | |
1462 | Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings | Frank Breitinger, Ibrahim Baggili | 2019 | Springer International Publishing | |
1463 | Cybercryptography: Applicable Cryptography for Cyberspace Security | Song Y. Yan | 2019 | Springer International Publishing | |
1464 | Cyber-Physical Systems: Architecture, Security and Application | Song Guo, Deze Zeng | 2019 | Springer International Publishing | |
1465 | Biometric-Based Physical and Cybersecurity Systems | Mohammad S. Obaidat, Issa Traore, Isaac Woungang | 2019 | Springer International Publishing | |
1466 | International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security and Intelligence | Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman | 2019 | Springer International Publishing | |
1467 | Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2018 | Jürgen Beyerer, Christian Kühnert, Oliver Niggemann | 2019 | Springer Berlin Heidelberg,Springer Vieweg | |
1468 | ICCCE 2018: Proceedings of the International Conference on Communications and Cyber Physical Engineering 2018 | Amit Kumar, Stefan Mozar | 2019 | Springer Singapore | |
1469 | Social Network Forensics, Cyber Security, and Machine Learning | P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat | 2019 | Springer Singapore | |
1470 | Advances in Cyber Security: Principles, Techniques, and Applications | Kuan-Ching Li, Xiaofeng Chen, Willy Susilo | 2019 | Springer Singapore | |
1471 | Intellectual Property Rights in Cyberspace | Akash kamal Mishra | 2019 | Cyberlekh | |
1472 | Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World | Marcus J Carey | 2019 | Threatcare Press | |
1473 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O’Leary | 2019 | Apress | |
1474 | Cyber Security: Threats and Responses for Government and Business | Jack Caravelli, Nigel Jones | 2019 | Praeger Security International | |
1475 | Professional Red Teaming: Conducting Successful Cybersecurity Engagements | Jacob G. Oakley | 2019 | Apress | |
1476 | Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations | Herbert Lin; Amy Zegart | 2019 | Brookings Institution Press | |
1477 | Resilience of Cyber-Physical Systems: From Risk Modelling to Threat Counteraction | Francesco Flammini | 2019 | Springer | |
1478 | An introduction to cyber modeling and simulation | Couretas, Jerry M | 2019 | Wiley | |
1479 | Human-computer interaction and cybersecurity handbook | Moallem, Abbas | 2019 | CRC Press | |
1480 | Deviance in Social Media and Social Cyber Forensics: Uncovering Hidden Relations Using Open Source Information (OSINF) | Samer Al-khateeb, Nitin Argawal | 2019 | Springer | |
1481 | The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics | Izzat Alsmadi | 2019 | Springer International Publishing | |
1482 | Narratives in Research and Interventions on Cyberbullying among Young People | Heidi Vandebosch, Lelia Green | 2019 | Springer International Publishing | |
1483 | Cyberdiplomacy : managing security and governance online | Riordan, Shaun | 2019 | Polity Press | |
1484 | Computer Security: ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers | Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis | 2019 | Springer International Publishing | |
1485 | CyberParks – The Interface Between People, Places and Technology: New Approaches and Perspectives | Carlos Smaniotto Costa, Ina Šuklje Erjavec, Therese Kenna, Michiel de Lange, Konstantinos Ioannidis, Gabriela Maksymiuk, Martijn de Waal | 2019 | Springer International Publishing | |
1486 | Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime | Aamo Iorliam | 2019 | Springer International Publishing | |
1487 | Drones as Cyber-Physical Systems: Concepts and Applications for the Fourth Industrial Revolution | Jung-Sup Um | 2019 | Springer Singapore | |
1488 | Internet Addiction Among Cyberkids in China: Risk Factors and Intervention Strategies | Qiaolei Jiang | 2019 | Springer Singapore | |
1489 | Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers | Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou | 2019 | Springer Singapore | |
1490 | Emerging Trends in Cyber Ethics and Education | Ashley Blackburn, Irene Linlin Chen | 2019 | IGI Global | |
1491 | Cyberdanger: Understanding and Guarding Against Cybercrime | Eddy Willems | 2019 | Springer | |
1492 | The Cyber Plumber’s Handbook: The definitive guide to SSH tunneling, port redirection, and bending traffic like a boss. | Brennon Thomas | 2019 | Opsdisk LLC | |
1493 | Understanding Cyberrisks in IoT: When Smart Things Turn Against You | Carolina A. Adaros Boye | 2019 | Business Expert Press | |
1494 | Kingdom of Lies: Unnerving Adventures in the World of Cybercrime | Kate Fazzini | 2019 | St. Martin’s Press | |
1495 | Practical Cyber Forensics. An Incident-based Approach to Forensic Investigations | Niranjan Reddy | 2019 | Apress | |
1496 | Cybersecurity of Industrial Systems | Jean-Marie Flaus | 2019 | ISTE, John Wiley & Sons | |
1497 | Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior | Carbon Black | 2019 | Carbon Black | |
1498 | Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity | Marcus J. Carey, Jennifer Jin | 2019 | Wiley | |
1499 | The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity | Phil Quade | 2019 | John Wiley & Sons | |
1500 | Cyber Enigma: Unravelling the Terror in the Cyber World | E. Dilipraj | 2019 | Routledge | |
1501 | Deviant Security - The Technical Computer Security Practices of Cyber Criminals | Eric Van De Sandt | 2019 | University of Bristol | |
1502 | Rewired: The Past, Present, and Future of Cybersecurity | Ryan Ellis; Vivek Mohan | 2019 | Wiley | |
1503 | Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations | Niranjan Reddy | 2019 | Apress | |
1504 | Design Automation of Cyber-Physical Systems | Mohammad Abdullah Al Faruque, Arquimedes Canedo | 2019 | Springer International Publishing | |
1505 | Big Data Privacy Preservation for Cyber-Physical Systems | Miao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han | 2019 | Springer International Publishing | |
1506 | Navigating New Cyber Risks: How Businesses Can Plan, Build and Manage Safe Spaces in the Digital Age | Ganna Pogrebna, Mark Skilton | 2019 | Springer International Publishing; Palgrave Macmillan | |
1507 | Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments | Aboul Ella Hassanien, Mohamed Elhoseny | 2019 | Springer International Publishing | |
1508 | Cyber Physical Systems. Design, Modeling, and Evaluation: 7th International Workshop, CyPhy 2017, Seoul, South Korea, October 15-20, 2017, Revised Selected Papers | Roger Chamberlain, Walid Taha, Martin Törngren | 2019 | Springer International Publishing | |
1509 | Proceedings of the 12th International Conference on Measurement and Quality Control - Cyber Physical Issue: IMEKO TC 14 2019 | Vidosav D. Majstorovic, Numan Durakbasa | 2019 | Springer International Publishing | |
1510 | Human Activity Recognition and Behaviour Analysis: For Cyber-Physical Systems in Smart Environments | Liming Chen, Chris D. Nugent | 2019 | Springer International Publishing | |
1511 | Cybernetics and Automation Control Theory Methods in Intelligent Algorithms: Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3 | Radek Silhavy | 2019 | Springer International Publishing | |
1512 | Simplicity is Complex: Foundations of Cyber-Physical System Design | Hermann Kopetz | 2019 | Springer International Publishing | |
1513 | Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings | Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung | 2019 | Springer International Publishing | |
1514 | HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings | Abbas Moallem | 2019 | Springer International Publishing | |
1515 | Cyber Physical Systems. Model-Based Design: 8th International Workshop, CyPhy 2018, and 14th International Workshop, WESE 2018, Turin, Italy, October 4–5, 2018, Revised Selected Papers | Roger Chamberlain, Walid Taha, Martin Törngren | 2019 | Springer International Publishing | |
1516 | Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications | Dietmar P.F. Möller, Roland E. Haas | 2019 | Springer International Publishing | |
1517 | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Third International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) | Yang Xu, Hong Xia, Feng Gao, Weihua Chen, Zheming Liu, Pengfei Gu | 2019 | Springer Singapore | |
1518 | Cyberwar and Revolution: Digital Subterfuge in Global Capitalism | Nick Dyer-Witheford; Svitlana Matviyenko | 2019 | University of Minnesota Press | |
1519 | Cybersecurity Blue Team Toolkit | Nadean H. Tanner | 2019 | Wiley | |
1520 | Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science | Wayne Patterson, Cynthia E. Winston-Proctor | 2019 | Taylor & Francis;CRC | |
1521 | CISO compass: navigating cybersecurity leadership challenges with insights from pioneers | Fitzgerald, Todd | 2019 | CRC Press | |
1522 | Computer and cyber security: principles, algorithm, applications, and perspectives | Agrawal, Dharma Prakash; Gupta, Brij; Wang, Haoxiang | 2019 | CRC Press | |
1523 | Cybersecurity and Privacy in Cyber–Physical Systems | Yassine Maleh, Shojafar Mohammad, Darwish Ashraf, Haqiq Abdelkrim | 2019 | CRC Press | |
1524 | Cybersecurity awareness among students and faculty | Moallem, Abbas | 2019 | CRC Press/Taylor & Francis Group | |
1525 | Machine learning for computer and cyber security: principles, algorithms, and practices | Gupta, Brij; Sheng, Quan Z | 2019 | CRC Press | |
1526 | Weapons Systems: Annual Assessment and Cybersecurity | Dale R. Cople | 2019 | Nova Science Publishers | |
1527 | Rewired: Cybersecurity Governance | Ryan Ellis, Vivek Mohan | 2019 | Wiley & Sons | |
1528 | A Leader’s Guide to Cybersecurity: Why Boards Need to Lead–and How to Do It | Thomas J. Parenty, Jack J. Domet | 2019 | Harvard Business Review Press | |
1529 | Cybersecurity Law 2nd Edition | Jeff Kosseff | 2019 | Wiley | |
1530 | The Cyber Patient: Navigating Virtual Informatics | Rebecca Mendoza Saltiel Busch | 2019 | Taylor and Francis | |
1531 | Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers | Andy Greenberg | 2019 | Doubleday Books | |
1532 | System Administration Ethics: Ten Commandments For Security And Compliance In A Modern Cyber World | Igor Ljubuncic, Tom Litterer | 2019 | Springer/Apress | |
1533 | Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers | Andy Greenberg | 2019 | Doubleday Books | |
1534 | Cyber-Security And Information Warfare | Nicholas J. Daras | 2019 | Nova Science Publishers | |
1535 | Cybercrime Prevention: Theory And Applications | Russell Brewer, Melissa De Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, David Maimon | 2019 | Palgrave Pivot | |
1536 | Analyzing Human Behavior In Cyberspace | Zheng Yan | 2019 | IGI Global Information Science Reference/IGI Global | |
1537 | Machine Learning for Cybersecurity Cookbook | Emmanuel Tsukerman | 2019 | Packt Publishing | |
1538 | Tribe Of Hackers: Cybersecurity Advice From The Best Hackers In The World | Marcus J. Carey, Jennifer Jin | 2019 | John Wiley & Sons | |
1539 | The Cyber Economy: Opportunities And Challenges For Artificial Intelligence In The Digital Workplace | Vladimir Filippov, Alexander Chursin, Julia Ragulina, Elena G. Popkova | 2019 | Springer | |
1540 | CyBok: The Cyber Security Body of Knowledge | Awais Rashid; Howard Chivers; George Danezis; Emil Lupu; Andrew Martin | 2019 | National Cyber Security Centre | |
1541 | Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security | Erickson Karnel | 2019 | | |
1542 | Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python | Emmanuel Tsukerman | 2019 | Packt Publishing | |
1543 | Cyber-Risk And Youth: Digital Citizenship, Privacy And Surveillance | Michael C. Adorjan, Rosemary Ricciardelli | 2019 | Routledge/Taylor & Francis Group | |
1544 | Cyber Espionage And International Law | Russell Buchan | 2019 | HART Publishing/Bloomsbury Publishing | |
1545 | Waging Cyber War | Jacob G. Oakley | 2019 | Apress | |
1546 | The Privacy, Data Protection And Cybersecurity Law Review | Alan Charles Raul | 2019 | Law Business Research | |
1547 | The Crime Of Aggression: The Quest For Justice In An Age Of Drones, Cyberattacks, Insurgents, And Autocrats | Noah Weisbord | 2019 | Princeton University Press | |
1548 | Waging Cyber War: Technical Challenges and Operational Constraints | Jacob G. Oakley | 2019 | Apress | |
1549 | Deep Learning Applications for Cyber Security | Mamoun Alazab, MingJian Tang | 2019 | Springer International Publishing | |
1550 | Design Cybernetics: Navigating the New | Thomas Fischer, Christiane M. Herr | 2019 | Springer International Publishing | |
1551 | Cybersecurity in the Electricity Sector: Managing Critical Infrastructure | Rafal Leszczyna | 2019 | Springer International Publishing | |
1552 | Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb | Stefan Biffl, Matthias Eckhart, Arndt Lüder, Edgar Weippl | 2019 | Springer International Publishing | |
1553 | Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings | Xiaofeng Chen, Xinyi Huang, Jun Zhang | 2019 | Springer International Publishing | |
1554 | Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security | Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman | 2019 | Springer International Publishing | |
1555 | From Reactive Systems to Cyber-Physical Systems: Essays Dedicated to Scott A. Smolka on the Occasion of His 65th Birthday | Ezio Bartocci, Rance Cleaveland, Radu Grosu, Oleg Sokolsky | 2019 | Springer International Publishing | |
1556 | Science of Cyber Security: Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers | Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung | 2019 | Springer International Publishing | |
1557 | Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part I | Auhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki | 2019 | Springer International Publishing | |
1558 | Advances in Data Science, Cyber Security and IT Applications: First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part II | Auhood Alfaries, Hanan Mengash, Ansar Yasar, Elhadi Shakshuki | 2019 | Springer International Publishing | |
1559 | Trustworthy Cyber-Physical Systems: A Systematic Framework towards Design and Evaluation of Trust and Trustworthiness | Nazila Gol Mohammadi | 2019 | Springer Fachmedien Wiesbaden;Springer Vieweg | |
1560 | Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings | Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu | 2019 | Springer Singapore | |
1561 | Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part I | Huansheng Ning | 2019 | Springer Singapore | |
1562 | Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Beijing, China, December 16–18, 2019, Proceedings, Part II | Huansheng Ning | 2019 | Springer Singapore | |
1563 | Behavioral cybersecurity : applications of personality psychology and computer science | Patterson, Wayne; Winston-Proctor, Cynthia E | 2019 | CRC Press | |
1564 | Reinforcement learning for cyber-physical systems with cybersecurity case studies | Li, Chong; Qiu, Meikang | 2019 | CRC Press | |
1565 | The cyber patient : navigating virtual informatics | Busch, Rebecca S | 2019 | CRC Press | |
1566 | Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT | Tounsi, Wiem | 2019 | ISTE | |
1567 | Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World | Marcus J. Carey, Jennifer Jin | 2019 | Wiley | |
1568 | Developing Cybersecurity Programs And Policies | Omar Santos | 2019 | Pearson Education | |
1569 | Understanding Cyber Warfare: Politics, Policy And Strategy | Christopher Whyte, Brian Mazanec | 2019 | Routledge/Taylor & Francis Group | |
1570 | Cybernetics, or Control and Communication in the Animal and the Machine | Norbert Wiener | 2019 | MIT Press | |
1571 | Advances in Cyber Security: Principle, Techniques, and Applications | Kuan-Ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor) | 2019 | Springer Verlag, Singapore | |
1572 | Advances in Cyber Security: Principle, Techniques, and Applications | Kuan-ching Li (editor), Xiaofeng Chen (editor), Willy Susilo (editor) | 2019 | Springer-Nature New York Inc | |
1573 | Embedded System Interfacing: Design for the Internet-of-things Iot and Cyber-physical Systems Cps | Marilyn Wolf | 2019 | Morgan Kaufmann Publishers In | |
1574 | Cybersecurity law / | Jeff Kosseff. | 2019 | John Wiley & Sons | |
1575 | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | Erdal Ozkaya, Milad Aslaner | 2019 | Packt Publishing | |
1576 | Handbook of Research on Machine and Deep Learning Applications for Cyber Security (Advances in Information Security, Privacy, and Ethics) | Padmavathi Ganapathi (editor), D. Shanmugapriya (editor) | 2019 | Information Science Reference | |
1577 | Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition | Yuri Diogenes, Erdal Ozkaya | 2019 | Packt Publishing | |
1578 | Cybercrime and Society | Majid Yar; Kevin F. Steinmetz | 2019 | SAGE Publications | |
1579 | Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals | Zach Codings | 2019 | | |
1580 | Internet Governance And Regulations In Latin America: Analysis Of infrastructure, Privacy, Cybersecurity And Technological Developments In Honor Of The Tenth Anniversary Of The South School On Internet Governance | Luca Belli, Olga Cavalli | 2019 | FGV Direito Rio | |
1581 | Human Dimensions of Cybersecurity | Terry Bossomaier, Steven D'Alessandro, Roger Bradbury | 2019 | Auerbach Publications | |
1582 | Cybersecurity For Dummies (For Dummies (Computer/Tech)) | Joseph Steinberg | 2019 | For Dummies | |
1583 | The MANTIS book : cyber physical system based proactive collaborative maintenance | Michele Albano (editor) | 2019 | | |
1584 | Computer Security Fundamentals Fourth Edition (Pearson IT Cybersecurity Curriculum (ITCC)) | Dr. Chuck Easttom | 2019 | Pearson IT Certification | |
1585 | Computer and cyber security: principles, algorithm, applications, and perspectives | Agrawal, Dharma Prakash;Gupta, Brij;Wang, Harry Haoxiang | 2019 | CRC Press | |
1586 | Gray day: my undercover mission to expose America's first cyber spy | Hanssen, Robert;O'Neill, Eric | 2019 | Crown;Archetype | |
1587 | Cyberwar and revolution: digital subterfuge in global capitalism | Dyer-Witheford, Nick;Matviyenko, Svitlana | 2019 | University of Minnesota Press | |
1588 | Kingdom of lies: unnerving adventures in the world of cybercrime | Fazzini, Kate | 2019 | St. Martin's Publishing Group;St. Martin's Press | |
1589 | The secret to cybersecurity: a simple plan to protect your family and business from cybercrime | Augenbaum, Scott E | 2019 | Forefront Books | |
1590 | Cyberbullying and the Wild, Wild Web What You Need to Know | Hitchcock, J. A | 2019 | Rowman & Littlefield Publishers | |
1591 | CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners) | STEVEN, MICHAEL; STEVEN, MICHAEL | 2019 | | |
1592 | The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security | Allison Cerra | 2019 | Wiley | |
1593 | Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line | Paul Troncone, Carl Albing | 2019 | O'Reilly Media | |
1594 | Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World | Carey, Marcus J.;Jin, Jennifer | 2019 | John Wiley & Sons | |
1595 | Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples to Test Infrastructure Security with Kali Linux Learning ... Basics of CyberSecurity and Ethical Hacking | Nowak, Grzegorz | 2019 | | |
1596 | Last Tango in Cyberspace | Kotler, Steven | 2019 | St. Martin's Publishing Group;St. Martin's Press | |
1597 | The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats | Clarke, Richard Alan;Knake, Robert K | 2019 | Penguin Random House LLC;Penguin Press | |
1598 | Professional Red Teaming: Conducting Successful Cybersecurity Engagements | Oakley, Jacob G | 2019 | Apress, Imprint, Apress | |
1599 | The Cyber Shadow | Lopez, Vincent | 2019 | Lulu Publishing Services | |
1600 | Cybersecurity For Dummies | Joseph Steinberg | 2019 | Wiley | |
1601 | Biometric-Based Physical and Cybersecurity Systems | Obaidat, Mohammad S.;Traore, Issa;Woungang, Isaac | 2019 | Springer International Publishing | |
1602 | Cybersecurity Blue Team Toolkit | Tanner, Nadean H | 2019 | Wiley | |
1603 | Building an Effective Cybersecurity Program | Tari Schreider | 2019 | Rothstein Publishing | |
1604 | Building an effective cybersecurity program. | TARI SCHREIDER | 2019 | ROTHSTEIN Publishing | |
1605 | Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies | Alessandro Parisi | 2019 | Packt Publishing | |
1606 | Cyber Operations Building, Defending, and Attacking Modern Computer Networks | O'Leary, Mike | 2019 | Apress | |
1607 | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies | Parisi, Alessandro | 2019 | Packt Publishing | |
1608 | Hands-on cybersecurity for finance: identify vulnerabilities and secure your financial services from security breaches | Ozkaya, Erdal;Aslaner, Milad | 2019 | Packt Publishing | |
1609 | Mastering malware analysis: the complete malware analyst's guide to combating malicious software, APT, cybercrime, and loT attacks | Kleymenov, Alexey;Thabet, Amr | 2019 | Packt Publishing | |
1610 | The secret to cybersecurity: a simple plan to protect your family and business from cybercrime | Augenbaum, Scott E | 2019 | Forefront Books | |
1611 | Cybersecurity and secure information systems: challenges and solutions in smart environments | Hassanien, Aboul Ella(Editor);Elhoseny, Mohamed(Editor) | 2019 | Springer | |
1612 | The Cybersecurity Playbook: Practical Steps for Every Leader and Employee--To Make Your Organization More Secure | Young, Christopher;Allison Cerra | 2019 | Wiley | |
1613 | Tribe of hackers: cybersecurity advice from the best hackers in the world | Carey, Marcus J;Jin, Jennifer | 2019 | John Wiley & Sons | |
1614 | Cybersecurity blue team toolkit | Tanner, Nadean H | 2019 | Wiley | |
1615 | Cyber Security comprehensive beginners guide to learn the basics and effective methods of cybersecurity | Walker, Brian | 2019 | | |
1616 | Kesan and Hayes's Cybersecurity and Privacy Law in a Nutshell (Nutshells) | Kesan, Jay P;Hayes, Carol Mullins | 2019 | West Academic Publishing | |
1617 | Secure Cyber-Physical Systems for Smart Cities | Riaz Ahmed Shaikh | 2019 | Engineering Science Reference | |
1618 | Comptia Cysa+ Cybersecurity Analyst Certification Bundle (Exam Cs0-001) | Maymi, Fernando;Chapman, Brent;Parker, Jeff T | 2019 | McGraw-Hill Education | |
1619 | Cyber Security: Threats and Responses for Government and Business | Caravelli, Jack;Jones, Nigel;Kozup, John C | 2019 | Praeger | |
1620 | Cybersecurity: The Beginner's Guide | Ozkaya, Erdal | 2019 | | |
1621 | Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity | Cox, Christopher | 2019 | | |
1622 | Everyday Cybersecurity: A practical approach to understanding cybersecurity, security awareness, and protecting your personal information and identity | Cox, Christopher | 2019 | | |
1623 | Hacking With Kali Linux: A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing | Bradley, Peter | 2019 | Independently published | |
1624 | Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing | Bradley, Peter | 2019 | | |
1625 | Cyborg Mind: What Brain-Computer and Mind-Cyberspace Interfaces Mean for Cyberneuroethics | Calum Mackellar | 2019 | Berghahn Books | |
1626 | Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers | Greenberg, Andy | 2019 | Doubleday Books;Penguin Random House LLC; Knopf Doubleday Publishing Group | |
1627 | Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity | Carey, Marcus J;Jin, Jennifer | 2019 | Wiley | |
1628 | Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and Performance | Steve Dixon | 2019 | Routledge | |
1629 | Cybersecurity: The Beginner's Guide | Erdal Ozkaya | 2019 | Packt Publishing | |
1630 | Cybernetics or Control and Communication in the Animal and the Machine, Reissue of the 1961 | Norbert Wiener | 2019 | MIT Press | |
1631 | From Cyber-Nationalism to Fandom Nationalism: The Case of Diba Expedition In China | Liu Hailong (editor) | 2019 | Routledge | |
1632 | Next Level Cybersecurity: Detect the Signals, Stop the Hack | Huda, Sai | 2019 | Leaders Press | |
1633 | Global Crime: An Encyclopedia of Cyber Theft, Weapons Sales, and Other Illegal Activities [2 volumes] | Philip Reichel (editor) | 2019 | ABC-CLIO | |
1634 | Global Crime: an Encyclopedia of Cyber Theft, Weapons Sales, and Other Illegal Activities [2 Volumes] | Reichel, Philip L. | 2019 | ABC-CLIO, LLC | |
1635 | Cyber & You: The impact of technology on our lives | Maureen Kendal | 2019 | Legend Business | |
1636 | Cyber & You: The impact of technology on our lives | Maureen Kendal | 2019 | Legend Business | |
1637 | Cyberspace and International Relations: The Co-Evolution Dilemma | Nazli Choucri, David D. Clark | 2019 | MIT Press | |
1638 | Cyber Influence and Cognitive Threats | Vladlena Benson, John Mcalaney | 2019 | Academic Press | |
1639 | Cybercartography in a Reconciliation Community: Engaging Intersecting Perspectives: Volume 8 (Modern Cartography Series) | Stephanie Pyne (editor), D. R. Fraser Taylor (editor) | 2019 | Elsevier | |
1640 | Cybercartography in a Reconciliation Community: Engaging Intersecting Perspectives | Stephanie Pyne (editor), D. R. Fraser Taylor (editor) | 2019 | Elsevier | |
1641 | Cybersecurity Law: Protect Yourself and Your Customers | Shimon Brathwaite (author) | 2019 | Business Expert Press | |
1642 | Conversations in Cyberspace | Giulio D'Agostino (author) | 2019 | Business Expert Press | |
1643 | The Business of Cybersecurity: Foundations and Ideologies | Ashwini Sathnur (author) | 2019 | Business Expert Press | |
1644 | Cyber Crimes Prevention: Promising Organisational Practices Information Technology & People. | Mahmood Shah. | 2019 | Emerald | |
1645 | The Oxford Handbook of Cyberpsychology | Alison Attrill-Smith, Chris Fullwood, Melanie Keep and Daria J. Kuss | 2019 | Oxford University Press | |
1646 | Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications | El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk | 2019 | Institution of Engineering and Technology | |
1647 | Global Crime: An Encyclopedia of Cyber Theft, Weapons Sales, and Other Illegal Activities [2 Volumes] | Philip L. Reichel; | 2019 | ABC-CLIO | |
1648 | Cyber Sufis: Virtual Expressions of the American Muslim Experience | Robert Rozehnal | 2019 | Oneworld Publications | |
1649 | The Politics and Technology of Cyberspace | Danny Steed | 2019 | Routledge | |
1650 | Ethical Challenges In Digital Psychology And Cyberpsychology | Thomas D. Parsons | 2019 | Cambridge University Press | |
1651 | Cybersecurity Ops with bash | Paul Troncone; Carl Albing Ph. D. | 2019 | O'Reilly Media | |
1652 | Cyberbullying in Schools, Workplaces, and Romantic Relationships: The Many Lenses and Perspectives of Electronic Mistreatment | Gary W. Giumetti (editor), Robin M. Kowalski (editor) | 2019 | Routledge | |
1653 | Confessions of an Illuminati Vol. 6.66: The Age of Cyber Satan, Artificial Intelligence, and Robotics | Leo Lyon Zagami | 2019 | Independently Published | |
1654 | Tools and Technologies for the Development of Cyber-Physical Systems | Sergey Balandin (editor), Ekaterina Balandina (editor) | 2019 | Engineering Science Reference | |
1655 | Critical Concepts, Standards, and Techniques in Cyber Forensics (Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT)) | Mohammad Zunnun Khan (editor) | 2019 | IGI Global | |
1656 | Cyberpunk in a Transnational Context | Takayuki Tatsumi (editor) | 2019 | MDPI AG | |
1657 | Confessions of an Illuminati Volume 6.66: The Age of Cyber Satan, Artificial Intelligence, and Robotics | Leo L. Zagami | 2019 | Cursum Perficio | |
1658 | Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies | Gia Nhu Nguyen; Dac-Nhuong Le; Raghvendra Kumar; Jyotir Moy Chatterjee; Manju Khari | 2019 | Wiley-Scrivener | |
1659 | State–Society Relations to Prevent Radicalism and Violent Extremism in the Cyberspace of Indonesia | Muhaimin Zulhair Achsin | 2019 | EUDL EAI | |
1660 | Constructing the Cyberterrorist: Critical Reflections on the UK Case | Gareth Mott | 2019 | Routledge | |
1661 | Last Tango in Cyberspace | Kotler, Steven | 2019 | St. Martin's Press | |
1662 | The Threat Hunt Process (THP) Roadmap: A Pathway for Advanced Cybersecurity Active Measures | MARK A RUSSO CISSP-ISSAP CEH IFPC | 2019 | Independently published | |
1663 | Cyber Attacks and International Law on the Use of Force | Samuli Haataja | 2019 | Routledge | |
1664 | Constructing the Cyberterrorist: Critical Reflections on the UK Case | Gareth Mott | 2019 | Routledge | |
1665 | Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and Beyond | Sean T. Lawson | 2019 | Routledge | |
1666 | Predicting Cyberbullying: Research, Theory, and Intervention | Christopher Paul Barlett | 2019 | Academic Press | |
1667 | Dealing with Cyberbullying | Derek Miller | 2019 | Cavendish Square Publishing, LLC | |
1668 | Cybersecurity: Current Writings on Threats and Protection | Joaquin Jay Gonzalez III | 2019 | McFarland & Company, Inc., Publishers | |
1669 | Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications | El-Sayed M. El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk | 2019 | The Institution of Engineering and Technology | |
1670 | CCNA Cyber Ops SECOPS – Certification Guide 210-255: Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate | Andrew Chu | 2019 | Packt Publishing | |
1671 | Linux Essentials for Cybersecurity (for True EPUB) | William “Bo” Rothwell; Denise Kinsey | 2019 | Pearson Education | |
1672 | Cyber Resilience | Sergei Petrenko | 2019 | River Publishers | |
1673 | Cybercrime Through an Interdisciplinary Lens | Thomas J. Holt | 2019 | Taylor & Francis | |
1674 | Digital Media and the Greek Crisis: Cyberconflicts, Discourses and Networks | Ioanna Ferra | 2019 | Emerald Group Publishing | |
1675 | The International Dimensions of Cyberspace Law | Bruno De Padirac | 2019 | Taylor & Francis | |
1676 | Commercial and Cyber Fraud: A Legal Guide to Justice for Businesses | Ian Smith; David Shepherd | 2019 | Bloomsbury Professional | |
1677 | Cyber Espionage and International Law | Russell Buchan | 2019 | Hart Publishing | |
1678 | Advancing Software Security in the EU: The role of the EU cybersecurity certification framework | ENISA | 2019 | ENISA | |
1679 | Cyber Security in Parallel and Distributed Computing | DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee | 2019 | Scrivener Publishing | |
1680 | Russian Cyber Warfare: The History of Russia’s State-Sponsored Attacks across the World | Charles River Editors | 2019 | Charles River Editors | |
1681 | Cybersecurity: The Insights You Need from Harvard Business Review | Harvard Business Review; Alex Blau; Andrew Burt; Boris Groysberg; Roman V. Yampolskiy | 2019 | Harvard Business Press | |
1682 | Movement and Time in the Cyberworld: Questioning the Digital Cast of Being | Michael Eldred | 2019 | De Gruyter | |
1683 | Movement and Time in the Cyberworld: Questioning the Digital Cast of Being | Michael Eldred | 2019 | De Gruyter | |
1684 | Handbook of Computer Networks and Cyber Security: Principles and Paradigms | Brij B. Gupta; Gregorio Martinez Perez; Dharma P. Agrawal; Deepak Gupta | 2019 | Springer Nature | |
1685 | CyberParks – The Interface Between People, Places and Technology: New Approaches and Perspectives | Carlos Smaniotto Costa; Ina Šuklje Erjavec; Therese Kenna; Michiel de Lange; Konstantinos Ioannidis; Gabriela Maksymiuk; Martijn de Waal | 2019 | Springer | |
1686 | Cyber-Physical Systems: Advances in Design & Modelling | Alla G. Kravets; Alexander A. Bolshakov; Maxim V. Shcherbakov | 2019 | Springer Nature | |
1687 | Cybercrime Prevention: Theory and Applications | Russell Brewer; Melissa de Vel-Palumbo; Alice Hutchings; Thomas Holt; Andrew Goldsmith; David Maimon | 2019 | Springer Nature | |
1688 | How Cyber Security Can Protect Your Business : A Guide for All Stakeholders | Christopher Wright; Archie (Male Synthesized Voice) | 2019 | IT Governance Ltd | |
1689 | The (un)Certain Future of Empathy in Posthumanism, Cyberculture and Science Fiction | Elsa Bouet | 2019 | BRILL | |
1690 | Navigating Cybercultures | Nicholas van Orden | 2019 | BRILL | |
1691 | The Crime of Aggression: The Quest for Justice in an Age of Drones, Cyberattacks, Insurgents, and Autocrats | Noah Weisbord | 2019 | Princeton University Press | |
1692 | Gray Day: My Undercover Mission to Expose America's First Cyber Spy | Eric O'Neill | 2019 | Crown Publishing Group (NY) | |
1693 | Preventing and Combating Cybercrime in East Africa: Lessons from Europe's Cybercrime Frameworks | Mwiburi, Abel Juma | 2019 | Duncker & Humblot | |
1694 | Confessions of an Illuminati 06.66 The Age of Cyber Satan, Artificial Intelligence, and Robotics | Zagami Leo-Lyon | 2019 | Cursum Perficio | |
1695 | Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond | Matt Reyes | 2019 | Independently Published | |
1696 | Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and Beyond | Matt Reyes | 2019 | Independently Published | |
1697 | Cyber smart: five habits to protect your family, money, and identity from cyber criminals | McDonough, Bart R | 2018 | John Wiley & Sons | |
1698 | Listening in: cybersecurity in an insecure age | Landau, Susan Eva | 2018 | Yale University Press | |
1699 | Information Fusion for Cyber-Security Analytics | Aleroud, Ahmed;Alsmadi, Izzat M.;Karabatis, George | 2018 | Springer International Publishing | |
1700 | Industrial Internet of Things Cybermanufacturing Systems | Brecher, Christian;Jeschke, Sabina;Rawat, Danda B.;Song, Houbing | 2018 | Springer International Publishing | |
1701 | Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach | Lin, Chung-Wei;Sangiovanni-Vincentelli, Alberto | 2018 | Springer International Publishing | |
1702 | Cybercrime and digital forensics: an introduction | Bossler, Adam M.; Holt, Thomas J.; Seigfried-Spellar, Kathryn C | 2018 | Routledge | |
1703 | Embedded System Design : Embedded Systems, Foundations of Cyber-Physical Systems, and the Internet of Things | Marwedel, Peter | 2018 | Springer International Publishing : Imprint: Springer | |
1704 | Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17–21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA | Denise Nicholson (editor) | 2018 | Springer | |
1705 | Towards analytical techniques for optimizing knowledge acquisition, processing, propagation, and use in cyberinfrastructure and big data | Kreinovich, Vladik; Lerma, Leonardo Octavio | 2018 | Springer | |
1706 | Trends in cyber-physical multi-agent systems : the PAAMS collection -- 15th International Conference, PAAMS 2017 | Antunes, Luis; Campbell, Andrew; De la Prieta, Fernando; Julian, Vicente; Moreno, María N.; Neves, Antonio J. R.; Pinto, Tiago; Vale, Zita | 2018 | Springer | |
1707 | Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics - 2017 | Gheorghe, Gheorghe I | 2018 | Springer International Publishing : Imprint: Springer | |
1708 | Recent Developments and Achievements in Biocybernetics and Biomedical Engineering : Proceedings of the 20th Polish Conference on Biocybernetics and Biomedical Engineering, Krako´w, Poland, September 20-22, 2017 | Augustyniak, Piotr; Maniewski, Roman; Tadeusiewicz, Ryszard | 2018 | Springer International Publishing : Imprint: Springer | |
1709 | International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence | Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam (eds.) | 2018 | Edizioni della Normale | |
1710 | Cloud-Based Cyber-Physical Systems in Manufacturing | Lihui Wang, Xi Vincent Wang | 2018 | Springer International Publishing | |
1711 | Surveillance in Action: Technologies for Civilian, Military and Cyber Surveillance | Panagiotis Karampelas, Thirimachos Bourlai (eds.) | 2018 | Springer International Publishing | |
1712 | Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level | Florian Skopik | 2018 | Auerbach Publications;CRC Press | |
1713 | Security and privacy in cyber-physical systems : foundations, principles, and applications | Fink, Glenn A.; Jeschke, Sabina; Song, Houbing | 2018 | | |
1714 | Cybernetics Approaches in Intelligent Systems : Computational Methods in Systems and Software 2017, vol. 1 | Prokopova, Zdenka; Silhavy, Petr; Silhavy, Radek | 2018 | Springer | |
1715 | Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations | Morey J. Haber,Brad Hibbert (auth.) | 2018 | Apress | |
1716 | Cyber-Archaeology and Grand Narratives: Digital Technology and Deep-Time Perspectives on Culture Change in the Middle East | Thomas E. Levy,Ian W. N. Jones (eds.) | 2018 | Springer International Publishing | |
1717 | Computer Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers | Sokratis K. Katsikas,Frédéric Cuppens,Nora Cuppens,Costas Lambrinoudakis,Christos Kalloniatis,John Mylopoulos,Annie Antón,Stefanos Gritzalis (eds.) | 2018 | Springer International Publishing | |
1718 | Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings | Petr Matoušek,Martin Schmiedecker (eds.) | 2018 | Springer International Publishing | |
1719 | Compensated Dating: Buying and Selling Sex in Cyberspace | Cassini Sai Kwan Chu (auth.) | 2018 | Palgrave Macmillan | |
1720 | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Yang Xu,Feng Gao,Weihua Chen,Zheming Liu,Pengfei Gu (eds.) | 2018 | Springer Singapore | |
1721 | Intercultural Communicative Competence for Global Citizenship: Identifying cyberpragmatic rules of engagement in telecollaboration | Marina Orsini-Jones,Fiona Lee (auth.) | 2018 | Palgrave Macmillan UK | |
1722 | Artificial Intelligence Tools for Cyber Attribution | Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef | 2018 | Springer | |
1723 | Bishop Fox Cybersecurity Style Guide | Bishop Fox | 2018 | Bishop Fox | |
1724 | Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems | Moamar Sayed-Mouchaweh | 2018 | Springer | |
1725 | Contesting Cyberspace in China: Online Expression and Authoritarian Resilience | Rongbin Han | 2018 | Columbia University Press | |
1726 | Cyber Physical Computing for IoT-driven Services | Vladimir Hahanov (auth.) | 2018 | Springer International Publishing | |
1727 | Artificial Intelligence Tools for Cyber Attribution | Eric Nunes,Paulo Shakarian,Gerardo I. Simari,Andrew Ruef (auth.) | 2018 | Springer International Publishing | |
1728 | Cyber Security for Cyber Physical Systems | Saqib Ali,Taiseera Al Balushi,Zia Nadir,Omar Khadeer Hussain (auth.) | 2018 | Springer International Publishing | |
1729 | The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart Cities | Termanini, Rocky | 2018 | Chapman and Hall/CRC | |
1730 | Cyber Sexy: Rethinking Pornography | Richa Kaul Padte | 2018 | Penguin Viking | |
1731 | Smart Water Grids A Cyber-physical Systems Approach | Montestruque et al. | 2018 | CRC Press | |
1732 | Cybersecurity Program Development for Business: The Essential Planning Guide | Moschovitis, Christos J. P | 2018 | John Wiley & Sons | |
1733 | The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age | David E. Sanger | 2018 | Crown | |
1734 | Cybersecurity Policy Framework : A practical guide to the development of national cybersecurity policy | Kaja Ciglic | 2018 | Microsoft | |
1735 | Enterprise Cybersecurity Study Guide | Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam | 2018 | Apress | |
1736 | Logical Foundations of Cyber-Physical Systems | André Platzer | 2018 | Springer International Publishing | |
1737 | Cybersecurity in China | Greg Austin | 2018 | Springer International Publishing | |
1738 | International Perspectives on Cyberbullying | Anna Costanza Baldry, Catherine Blaya, David P. Farrington | 2018 | Springer International Publishing;Palgrave Macmillan | |
1739 | Cyber Threat Intelligence | Ali Dehghantanha, Mauro Conti, Tooska Dargahi | 2018 | Springer International Publishing | |
1740 | Cyber Weaponry | Henry Prunckun | 2018 | Springer International Publishing | |
1741 | Cyber Security: Power and Technology | Martti Lehto, Pekka Neittaanmäki | 2018 | Springer International Publishing | |
1742 | Cyber-Physical Laboratories in Engineering and Science Education | Michael E. Auer, Abul K.M. Azad, Arthur Edwards, Ton de Jong | 2018 | Springer International Publishing | |
1743 | Cybersecurity in Germany | Martin Schallbruch, Isabel Skierka | 2018 | Springer International Publishing | |
1744 | Multisensor Fusion and Integration in the Wake of Big Data, Deep Learning and Cyber Physical System | Sukhan Lee, Hanseok Ko, Songhwai Oh | 2018 | Springer International Publishing | |
1745 | Cyber Security Cryptography and Machine Learning | Itai Dinur, Shlomi Dolev, Sachin Lodha | 2018 | Springer International Publishing | |
1746 | Cybersecurity Best Practices | Michael Bartsch, Stefanie Frey | 2018 | Springer Fachmedien Wiesbaden;Springer Vieweg | |
1747 | Cyber Security | M. U. Bokhari, Namrata Agrawal, Dharmendra Saini | 2018 | Springer Singapore | |
1748 | Cyberspace Sovereignty | Binxing Fang | 2018 | Springer Singapore | |
1749 | Cyberpsychology as Everyday Digital Experience across the Lifespan | Dave Harley, Julie Morgan, Hannah Frith | 2018 | Palgrave Macmillan UK | |
1750 | Cybersecurity Essentials | Charles J. Brooks; Philip R. Craig; Donald Short | 2018 | Sybex | |
1751 | AI in Cybersecurity | Leslie F. Sikos (Editor) | 2018 | Springer | |
1752 | Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents | Eric C. Thompson | 2018 | Apress | |
1753 | Hands-On Cybersecurity for Architects | Neil Rerup, Milad Aslaner | 2018 | Packt Publishing | |
1754 | Business Continuity in a Cyber World: Surviving Cyberattacks | David Sutton | 2018 | Business Expert Press | |
1755 | Linux Essentials for Cybersecurity | William Rothwell; Denise Kinsey | 2018 | Pearson Education | |
1756 | The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests | Dennis F. Poindexter | 2018 | McFarland & Company | |
1757 | Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations | Morey J. Haber, Brad Hibbert | 2018 | Apress | |
1758 | Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents | Eric C. Thompson | 2018 | Apress | |
1759 | Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat | John P. Carlin; Garrett M. Graff | 2018 | PublicAffairs | |
1760 | Cyberwar. How Russian hackers and trolls helped elect a president - what we don’t, can’t, and do know. | Jamieson, Kathleen Hall | 2018 | Oxford University Press | |
1761 | Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain | Rajneesh Gupta | 2018 | Packt Publishing | |
1762 | A CISO’s Guide to Bolstering Cybersecurity Posture | Sean Atkinson | 2018 | Center for Internet Security | |
1763 | Hands-On Cybersecurity with Blockchain | Rajneesh Gupta [Rajneesh Gupta] | 2018 | Packt Publishing | |
1764 | Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics | Yuri Diogenes; Erdal Ozkaya | 2018 | Packt Publishing | |
1765 | Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents | Wilson Bautista | 2018 | Packt Publishing | |
1766 | Cybernetic modeling for bioreaction engineering | Ramkrishna, Doraiswami; Song, Hyun-Seob | 2018 | Cambridge University Press | |
1767 | Hashtag Islam: How Cyber-Islamic Environments Are Transforming Religious Authority | Gary R Bunt | 2018 | University of North Carolina Press | |
1768 | Solving Cyber Risk Protecting Your Company and Society | Andrew Coburn, Eireann Leverett, Gordon Woo | 2018 | Wiley | |
1769 | Cyberspace Safety and Security: 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedings | Arcangelo Castiglione, Florin Pop, Massimo Ficco, Francesco Palmieri | 2018 | Springer International Publishing | |
1770 | Science of Cyber Security: First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers | Feng Liu, Shouhuai Xu, Moti Yung | 2018 | Springer International Publishing | |
1771 | Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers | Mohadeseh Ganji, Lida Rashidi, Benjamin C. M. Fung, Can Wang | 2018 | Springer International Publishing | |
1772 | From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday | Pierangela Samarati, Indrajit Ray, Indrakshi Ray | 2018 | Springer International Publishing | |
1773 | Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense | Elias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos | 2018 | Springer International Publishing | |
1774 | Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference: Science as the first countermeasure for CBRNE and Cyber threats | Andrea Malizia, Marco D'Arienzo | 2018 | Springer International Publishing | |
1775 | Cyber Criminology | Hamid Jahankhani | 2018 | Springer International Publishing | |
1776 | Handbook of Smart Cities: Software Services and Cyber Infrastructure | Muthucumaru Maheswaran, Elarbi Badidi | 2018 | Springer International Publishing | |
1777 | Versatile Cybersecurity | Mauro Conti, Gaurav Somani, Radha Poovendran | 2018 | Springer International Publishing | |
1778 | Cyber-Physical Systems Security | Çetin Kaya Koç | 2018 | Springer International Publishing | |
1779 | Information Security Education – Towards a Cybersecure Society: 11th IFIP WG 11.8 World Conference, WISE 11, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–20, 2018, Proceedings | Lynette Drevin, Marianthi Theocharidou | 2018 | Springer International Publishing | |
1780 | Frontiers of Cyberlearning: Emerging Technologies for Teaching and Learning | J. Michael Spector, Vivekanandan Kumar, Alfred Essa, Yueh-Min Huang, Rob Koper, Richard A. W. Tortorella, Ting-Wen Chang, Yanyan Li, Zhizhen Zhang | 2018 | Springer Singapore | |
1781 | Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings | Geetha Ganapathi, Arumugam Subramaniam, Manuel Graña, Suresh Balusamy, Rajamanickam Natarajan, Periakaruppan Ramanathan | 2018 | Springer Singapore | |
1782 | Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings | Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang | 2018 | Springer Singapore | |
1783 | Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using Blockchain | Rajneesh Gupta | 2018 | Packt | |
1784 | PG Certificate Programme in Cyber Laws (PGCCL) | IGNOU | 2018 | Indira Gandhi National Open University (IGNOU) | |
1785 | White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime | Osterman Research | 2018 | Osterman Research, Inc. | |
1786 | Cybersecurity Best Practices Guide For IIROC Dealer Members | IIROC / OCRCVM | 2018 | IIROC / OCRCVM | |
1787 | Notes from Cyberground: Trumpland and My Old Soviet Feeling | Mikhail Iossel | 2018 | New Europe Books | |
1788 | Managing Cybersecurity Risk: Cases Studies and Solutions | Jonathan Reuvid (ed.) | 2018 | Legend Times Group | |
1789 | Cyber Mercenaries: The State, Hackers, and Power | Tim Maurer | 2018 | Cambridge University Press | |
1790 | Understanding Cyber Risk: Protecting Your Corporate Assets | Thomas R. Koehler | 2018 | Routledge | |
1791 | Handbook Of Research On Information And Cyber Security In The Fourth Industrial Revolution | Ziska Fields | 2018 | IGI Global/IRMA | |
1792 | How to Build a Cyber-Resilient Organization | Kohnke, Anne; Shoemaker, Dan; Sigler, Ken | 2018 | Auerbach Publications;CRC | |
1793 | Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem | Soma Halder, Sinan Ozdemir | 2018 | Packt Publishing | |
1794 | Cashing In On Cyberpower: How Interdependent Actors Seek Economic Outcomes In A Digital World | Mark T. Peters II | 2018 | Potomac Books/University Of Nebraska Press | |
1795 | Cyber Ethics 4.0: Serving Humanity With Values | Christoph Stückelberger, Pavan Duggal | 2018 | Globethics.net | |
1796 | Framework for Improving Critical Infrastructure Cybersecurity | National Institute of Standards and Technology | 2018 | National Institute of Standards and Technology - NIST | |
1797 | Hands-on Machine Learning for Cyber Security | Soma Halder | 2018 | Packt Publishing | |
1798 | Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics | Nik Alleyne | 2018 | | |
1799 | Art, Cybernetics, and Pedagogy in Post-War Britain: Roy Ascott's Groundcourse | Kate Sloan | 2018 | Routledge | |
1800 | Cyberformalism : histories of linguistic forms in the digital archive | Daniel Shore | 2018 | Johns Hopkins University Press | |
1801 | Cybersecurity Essentials | Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short | 2018 | Sybex | |
1802 | Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time | O Sami Saydjari | 2018 | McGraw-Hill Education | |
1803 | Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents | Wilson Bautista Jr. | 2018 | Packt Publishing | |
1804 | Smart Cities Cybersecurity and Privacy | Danda B. Rawat (editor), Kayhan Zrar Ghafoor (editor) | 2018 | Elsevier | |
1805 | AI in Cybersecurity | Leslie F. Sikos (editor) | 2018 | Springer | |
1806 | Cyberwar | Kathleen Hall Jamieson | 2018 | Oxford University Press | |
1807 | Hands-on cybersecurity with blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchain | Rajneesh Gupta | 2018 | | |
1808 | Developing Cybersecurity Programs and Policies (Pearson IT Cybersecurity Curriculum (ITCC)) | Omar Santos | 2018 | Pearson IT Certification | |
1809 | Cyber security innovation for the digital economy : a case study of the Russian Federation | Sergei Petrenko | 2018 | | |
1810 | Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology | Andrea Fiaschetti (editor), Josef Noll (editor), Paolo Azzoni (editor), Roberto Uribeetxeberria (editor) | 2018 | CRC Press | |
1811 | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | Chertoff, Michael | 2018 | Grove Atlantic;Grove Press | |
1812 | Cyber-Physical Systems for Next-Generation Networks (Advances in Computer and Electrical Engineering (ACEE)) | Amjad Gawanmeh (editor) | 2018 | IGI Global | |
1813 | Enterprise cybersecurity study guide: how to build a successful cyberdefense program against advanced threats | Aslam, Abdul;Donaldson, Scott E.;Siegel, Stanley G.;Williams, Chris K | 2018 | Apress | |
1814 | Hands-on cybersecurity for architects plan and design robust security architectures | Aslaner, Milad;Rerup, Neil | 2018 | Packt Publishing | |
1815 | Hands-on cybersecurity for architects plan and design robust security architectures | Aslaner, Milad;Rerup, Neil | 2018 | Packt Publishing | |
1816 | Contesting Cyberspace in China: Online Expression and Authoritarian Resilience | Rongbin Han | 2018 | Columbia University Press | |
1817 | Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain | Gupta, Rajneesh | 2018 | Packt Publishing | |
1818 | Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain | Gupta, Rajneesh | 2018 | Packt Publishing | |
1819 | Effective Cybersecurity: A Guide to Using Best Practices and Standards | William Stallings | 2018 | Addison-Wesley Professional | |
1820 | Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations | Haber, Morey J.;Hibbert, Brad | 2018 | Apress, Imprint | |
1821 | Contesting cyberspace in China: online expression and authoritarian resilience | Han, Rongbin | 2018 | Columbia University Press | |
1822 | The decision to attack: military and intelligence cyber decision-making | Brantly, Aaron Franklin | 2018 | | |
1823 | Digital World War: Islamists, Extremists, and the Fight for Cyber Supremacy | Haroon K. Ullah | 2018 | Yale University Press | |
1824 | Practical cyber intelligence how action-based intelligence can be an effective response to incidents | Wilson Bautista Jr | 2018 | Packt Publishing | |
1825 | Practical cyber intelligence how action-based intelligence can be an effective response to incidents | Wilson Bautista Jr | 2018 | Packt Publishing | |
1826 | Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxtics | Yuri Diogenes,Erdal Ozkaya | 2018 | Packt Publishing | |
1827 | Deconstruction machines: writing in the age of cyberwar | Joque, Justin;Malabou, Catherine | 2018 | University of Minnesota Press | |
1828 | Hacking with Kali Linux: a step by step guide for you to learn the basics of cybersecurity & hacking | Nastase, Ramon | 2018 | CreateSpace Independent Publishing Platform | |
1829 | Business continuity in a cyber world: surviving cyberattackes | Power, Daniel J.;Sutton, David | 2018 | Business Expert Press | |
1830 | The Perfect Weapon War, Sabotage, and Fear in the Cyber Age | Sanger, David E | 2018 | Crown;Archetype;Crown Pub | |
1831 | Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems | Sayed-Mouchaweh, Moamar | 2018 | Springer | |
1832 | Diagnosability, security and safety of hybrid dynamic and cyber-physical systems | Sayed-Mouchaweh, Moamar | 2018 | Springer | |
1833 | Queer art camp superstar: decoding the cinematic cyberworld of Ryan Trecartin | Trecartin, Ryan;Zulueta, Ricardo Estanislao | 2018 | | |
1834 | Hashtag Islam: How Cyber-Islamic Environments Are Transforming Religious Authority | Gary R Bunt | 2018 | University of North Carolina Press | |
1835 | Transportation Cyber-Physical Systems | Lipika Deka, Mashrur Chowdhury | 2018 | Elsevier | |
1836 | The Perfect Weapon: War, Sabotage and Fear in the Cyber Age | David Sanger | 2018 | | |
1837 | Hands-on cybersecurity with blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchain | Gupta, Rajneesh | 2018 | Packt Publishing Limited | |
1838 | Practical cyber intelligence how action-based intelligence can be an effective response to incidents | jr_, Wilson Bautista | 2018 | Packt Publishing | |
1839 | Fractional Order Crowd Dynamics: Cyber-Human System Modeling and Control | Kecai Cao, YangQuan Chen | 2018 | De Gruyter | |
1840 | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | Chertoff, Michael | 2018 | Atlantic Monthly Press;Grove Atlantic; Grove/Atlantic, Incorporated | |
1841 | Automatic Cyberbullying Detection: Emerging Research and Opportunities | Michal E. Ptaszynski, Fumito Masui | 2018 | Information Science Reference | |
1842 | Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxtics | Diogenes, Yuri;Ozkaya, Erdal | 2018 | Packt Publishing | |
1843 | Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxtics | Diogenes, Yuri;Ozkaya, Erdal | 2018 | Packt Publishing | |
1844 | Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxtics | Diogenes, Yuri;Ozkaya, Erdal | 2018 | Packt Publishing | |
1845 | Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxtics | Diogenes, Yuri;Ozkaya, Erdal | 2018 | Packt Publishing | |
1846 | Cybersecurity - attack and defense strategies: infrastructure security with Red team ens Blue team taxtics | Diogenes, Yuri;Ozkaya, Erdal | 2018 | Packt Publishing | |
1847 | Comptia Cysa+ Cybersecurity Analyst Certification Practice Exams (Exam Cs0-001) | Rogers, Bobby E | 2018 | McGraw-Hill Education | |
1848 | Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics | Diogenes, Yuri;Ozkaya, Erdal | 2018 | | |
1849 | Linux Essentials for Cybersecurity | Rothwell, William J | 2018 | Pearson It Certification | |
1850 | Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals | Bart R. McDonough | 2018 | Wiley | |
1851 | Confronting Cyberespionage Under International Law | Oguz Kaan Pehlivan | 2018 | Routledge | |
1852 | New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) | Howard Shrobe, David L. Shrier, Alex Pentland | 2018 | MIT Press | |
1853 | You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy) | Josephine Wolff, Sandra Braman, Paul T. Jaeger | 2018 | MIT Press | |
1854 | New Solutions for Cybersecurity (MIT Connection Science & Engineering) (MIT Connection Science & Engineering) | Howard Shrobe, David L. Shrier, Alex Pentland | 2018 | MIT Press | |
1855 | Cyberbullying at University in International Contexts | Wanda Cassidy, Chantal Faucher, Margaret Jackson | 2018 | Routledge | |
1856 | The Chinese Information War; Espionage, Cyberwar, Communications Control and Related Threats | Dennis Poindexter | 2018 | | |
1857 | Model Checking (Cyber Physical Systems Series) | Edmund M. Clarke Jr., Orna Grumberg, Daniel Kroening, Doron Peled, Helmut Veith | 2018 | The MIT Press | |
1858 | Effective Cybersecurity: A Guide to Using Best Practices and Standards | William Stallings | 2018 | Addison-Wesley Professional | |
1859 | TIME Cybersecurity: Hacking, the Dark Web and You | The Editors of TIME | 2018 | Time Inc. Books | |
1860 | The Cyber Plumber's Handbook : The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss | Brennon Thomas | 2018 | | |
1861 | Linux Essentials for Cybersecurity | William Rothwell; Denise Kinsey | 2018 | Pearson It Certification | |
1862 | Cybersecurity in Finance: Getting the Policy Mix Right | Sylvain Bouyon; Simon Krause | 2018 | Rowman & Littlefield | |
1863 | Hacking The Bomb: Cyber Threats and Nuclear Weapons | Andrew Futter | 2018 | Georgetown University Press | |
1864 | Combating Cyber Threat | P. K. Singh | 2018 | Vij Books India | |
1865 | Confronting an Axis of Cyber?: China, Iran, North Korea, Russia in Cyberspace | Fabio Rugge | 2018 | Ledizioni | |
1866 | Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics | Samuli Haataja | 2018 | Routledge | |
1867 | Hacking the Bomb: Cyber Threats and Nuclear Weapons | Andrew Futter | 2018 | Georgetown University Press | |
1868 | Reducing Cyberbullying in Schools: International Evidence-Based Best Practices | Marilyn Campbell; Sheri Bauman | 2018 | Academic Press | |
1869 | International perspectives on cyberbullying: prevalence, risk factors and interventions | Anna Costanza Baldry; Catherine Blaya; David P. Farrington. | 2018 | Palgrave Macmillan | |
1870 | Reducing cyberbullying in schools: international evidence-based best practices | Marilyn Campbell & Sheri Bauman | 2018 | Cambridge, MA : Academic Press | |
1871 | Cyberspace Sovereignty: Reflections on building a community of common future in cyberspace | Binxing Fang | 2018 | Springer | |
1872 | Cyberbullying: A Deadly Trend | The New York Times Editorial Staff | 2018 | The Rosen Publishing Group, Inc | |
1873 | Cyber heaven harem 2200 part 1 out of the noob zone | Logan Link | 2018 | Blazing little Books | |
1874 | Cybernetics in C++ | Avi Bhattacharyya | 2018 | River Publishers | |
1875 | Male Alienation at the Crossroads of Identity, Culture and Cyberspace | Robert Tyminski | 2018 | Routledge | |
1876 | Male Alienation at the Crossroads of Identity, Culture and Cyberspace | Tyminski, Robert; | 2018 | Taylor & Francis Group | |
1877 | Cyberbullying | Juan Moises De La Serna | 2018 | Babelcube Inc. | |
1878 | Matter Transmission: Mediation in a Paleocyber Age | Nicolás Salazar Sutil | 2018 | Bloomsbury Academic | |
1879 | Surveillance in Action. Technologies for Civilian, Military and Cyber Surveillance | Panagiotis Karampelas, Thirimachos Bourlai | 2018 | Springer | |
1880 | Digimon Story Cyber Sleuth Hackers Memory, Mods, APK, PC, Xbox, Controls, Download, Tips, VSYNC, Cheats, Game Guide Unofficial | The Yuw | 2018 | HSE Games | |
1881 | GDPR and Cyber Security for Business Information Systems | Antoni Gobeo, Connor Fowler, William J. Buchanan | 2018 | River Publishers | |
1882 | Matter Transmission: Mediation in a Paleocyber Age | Nicolás Salazar Sutil | 2018 | Bloomsbury Publishing | |
1883 | Matter Transmission: Mediation in a Paleocyber Age | Nicolás Salazar Sutil | 2018 | Bloomsbury Academic | |
1884 | Cyber Security: Law and Guidance | Helen Wong (editor) | 2018 | Bloomsbury Professional | |
1885 | Fractional Order Crowd Dynamics: Cyber-Human System Modeling and Control | Kecai Cao; YangQuan Chen | 2018 | De Gruyter | |
1886 | Fractional Order Crowd Dynamics: Cyber-Human System Modeling and Control | Kecai Cao; YangQuan Chen | 2018 | De Gruyter | |
1887 | CYBERSECURITY Essentials | Charles J . Brooks, Christopher Grow, Philip Craig, Donald Short | 2018 | | |
1888 | Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem | Soma Halder; Sinan Ozdemir | 2018 | Packt Publishing Ltd | |
1889 | Cyber-Physical Laboratories in Engineering and Science Education | Michael E. Auer; Abul K.M. Azad; Arthur Edwards; Ton de Jong | 2018 | Springer | |
1890 | Cybersecurity for Commercial Vehicles | Gloria D'Anna | 2018 | SAE International | |
1891 | Rethinking Cybersecurity : Strategy, Mass Effect, and States | James Andrew Lewis | 2018 | Center for Strategic & International Studies | |
1892 | Queer Art Camp Superstar: Decoding the Cinematic Cyberworld of Ryan Trecartin | Ricardo E. Zulueta | 2018 | State University of New York Press | |
1893 | Contesting Cyberspace in China: Online Expression and Authoritarian Resilience | Rongbin Han | 2018 | Columbia University Press | |
1894 | Postmodern Sublime: Technology and American Writing from Mailer to Cyberpunk | Joseph Tabbi | 2018 | Cornell University Press | |
1895 | Industry of Anonymity: Inside the Business of Cybercrime | Jonathan Lusthaus | 2018 | Harvard University Press | |
1896 | A Life in Cybernetics: Ex-Prodigy: My Childhood and Youth and I Am a Mathematician: The Later Life of a Prodigy | Norbert Wiener | 2018 | The MIT Press | |
1897 | Cyber Harassment and Policy Reform in the Digital Age: Emerging Research and Opportunities | Ramona S. McNeal, Susan M. Kunkle, Mary Schmeida | 2018 | IGI Global | |
1898 | Cyberlaw : Problems of Policy and Jurisprudence in the Information Age | Patricia Bellia, Paul Schiff Berman, Brett Frischmann, David Post | 2018 | West Academic Publishing | |
1899 | Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks) | Darren Quick, Kim-Kwang Raymond Choo | 2018 | Springer | |
1900 | The GCHQ Puzzle Book II: From WWI ciphers to modern cyber security, pit your wits against 100 years of codebreaking genius | GCHQ | 2018 | Penguin Books Ltd | |
1901 | The plot to hack America: how Putin's cyberspies and WikiLeaks tried to steal the 2016 election | Assange, Julian;Clinton, Hillary Rodham;Nance, Malcolm W.;Putin, Vladimir Vladimirovic;Putin, Vladimir Vladimirovich;Trump, Donald | 2017 | Skyhorse Publishing | |
1902 | Dark Territory: The Secret History of Cyber War | Kaplan, Fred M | 2017 | Simon & Schuster Paperbacks | |
1903 | Digital Cop: A Digital Cop's Guide to Cyber Security | Baghla, Sahil;Soni, Arun | 2017 | Notion Press | |
1904 | Digital rebellion: the birth of the cyber left | Wolfson, Todd | 2017 | University of Illinois Press | |
1905 | The Basics of Cyber Safety. Computer and Mobile Device Safety Made Easy | John Sammons, Michael Cross | 2017 | Syngress | |
1906 | Handbook of System Safety and Security. Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems | Edward Griffor | 2017 | Syngress | |
1907 | Cyber-Physical Systems. Foundations, Principles and Applications | Houbing Song, Danda B Rawat, Sabina Jeschke, Christian Brecher | 2017 | Academic Press | |
1908 | Multilayer Control of Networked Cyber-Physical Systems: Application to Monitoring, Autonomous and Robot Systems | Sabato Manfredi (auth.) | 2017 | Springer International Publishing | |
1909 | Industrial Internet of Things: Cybermanufacturing Systems | Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat (eds.) | 2017 | Springer International Publishing | |
1910 | Cyberemotions: Collective Emotions in Cyberspace | Janusz A. Holyst (eds.) | 2017 | Springer International Publishing | |
1911 | Information Fusion for Cyber-Security Analytics | Izzat M Alsmadi, George Karabatis, Ahmed Aleroud (eds.) | 2017 | Springer International Publishing | |
1912 | Vehicular Cyber Physical Systems: Adaptive Connectivity and Security | Danda B. Rawat, Chandra Bajracharya (auth.) | 2017 | Springer International Publishing | |
1913 | Cyber-Physical Systems | Raj Rajkumar, Dionisio de Niz, Mark Klein | 2017 | Addison-Wesley Professional | |
1914 | Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach | Chung-Wei Lin, Alberto Sangiovanni Vincentelli | 2017 | Springer | |
1915 | Personal Cybersecurity. How to avoid and recover from Cybercrime | Marvin Waschke | 2017 | Apress | |
1916 | Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative | Mariarosaria Taddeo, Ludovica Glorioso (eds.) | 2017 | Springer International Publishing | |
1917 | Model-Implementation Fidelity in Cyber Physical System Design | Anca Molnos, Christian Fabre (eds.) | 2017 | Springer International Publishing | |
1918 | Cyber Physical Systems. Design, Modeling, and Evaluation: 6th International Workshop, CyPhy 2016, Pittsburgh, PA, USA, October 6, 2016, Revised Selected Papers | Christian Berger, Mohammad Reza Mousavi, Rafael Wisniewski (eds.) | 2017 | Springer International Publishing | |
1919 | Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016 | Jürgen Beyerer, Oliver Niggemann, Christian Kühnert (eds.) | 2017 | Springer Vieweg | |
1920 | Trustworthy cyber-physical systems engineering | Ishikawa, Fuyuki; Romanovsky, Alexander | 2017 | Chapman and Hall/CRC | |
1921 | Cybersecurity Law | Jeff Kosseff | 2017 | Wiley | |
1922 | Cognitive Hack. The New Battleground in Cybersecurity ... the Human Mind | James Bone | 2017 | CRC Press | |
1923 | CCNA Cyber Ops SECFND #210-250 Official Cert Guide | Omar Santos, Joseph Muniz, Stefano De Crescenzo | 2017 | Cisco Press | |
1924 | CompTIA Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001 | Michael J. Chapple, David Seidl | 2017 | Sybex | |
1925 | CCNA Cyber Ops SECFND #210-250 Official Cert Guide | Omar Santos, Joseph Muniz, Stefano De Crescenzo | 2017 | Cisco Press | |
1926 | Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations | Michael N. Schmitt | 2017 | Cambridge University Press | |
1927 | Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level | Robert M. Clark, Simon Hakim (eds.) | 2017 | Springer International Publishing | |
1928 | Personal Cybersecurity: How to Avoid and Recover from Cybercrime | Marvin Waschke (auth.) | 2017 | Apress | |
1929 | Cybercrime, Organized Crime, and Societal Responses: International Approaches | Emilio C. Viano (eds.) | 2017 | Springer International Publishing | |
1930 | Public International Law of Cyberspace | Kriangsak Kittichaisaree (auth.) | 2017 | Springer International Publishing | |
1931 | Cognitive hack : the new battleground in cybersecurity... the human mind | Bone, James | 2017 | Auerbach Publications, CRC Press | |
1932 | Cybersecurity: Geopolitics, Law, and Policy | Amos N. Guiora | 2017 | CRC Press | |
1933 | CCNA Cyber Ops SECOPS 210-255 Official Cert Guide | Omar Santos, Joseph Muniz | 2017 | Cisco Press | |
1934 | The Cyber Risk Handbook. Creating and Measuring Effective Cybersecurity Capabilities | Domenic Antonucci | 2017 | Springer | |
1935 | Cyber Security. Simply. Make it Happen | Ferri Abolhassan (ed.) | 2017 | Springer | |
1936 | Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing | Lane Thames, Dirk Schaefer (eds.) | 2017 | Springer International Publishing | |
1937 | Cybernetics, Warfare and Discourse : The Cybernetisation of Warfare in Britain | Anthimos Alexandros Tsirigotis (auth.) | 2017 | Palgrave Macmillan | |
1938 | Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach | Chung-Wei Lin, Alberto Sangiovanni-Vincentelli (auth.) | 2017 | Springer International Publishing | |
1939 | Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology | Nicholas J. Daras, Themistocles M. Rassias (eds.) | 2017 | Springer International Publishing | |
1940 | Privacy, Data Protection and Cybersecurity in Europe | Wolf J. Schünemann, Max-Otto Baumann (eds.) | 2017 | Springer International Publishing | |
1941 | Cyberspace: Risks and Benefits for Society, Security and Development | J. Martín Ramírez, Luis A. García-Segura (eds.) | 2017 | Springer International Publishing | |
1942 | Multi-Disciplinary Engineering for Cyber-Physical Production Systems: Data Models and Software Solutions for Handling Complex Engineering Projects | Stefan Biffl, Arndt Lüder, Detlef Gerhard (eds.) | 2017 | Springer International Publishing | |
1943 | Cybernetics and Mathematics Applications in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 2 | Radek Silhavy, Roman Senkerik, Zuzana Kominkova Oplatkova, Zdenka Prokopova, Petr Silhavy (eds.) | 2017 | Springer International Publishing | |
1944 | Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection: 15th International Conference, PAAMS 2017, Porto, Portugal, June 21-23, 2017, Proceedings | Yves Demazeau, Paul Davidsson, Javier Bajo, Zita Vale (eds.) | 2017 | Springer International Publishing | |
1945 | Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings | Shlomi Dolev, Sachin Lodha (eds.) | 2017 | Springer International Publishing | |
1946 | Highlights of Practical Applications of Cyber-Physical Multi-Agent Systems: International Workshops of PAAMS 2017, Porto, Portugal, June 21-23, 2017, Proceedings | Javier Bajo, Zita Vale, Kasper Hallenborg, Ana Paula Rocha, Philippe Mathieu, Pawel Pawlewski, Elena Del Val, Paulo Novais, Fernando Lopes, Nestor D. Duque Méndez, Vicente Julián, Johan Holmgren (eds.) | 2017 | Springer International Publishing | |
1947 | Security of Industrial Control Systems and Cyber-Physical Systems: Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers | Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis Katsikas (eds.) | 2017 | Springer International Publishing | |
1948 | Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Yang Xu (eds.) | 2017 | Springer Singapore | |
1949 | Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan Meetings | Shin Nakajima, Jean-Pierre Talpin, Masumi Toyoshima, Huafeng Yu (eds.) | 2017 | Springer Singapore | |
1950 | CompTIA Cybersecurity Analyst (CSA+) Cert Guide | Troy McMillan | 2017 | Pearson IT Certification | |
1951 | Research Methods for Cyber Security | Thomas Edgar and David Manz (Auth.) | 2017 | Syngress | |
1952 | Cyber-Physical and Gentelligent Systems in Manufacturing and Life Cycle. Genetics and Intelligence - Keys to Industry 4.0 | Berend Denkena and Tobias Morke (Eds.) | 2017 | Academic Press | |
1953 | Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center | Marshall Copeland (auth.) | 2017 | Apress | |
1954 | The Nature of the Machine and the Collapse of Cybernetics: A Transhumanist Lesson for Emerging Technologies | Alcibiades Malapi-Nelson (auth.) | 2017 | Springer International Publishing | |
1955 | A history of cybersecurity attacks : 1980 to present | Bruce Middleton | 2017 | Auerbach Publications;CRC Press | |
1956 | Threat Level Red: Cybersecurity Research Programs of the U.S. Government | Michael Erbschloe | 2017 | Auerbach Publications;Taylor & Francis | |
1957 | Inside the Enemy's Computer: Identifying Cyber Attackers | Clement Guitton | 2017 | Oxford University Press USA : Oxford University Press | |
1958 | CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide | Fernando Maymi, Brent Chapman | 2017 | McGraw-Hill Education | |
1959 | Introduction to embedded systems: a cyber-physical systems approach | Edward Ashford Lee, Sanjit Arunkumar Seshia | 2017 | MIT Press | |
1960 | Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology | Nicholas J. Daras, Themistocles M. Rassias (eds.) | 2017 | Springer | |
1961 | New Perspectives on Cybercrime | | 2017 | Noble, Wayne, Owen, Tim, Palgrave Macmillan, Speed, Faye | |
1962 | Cybersecurity in France | Baumard, Philippe | 2017 | Springer International Publishing | |
1963 | Data analytics and decision support for cybersecurity : trends, methodologies and applications | Huang, Yan; Kalutarage, Harsha Kumara; Palomares Carrascosa, Iván | 2017 | Springer International Publishing | |
1964 | Cyber justice : human rights and good governance for the internet | Mihr, Anja | 2017 | Springer | |
1965 | Theory and models for cyber situation awareness | Jajodia, Sushil; Liu, Peng; Wang, Cliff | 2017 | Springer | |
1966 | Cyber-assurance for the internet of things | Brooks, Tyson T | 2017 | | |
1967 | Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level | Florian Skopik | 2017 | Auerbach Publications | |
1968 | Encyclopedia of Cyber Warfare | Paul Springer | 2017 | ABC-CLIO | |
1969 | Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information | Eric C. Thompson (auth.) | 2017 | Apress | |
1970 | Inhabiting Cyberspace and Emerging Cyberplaces: The Case of Siena, Italy | Tobias Boos (auth.) | 2017 | Palgrave Macmillan | |
1971 | Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts | Maurizio Martellini, Andrea Malizia (eds.) | 2017 | Springer International Publishing | |
1972 | Cyber Racism and Community Resilience: Strategies for Combating Online Race Hate | Andrew Jakubowicz et al. | 2017 | Palgrave Macmillan | |
1973 | Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings | Sheng Wen, Wei Wu, Aniello Castiglione (eds.) | 2017 | Springer International Publishing | |
1974 | Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity | Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin (eds.) | 2017 | Springer-Verlag Berlin Heidelberg | |
1975 | Resilience and Risk: Methods and Application in Environment, Cyber and Social Domains | Igor Linkov, José Manuel Palma-Oliveira (eds.) | 2017 | Springer Netherlands | |
1976 | Secure and Trustworthy Transportation Cyber-Physical Systems | Yunchuan Sun,Houbing Song (eds.) | 2017 | Springer Singapore | |
1977 | Social Interactions and Networking in Cyber Society | Ford Lumban Gaol, Fonny Dameaty Hutagalung (eds.) | 2017 | Springer Singapore | |
1978 | Crime, Genes, Neuroscience and Cyberspace | Tim Owen (auth.) | 2017 | Palgrave Macmillan UK | |
1979 | Cyberspace and Cybersecurity | George Kostopoulos | 2017 | Auerbach Publications | |
1980 | Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology | Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria | 2017 | CRC Press | |
1981 | A practical introduction to human-in-the-loop cyber-physical systems | Boavida, Fernando; Nunes, David; Silva, Jorge Sá | 2017 | John Wiley & Sons | |
1982 | Reporting on an entity's cybersecurity risk management program and controls : SOC for cybersecurity | | 2017 | American Institute of Certified Public Accountants | |
1983 | Cybercrime and Its Victims | Elena Martellozzo; Emma A Jane; (eds.) | 2017 | Routledge | |
1984 | The Friendly Orange Glow: The Untold Story of the PLATO System and the Dawn of Cyberculture | Brian Dear | 2017 | Pantheon | |
1985 | Darkweb cyber threat intelligence mining | Robertson, John | 2017 | | |
1986 | Listening In: Cybersecurity in an Insecure Age | Susan Landau | 2017 | Yale University Press | |
1987 | Metadata: The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War | James Scott | 2017 | | |
1988 | Handbook of Research on Applied Cybernetics and Systems Science | Snehanshu Saha et al. | 2017 | IGI Global | |
1989 | Cyber Frauds, Scams and their Victims | Mark Button, Cassandra Cross | 2017 | Routledge | |
1990 | Big Data Analytics in Cybersecurity | Deng, Julia; Savas, Onur | 2017 | Taylor and Francis | |
1991 | Biomedical Odysseys: Fetal Cell Experiments from Cyberspace to China | Priscilla Song | 2017 | Princeton University Press | |
1992 | New Cyber Strategy of China and the Alterations in the Field | Nurkulov Nurshod Olimovich | 2017 | Journal of Political Sciences & Public Affairs | |
1993 | Encyclopedia of Cyber Warfare | Paul J. Springer | 2017 | ABC-Clio | |
1994 | Understanding Cyber Conflict: 14 Analogies | George Perkovich; Ariel E. Levite | 2017 | Georgetown University Press | |
1995 | Personal Cybersecurity: How to Avoid and Recover from Cybercrime | Marvin Waschke | 2017 | Apress | |
1996 | Research agenda. The human factor in cybercrime and cybersecurity. | Eric Rutger Leukfeldt | 2017 | Eleven International Publishing | |
1997 | Industrial Cybersecurity Efficiently secure critical infrastructure systems | Pascal Ackerman | 2017 | | |
1998 | Cyberspace, Cybersecurity, and Cybercrime | Janine Kremling; Amanda M Sharp Parker | 2017 | Sage Publications, Inc | |
1999 | Cybercrime and Digital Forensics: An Introduction | Thomas J. Holt; Adam M Bossler; Kathryn Seigfried-Spellar | 2017 | Routledge | |
2000 | Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents | Gerard Johansen | 2017 | Packt Publishing | |
2001 | Comptia Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001 | Michael J. Chapple; David Seidl | 2017 | Sybex | |
2002 | Cyber security : A practitioner’s guide | David Sutton | 2017 | Swindon, United Kingdom BCS, the Chartered Institute for IT | |
2003 | Cybersecurity Ethics: An Introduction | Mary Manjikian | 2017 | Routledge/Taylor & Francis | |
2004 | Cybersecurity Ethics: An Introduction | Mary Manjikian | 2017 | Routledge/Taylor & Francis | |
2005 | Protecting Children Online? Cyberbullying Policies Of Social Media Companies | Tijana Milosevic, Sonia Livingstone | 2017 | The MIT Press | |
2006 | Cyber dragon : inside China's information warfare and cyber operations | Dean Cheng | 2017 | Praeger, an imprint of ABC-CLIO, LLC | |
2007 | Hacking: The No-Nonsense Guide: Learn Ethical Hacking Within 12 Hours! (Including FREE "Pro Hacking Tips" Infographic) (Cyberpunk Programming Series) | Cyberpunk University | 2017 | Cyberpunk University | |
2008 | The Science Of Cybersecurity | Alan Radley | 2017 | | |
2009 | RASPBERRY PI & HACKING: 2 Books in 1: THE BLUEPRINT: Everything You Need To Know (CyberPunk Blueprint Series) | CyberPunk Architects | 2017 | Cyberpunk Books | |
2010 | Big Data Analytics in Cybersecurity and IT Management | Onur Savas (editor), Julia Deng (editor) | 2017 | Auerbach Publications | |
2011 | Industrial Cybersecurity: Efficiently secure critical infrastructure systems | Pascal Ackerman | 2017 | Packt Publishing Ltd | |
2012 | Industrial Cybersecurity: Efficiently secure critical infrastructure systems (English Edition) | Pascal Ackerman | 2017 | Packt Publishing | |
2013 | Cyber Racism and Community Resilience: Strategies for Combating Online Race Hate | Andrew Jakubowicz; Kevin Dunn; Gail Mason; Yin Paradies; Ana-Maria Bliuc; Nasya Bahfen; Andre Oboler; Rosalie Atie; Karen Connelly | 2017 | Springer | |
2014 | Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents | Gerard Johansen | 2017 | Packt Publishing | |
2015 | Information Fusion for Cyber-Security Analytics | Aleroud, Ahmed;Alsmadi, Izzat M.;Karabatis, George | 2017 | Imprint: Springer, Springer International Publishing | |
2016 | Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Xu, Yang | 2017 | Springer Singapore | |
2017 | Nuclear power plants: innovative technologies for instrumentation and control systems: International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant | Xu, Yang | 2017 | Springer | |
2018 | Industrial cybersecurity: efficiency secure critical infrastructure systems | Ackerman, P | 2017 | Packt Publishing | |
2019 | The darkening web: the war for cyberspace | Klimburg, Alexander | 2017 | Penguin Publishing Group;Penguin Press | |
2020 | CCNA Cyber Ops SECFND 210-250 official cert guide | De Crescenzo, Stefano;Muniz, Joseph;Santos, Omar | 2017 | Pearson Education Limited (US titles);Cisco Press | |
2021 | The Basics of Cyber Safety Computer and Mobile Device Safety Made Easy | Cross, Michael;Sammons, John | 2017 | Elsevier Science and Technology Books, Inc | |
2022 | CCNA Cyber Ops SECFND 210-250 official cert guide | De Crescenzo, Stefano;Muniz, Joseph;Santos, Omar | 2017 | Cisco Press | |
2023 | The cybernetics moment: or why we call our age the information age | Kline, Ronald R | 2017 | Johns Hopkins university press., [Maryland] | |
2024 | Industrial Internet of Things: Cybermanufacturing Systems | Brecher, Christian.;Jeschke, Sabina.;Rawat, Danda B.;Song, Houbing | 2017 | Springer International Publishing : Imprint : Springer | |
2025 | Personal Cybersecurity: How to Avoid and Recover from Cybercrime | Waschke, Marvin | 2017 | Apress | |
2026 | Digital rebellion: the birth of the cyber left | Wolfson, Todd | 2017 | University of Illinois Press | |
2027 | Cyber security engineering: a practical approach for systems and software assurance | Mead, Nancy R.;Woody, Carol C | 2017 | Addison-Wesley | |
2028 | CCNA cyber ops SECOPS #210-255 official cert guide | Muniz, Joseph;Santos, Omar | 2017 | Cisco Press | |
2029 | Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan Meetings | Nakajima, Shin.;Talpin, Jean-Pierre.;Toyoshima, Masumi.;Yu, Huafeng | 2017 | Springer Singapore : Imprint : Springer | |
2030 | Cyber-Physical System Design from an Architecture Analysis Viewpoint: Communications of NII Shonan Meetings | Nakajima, Shin.;Talpin, Jean-Pierre.;Toyoshima, Masumi.;Yu, Huafeng | 2017 | Springer Singapore : Imprint : Springer | |
2031 | Hacking isis: the war to kill the cyber jihad | Nance, Malcolm | 2017 | Skyhorse;W W Norton | |
2032 | Cyberpsychology and the Brain | Parsons, Thomas D | 2017 | Cambridge University Press | |
2033 | Digital defense: a cybersecurity primer | Pelton, Joseph N.;Singh, Indu Bhushan | 2017 | Springer International Publishing;Springer Science+Business Media | |
2034 | Striking power: how cyber, robots, and space weapons change the rules for war | Rabkin, Jeremy A.;Yoo, John | 2017 | Encounter Books | |
2035 | CCNA cyber ops SECOPS #210-255 official cert guide | Santos, Omar;Joseph Muniz;Stefano De Crescenzo | 2017 | Pearson Education Limited (US titles);Cisco Press | |
2036 | Cyber Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between | Selby, Nick;Vescent, Heather | 2017 | Weldon Owen | |
2037 | Encyclopedia of Cyber Warfare | Springer, Paul J | 2017 | ABC-CLIO, LLC | |
2038 | Virtual Terror: 21st Century Cyber Warfare | Wagner, Daniel | 2017 | Daniel Wagner | |
2039 | Industrial Cybersecurity | Ackerman, Pascal | 2017 | Packt Publishing Limited | |
2040 | Cybersecurity for beginners | Meeuwisse, Raef | 2017 | Cyber Simplicity Ltd | |
2041 | CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) | Walker, Matt | 2017 | McGraw-Hill Education | |
2042 | Comptia Cybersecurity Analyst (CSA+) Study Guide: Exam CS0-001 | Chapple, Michael J;Seidl, David | 2017 | Sybex | |
2043 | Plugged in: Cybersecurity in the Modern Age | Jon Silman | 2017 | Gatorbytes | |
2044 | New Horizons for Second-Order Cybernetics | Alexander Riegler, Karl H. Müller, Stuart A. Umpleby | 2017 | World Scientific | |
2045 | Systems, Cybernetics, Control, and Automation: Ontological, Epistemological, Societal, and Ethical Issues (River Publishers Series in Automation, Control, and Robotics) | Spyros G. Tzafestas | 2017 | River Publishers | |
2046 | Cyber security and policy : a substantive dialogue | Anuradha Mathrani (editor); Julian Jang-Jaccard (editor); Andrew M. Colarik (editor) | 2017 | | |
2047 | Understanding Cyber Conflict: Fourteen Analogies | George Perkovich, Ariel E. Levite, E | 2017 | Georgetown University Press | |
2048 | China's Cyber Warfare: The Evolution of Strategic Doctrine | Jason R. Fritz | 2017 | Lexington Books | |
2049 | Cyber Society, Big Data, and Evaluation: Comparative Policy Evaluation | Jonathan D. Breul | 2017 | Transaction Publishers | |
2050 | Industrial Cyber Security for Dummies. | David Meltzer and Jeff Lund | 2017 | John Wiley & Sons, Inc. | |
2051 | Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks | Robert Mandel | 2017 | Georgetown University Press | |
2052 | Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings | Shlomi Dolev; Sachin Lodha | 2017 | Springer | |
2053 | US National Cybersecurity: International Politics, Concepts and Organization | Damien van Puyvelde; Aaron F. Brantly | 2017 | Routledge | |
2054 | International Conflicts in Cyberspace - Battlefield of the 21st Century: Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors | U. S. Department Of Defense; Strategic Studies Institute; United States Army War College; Department Of Homeland Security; Federal Bureau Of Investigation | 2017 | e-artnow | |
2055 | Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan | Worth Books | 2017 | Worth Books | |
2056 | Cyberpunk and Visual Culture | Graham Murphy, Lars Schmeink | 2017 | Routledge | |
2057 | Facing Cyber Threats Head on: Protecting Yourself and Your Business | Brian Minick | 2017 | Rowman & Littlefield Publishers | |
2058 | Everything You Need to Know about Trolls and Cybermobs | Sabrina Adams | 2017 | The Rosen Publishing Group, Inc | |
2059 | Power Down & Parent Up!: Cyber Bullying, Screen Dependence & Raising Tech-Healthy Children! | Holli Kenley | 2017 | Loving Healing Press | |
2060 | Cinema, Trance and Cybernetics | Ute Holl | 2017 | Amsterdam University Press | |
2061 | Cybercognition: Brain, Behaviour and the Digital World | Lee Hadlington | 2017 | SAGE Publications | |
2062 | Cyber Terror | Gadish, Orna | 2017 | OGM | |
2063 | Cyber Terror: How It Happens And What We Can Do | Orna Gadish | 2017 | | |
2064 | Cyber Terror: How It Happens And What We Can Do | Orna Gadish | 2017 | OGM | |
2065 | Cyber Law: A Legal Arsenal for Online Business | Brett J. Trout | 2017 | M. Stefan Strozier | |
2066 | Cybersecurity: Protecting Your Identity and Data | Mary-Lane Kamberg | 2017 | The Rosen Publishing Group, Inc | |
2067 | Coping with Cyberbullying | Jeff Mapua | 2017 | The Rosen Publishing Group, Inc | |
2068 | Cyberdualism in China: The Political Implications of Internet Exposure of Educated Youth | Shiru Wang | 2017 | Routledge | |
2069 | Combatting Cybercrime Tools and Capacity Building for Emerging Economies | coll. | 2017 | The World Bank | |
2070 | Introduction to Cyber Security | Jeetendra Pande | 2017 | Uttarakhand Open University | |
2071 | Listening In: Cybersecurity in an Insecure Age | Susan Landau | 2017 | Yale University Press | |
2072 | Digital World War: Islamists, Extremists, and the Fight for Cyber Supremacy | Haroon K. Ullah | 2017 | Yale University Press | |
2073 | Digital Age--How to approach Cyber Security: A risk-based approach to information security considering the human factor | Andreas Von Grebmer | 2017 | Books on Demand | |
2074 | A 21st Century Cyber-Physical Systems Education | and Medicine Engineering National Academies of Sciences; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Committee on 21st Century Cyber-Physical Systems Education | 2017 | National Academies Press | |
2075 | Embedded Systems, Cyber-Physical Systems, and Applications | Hamid R. Arabnia | 2017 | C. S. R. E. A. | |
2076 | The Manager's Guide to Cybersecurity Law : Essentials for Today's Business | Tari Schreider; Kristen Noakes-Fry | 2017 | Rothstein Associates, Incorporated | |
2077 | Embedded Systems, Cyber-Physical Systems, and Applications | Hamid R. Arabnia; Leonidas Deligiannidis; Fernando G. Tinetti | 2017 | C. S. R. E. A. | |
2078 | Cyber Mobs : Destructive Online Communities | Allison Krumsiek | 2017 | Greenhaven Publishing LLC | |
2079 | Foundational Cybersecurity Research: Improving Science, Engineering, and Institutions | and Medicine Engineering National Academies of Sciences; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Peter J. Weinberger; Baruch Fischhoff; Lynette I. Millett | 2017 | National Academies Press | |
2080 | Investigating Cybercrime | Angie Timmons; Sara L. Latta | 2017 | Enslow Publishing, LLC | |
2081 | Biomedical Odysseys: Fetal Cell Experiments from Cyberspace to China | Priscilla Song | 2017 | Princeton University Press | |
2082 | Understanding Cyber Conflict: Fourteen Analogies | George Perkovich (editor), Ariel E. Levite (editor) | 2017 | Georgetown University Press | |
2083 | Embracing the Machines: Robots, Cyber, and New Rules for War | Jeremy A. Rabkin; John Yoo | 2017 | Encounter Books | |
2084 | Hacking ISIS: How to Destroy the Cyber Jihad | Malcolm W. Nance | 2017 | Skyhorse | |
2085 | Cybercognition: Brain, Behaviour and the Digital World | Lee Hadlington | 2017 | SAGE | |
2086 | Cyber Law in the Netherlands | Arno R. Lodder;Mark G.A. Egeler;Wanda E.L. van Kerkvoorden; | 2017 | Kluwer Law International | |
2087 | Cyber Law in the Netherlands | Arno R. Lodder;Mark G.A. Egeler;Wanda E.L. van Kerkvoorden; | 2017 | Kluwer Law International | |
2088 | An Introduction to Cyberpsychology | Irene Connolly, Marion Palmer, Hannah Barton, Gráinne Kirwan | 2017 | Routledge | |
2089 | Cyber Warfare Building the Scientific Foundation | Jajodia, Sushil;Shakarian, Paulo;Subrahmanian, V. S.;Swarup, Vipin;Wang, Cliff | 2016 | Springer International Publishing | |
2090 | Hamlet on the holodeck: the future of narrative in cyberspace | Murray, Janet H | 2016 | Free Press | |
2091 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 | Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) | 2016 | Springer Singapore | |
2092 | From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 years | Hans-Joachim Heintze, Pierre Thielbo¨rger (editors) | 2016 | Springer International Publishing | |
2093 | Cybernetics: From Past to Future | D.A. Novikov | 2016 | Springer | |
2094 | The Global Cyber-Vulnerability Report | V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash | 2016 | Springer | |
2095 | Cyber-physical systems : a computational perspective | Deka, Ganesh Chandra; Patnaik, L. M.; Siddesh, Gaddadevara Matt; Srinivasa, Krishnarajanagar Gopalalyengar | 2016 | CRC Press LLC | |
2096 | Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems | Josiah Dykstra | 2016 | O'Reilly Media | |
2097 | Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and Applications | Antonio Guerrieri, Valeria Loscri, Anna Rovella, Giancarlo Fortino (eds.) | 2016 | Springer International Publishing | |
2098 | Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach | Roman Gumzej (auth.) | 2016 | Springer International Publishing | |
2099 | Cybersecurity Investments: Decision Support Under Economic Aspects | Stefan Beissel (auth.) | 2016 | Springer International Publishing | |
2100 | Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2015 | Oliver Niggemann, Jürgen Beyerer (eds.) | 2016 | Springer Vieweg | |
2101 | Transactions on Computational Science XXVI: Special Issue on Cyberworlds and Cybersecurity | Marina L. Gavrilova, C.J. Kenneth Tan, Andrés Iglesias, Mikio Shinya, Akemi Galvez, Alexei Sourin (eds.) | 2016 | Springer-Verlag Berlin Heidelberg | |
2102 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 | Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) | 2016 | Springer Singapore | |
2103 | Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy | George Christou (auth.) | 2016 | Palgrave Macmillan UK | |
2104 | From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 years | Hans-Joachim Heintze, Pierre Thielbo¨rger (editors) | 2016 | Springer International Publishing | |
2105 | Dark Territory: The Secret History of Cyber War | Fred Kaplan | 2016 | Simon & Schuster | |
2106 | Dark Territory: The Secret History of Cyber War | Fred Kaplan | 2016 | Simon & Schuster | |
2107 | From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 years | Hans-Joachim Heintze, Pierre Thielbo¨rger (editors) | 2016 | Springer International Publishing | |
2108 | Cybernetics: From Past to Future | D.A. Novikov | 2016 | Springer | |
2109 | The Global Cyber-Vulnerability Report | V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, B. Aditya Prakash | 2016 | Springer | |
2110 | Cyber-physical systems : a computational perspective | Deka, Ganesh Chandra; Patnaik, L. M.; Siddesh, Gaddadevara Matt; Srinivasa, Krishnarajanagar Gopalalyengar | 2016 | CRC Press LLC | |
2111 | Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems | Josiah Dykstra | 2016 | O'Reilly Media | |
2112 | Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and Applications | Antonio Guerrieri, Valeria Loscri, Anna Rovella, Giancarlo Fortino (eds.) | 2016 | Springer International Publishing | |
2113 | Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach | Roman Gumzej (auth.) | 2016 | Springer International Publishing | |
2114 | Cybersecurity Investments: Decision Support Under Economic Aspects | Stefan Beissel (auth.) | 2016 | Springer International Publishing | |
2115 | Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2015 | Oliver Niggemann, Jürgen Beyerer (eds.) | 2016 | Springer Vieweg | |
2116 | Transactions on Computational Science XXVI: Special Issue on Cyberworlds and Cybersecurity | Marina L. Gavrilova, C.J. Kenneth Tan, Andrés Iglesias, Mikio Shinya, Akemi Galvez, Alexei Sourin (eds.) | 2016 | Springer-Verlag Berlin Heidelberg | |
2117 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 | Muthukrishnan Senthilkumar, Vijayalakshmi Ramasamy, Shina Sheen, C. Veeramani, Anthony Bonato, Lynn Batten (eds.) | 2016 | Springer Singapore | |
2118 | Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy | George Christou (auth.) | 2016 | Palgrave Macmillan UK | |
2119 | From Cold War to cyber war: the evolution of the international law of peace and armed conflict over the last 25 years | Hans-Joachim Heintze, Pierre Thielbo¨rger (editors) | 2016 | Springer International Publishing | |
2120 | Dark Territory: The Secret History of Cyber War | Fred Kaplan | 2016 | Simon & Schuster | |
2121 | Dark Territory: The Secret History of Cyber War | Fred Kaplan | 2016 | Simon & Schuster | |
2122 | A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0) | Kohnke, Anne; Shoemaker, Dan; Sigler, Kenneth | 2016 | CRC Press/Auerbach | |
2123 | The complete guide to cybersecurity risks and controls | Kohnke, Anne; Shoemaker, Dan; Sigler, Kenneth | 2016 | CRC Press | |
2124 | Cyber security for industrial control systems : from the viewpoint of close-loop | Chen, Jiming; Cheng, Peng; Zhang, Heng | 2016 | CRC Press | |
2125 | Cyber Security Awareness for CEOs and Management | Dalziel, Henry; Willson, David | 2016 | Syngress is an imprint of Elsevier | |
2126 | Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide | Luis Ayala | 2016 | Apress | |
2127 | Rise of the Machines: A Cybernetic History | Thomas Rid | 2016 | W. W. Norton & Company | |
2128 | Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide | Luis Ayala (auth.) | 2016 | Apress | |
2129 | Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers | Kristin Haltinner, Dilshani Sarathchandra, Jim Alves-Foss, Kevin Chang, Daniel Conte de Leon, Jia Song (eds.) | 2016 | Springer International Publishing | |
2130 | Technological Innovation for Cyber-Physical Systems: 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, Costa de Caparica, Portugal, April 11-13, 2016, Proceedings | Luis M. Camarinha-Matos, António J. Falcão, Nazanin Vafaei, Shirin Najdi (eds.) | 2016 | Springer International Publishing | |
2131 | Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers | Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis Katsikas, Costas Lambrinoudakis (eds.) | 2016 | Springer International Publishing | |
2132 | Applied Cyberpsychology: Practical Applications of Cyberpsychological Theory and Research | Alison Attrill, Chris Fullwood (eds.) | 2016 | Palgrave Macmillan UK | |
2133 | Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage | Gordon Corera | 2016 | Pegasus Books | |
2134 | Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage | Gordon Corera | 2016 | Pegasus Books | |
2135 | Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage | Gordon Corera | 2016 | Pegasus Books | |
2136 | The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online | Mary Aiken | 2016 | Spiegel & Grau | |
2137 | Communications for Control in Cyber Physical Systems. Theory, Design and Applications in Smart Grids | Husheng Li | 2016 | Morgan Kaufmann | |
2138 | Cybersecurity and Applied Mathematics | Leigh Metcalf, William Casey | 2016 | Syngress | |
2139 | Cyber Guerilla | Jelle Van Haaster, Rickey Gevers, Martijn Sprengers | 2016 | Syngress | |
2140 | Cyber Security Engineering A Practical Approach for Systems and Software Assurance | Carol Woody, Nancy R. Mead | 2016 | Addison-Wesley Professional | |
2141 | Cybersecurity Lexicon | Luis Ayala (auth.) | 2016 | Apress | |
2142 | Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention | Luis Ayala (auth.) | 2016 | Apress | |
2143 | The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War | Steve Grobman, Allison Cerra (auth.) | 2016 | Apress | |
2144 | Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications | Dietmar P.F. Möller (auth.) | 2016 | Springer International Publishing | |
2145 | The "Dematerialized" Insurance: Distance Selling and Cyber Risks from an International Perspective | Pierpaolo Marano, Ioannis Rokas, Peter Kochenburger (eds.) | 2016 | Springer International Publishing | |
2146 | Cyber-security of SCADA and Other Industrial Control Systems | Edward J. M. Colbert, Alexander Kott (eds.) | 2016 | Springer International Publishing | |
2147 | Cyber Deception: Building the Scientific Foundation | Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (eds.) | 2016 | Springer International Publishing | |
2148 | Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities | Babak Akhgar, Ben Brewster (eds.) | 2016 | Springer International Publishing | |
2149 | The Quest to Cyber Superiority: Cybersecurity Regulations, Frameworks, and Strategies of Major Economies | Nir Kshetri (auth.) | 2016 | Springer International Publishing | |
2150 | Introduction to Cyberdeception | Neil C. Rowe, Julian Rrushi (auth.) | 2016 | Springer International Publishing | |
2151 | Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USA | Denise Nicholson (eds.) | 2016 | Springer International Publishing | |
2152 | Automation, Communication and Cybernetics in Science and Engineering 2015/2016 | Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.) | 2016 | Springer International Publishing | |
2153 | Transactions on Computational Science XXVIII: Special Issue on Cyberworlds and Cybersecurity | Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin (eds.) | 2016 | Springer-Verlag Berlin Heidelberg | |
2154 | Cyberactivism and Citizen Journalism in Egypt: Digital Dissidence and Political Change | Courtney C. Radsch (auth.) | 2016 | Palgrave Macmillan US | |
2155 | Cyberbullying: Approaches, Consequences and Interventions | Lucy R. Betts (auth.) | 2016 | Palgrave Macmillan UK | |
2156 | Political Cyberformance: The Etheatre Project | Christina Papagiannouli (auth.) | 2016 | Palgrave Macmillan UK | |
2157 | Cyber Guerilla | Jelle Van Haaster, Rickey Gevers | 2016 | Syngress | |
2158 | Cybersecurity and Applied Mathematics | Leigh Metcalf, William Casey | 2016 | Syngress | |
2159 | How to Measure Anything in Cybersecurity Risk | Douglas W. Hubbard, Richard Seiersen | 2016 | Wiley | |
2160 | How to Measure Anything in Cybersecurity Risk | Douglas W. Hubbard, Richard Seiersen | 2016 | Wiley | |
2161 | Machine Learning for Cyber Physical Systems | Beyerer Jürgen, Niggemann Oliver, Kühnert Christian (eds.) | 2016 | Springer | |
2162 | Cyber-Risk Informatics: Engineering Evaluation with Data Science | Mehmet Sahinoglu | 2016 | Wiley | |
2163 | Trustworthy Cyber-Physical Systems Engineering | Alexander Romanovsky, Fuyuki Ishikawa (eds,) | 2016 | Chapman and Hall / CRC | |
2164 | Development of a Cyber Physical System for Fire Safety | Rosalie Faith Wills, André Marshall (auth.) | 2016 | Springer International Publishing | |
2165 | Globalization and Cyberculture: An Afrocentric Perspective | Kehbuma Langmia (auth.) | 2016 | Palgrave Macmillan | |
2166 | Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy | Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz (eds.) | 2016 | Springer International Publishing | |
2167 | Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century | Joshua B. Hill, Nancy E. Marion | 2016 | Praeger | |
2168 | Development Of A Cyber Physical System For Fire Safety | Rosalie Faith Wills | 2016 | Springer | |
2169 | The cybersecurity dilemma : hacking, trust, and fear between nations | Buchanan, Ben | 2016 | Oxford University Press | |
2170 | Walking Wounded: Inside the U.S. Cyberwar Machine | Michael A. VanPutte | 2016 | CreateSpace | |
2171 | Psychoanalysis, Identity, and the Internet: Explorations into Cyberspace | Andrea Marzi | 2016 | Karnac Books | |
2172 | Binary bullets : the ethics of cyberwarfare | Allhoff, Fritz; Henschke, Adam; Strawser, Bradley Jay | 2016 | Oxford University Press | |
2173 | The Decision to Attack: Military and Intelligence Cyber Decision-Making | Aaron Franklin Brantly, William Keller, Scott Jones | 2016 | Studies in Security and Intern | |
2174 | Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies | Ira Winkler and Araceli Treu Gomes (Auth.) | 2016 | Syngress | |
2175 | An introduction to cyberpsychology | Connolly, Irene; Palmer, Marion; Barton, Hannah; Kirwan, Gráinne | 2016 | Taylor and Francis;Routledge | |
2176 | Cyber Security Engineering: A Practical Approach for Systems and Software Assurance | Nancy R. Mead, Carol Woody | 2016 | Addison-Wesley Professional | |
2177 | Cyber Security: Everything an Executive Needs to Know | Phillip Ferraro | 2016 | Phillip J Ferraro LLC | |
2178 | Cyber Warfare: Its Implications on National Security | Sanjeev Relia | 2016 | Vij Books India | |
2179 | Making Passwords Secure - Fixing the Weakest Link in Cybersecurity | Dovell Bonnett | 2016 | Access Smart Media | |
2180 | Cyberpsychology: The Study of Individuals, Society and Digital Technologies | Monica T. Whitty, Garry Young | 2016 | BPS Blackwell | |
2181 | Securing Cyberspace International and Asian Perspectives | Cherian Samuel | 2016 | Pentagon Press | |
2182 | Cyber-Physical System Design with Sensor Networking Technologies | Sherali Zeadally, Nafaa Jabeur | 2016 | The Institution of Engineering and Technology | |
2183 | Cybercrime in Progress: Theory and prevention of technology-enabled offenses | Thomas J Holt; Adam M Bossler | 2016 | Routledge | |
2184 | Cyber Fraud: The Web of Lies | Bryan Seely | 2016 | Krebs on Security | |
2185 | Hamlet on the Holodeck: The Future of Narrative in Cyberspace | Janet H. Murray | 2016 | | |
2186 | Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems | Josiah Dykstra | 2016 | O’Reilly Media | |
2187 | Cyberethics | Richard A. Spinello | 2016 | Jones & Bartlett Publishers | |
2188 | Islamophobia in Cyberspace: Hate Crimes Go Viral | Imran Awan (ed.) | 2016 | Ashgate | |
2189 | Cyberbullies, Cyberactivists, Cyberpredators: Film, TV, and Internet Stereotypes | Lauren Rosewarne | 2016 | Praeger | |
2190 | National Security and Counterintelligence in the Era of Cyber Espionage | Eugenie de Silva | 2016 | IGI Global | |
2191 | Cybersecurity Management Guidelines Ver 1.1 | Ministry of Economy, Trade and Industry (METI), Independent Administrative Agency Information-technology Promotion Agency (IPA) | 2016 | Ministry of Economy, Trade and Industry (METI), Independent Administrative Agency Information-technology Promotion Agency (IPA) | |
2192 | Hacked: The Inside Story of America’s Struggle to Secure Cyberspace | Charlie Mitchell | 2016 | Rowman & Littlefield | |
2193 | Ranulph Glanville And How To Live The Cybernetics Of Unknowing | Phillip Guddemi, Soren Brier, Louis H. Kauffman | 2016 | Imprint Academic | |
2194 | Architecture and Adaptation: From Cybernetics to Tangible Computing | Socrates Yiannoudes | 2016 | Routledge | |
2195 | Architecture and Adaptation: From Cybernetics to Tangible Computing | Socrates Yiannoudes | 2016 | Routledge | |
2196 | Online Trolling And Its Perpetrators: Under The Cyberbridge | Pnina Fichman, Madelyn R. Sanfilippo | 2016 | Rowman & Littlefield Publishers | |
2197 | Essential Cyber Security Handbook | Nam Nguyen | 2016 | Nam Nguyen | |
2198 | Cybernetics: The Macy Conferences 1946-1953 : The Complete Transactions | Claus Pias (editor) | 2016 | Diaphanes | |
2199 | Cyber Security And The Politics Of Time | Tim Stevens | 2016 | Cambridge University Press | |
2200 | Science Fiction Writers' Phrase Book: Essential Reference for All Authors of Sci-Fi, Cyberpunk, Dystopian, Space Marine, and Space Fantasy Adventure (Writers' Phrase Books Book 6) | Jackson Dean Chase | 2016 | Jackson Dean Chase, Inc. | |
2201 | Cyber-physical system design with sensor networking technologies | Sherali Zeadally (editor); Nafaâ Jabeur (editor) | 2016 | | |
2202 | Essential cybersecurity science: build, test, and evaluate secure systems | Dykstra, Josiah | 2016 | O'Reilly Media | |
2203 | Cyber-physical attack recovery procedures: a step-by-step preparation and response guide | Ayala, Luis | 2016 | Apress | |
2204 | Cybersecurity Lexicon | Ayala, Luis | 2016 | Apress | |
2205 | Cyberbullying Across the Globe: Gender, Family, and Mental Health | Larrañaga, Elisa.;Navarro, Raúl.;Yubero, Santiago | 2016 | Springer International Publishing : Imprint: Springer | |
2206 | Cyberbullying Across the Globe: Gender, Family, and Mental Health | Larrañaga, Elisa.;Navarro, Raúl.;Yubero, Santiago | 2016 | Springer International Publishing : Imprint: Springer | |
2207 | Cybernetics: The Macy Conferences 1946-1953: The Complete Transactions | Claus Pias (editor) | 2016 | University of Chicago Press | |
2208 | Cyberspies: The Secret History Of Surveillance, Hacking, And Digital Espionage | Gordon Corera | 2016 | Pegasus Books | |
2209 | How to measure anything in cybersecurity risk | Hubbard, Douglas W.;Seiersen, Richard | 2016 | Wiley | |
2210 | Cybersecurity and Applied Mathematics | Casey, William;Metcalf, Leigh;William Casey | 2016 | Elsevier Science & Technology Books;Syngress | |
2211 | Cyber insecurity: navigating the perils of the next information age | Harrison, Richard M.;Herr, Trey | 2016 | Rowman & Littlefield Publishers | |
2212 | Rise of the machines: a cybernetic history | Rid, Thomas | 2016 | W. W. Norton & Company | |
2213 | Intelligent Methods for Cyber Warfare | Ronald R. Yager, Marek Z. Reformat;Naif Alajlan | 2016 | Springer International Publishing | |
2214 | Cyberbullies, cyberactivists, cyberpredators: film, TV, and internet stereotypes | Rosewarne, Lauren | 2016 | ABC-CLIO;Praeger | |
2215 | Cyber-risk informatics: engineering evaluation with data science | Sahinoglu, Mehmet | 2016 | John Wiley & Sons, Incorporated | |
2216 | Future War: Super-soldiers, Terminators, Cyberspace, and the National Security Strategy for Twenty-First-Century Combat | Robert L. Maginnis | 2016 | Defender Publishing | |
2217 | Cyber Guerilla | Jelle van Haaster | 2016 | Syngress | |
2218 | Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare | George Lucas | 2016 | Oxford University Press | |
2219 | Cyber Guerilla | Jelle Van Haaster, Rickey Gevers, Martijn Sprengers | 2016 | Syngress | |
2220 | Deleuze and Baudrillard: From Cyberpunk to Biopunk | Sean McQueen | 2016 | Edinburgh University Press | |
2221 | How HIPAA Can Crush Your Medical Practice: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It | Craig a Petronella | 2016 | Createspace Independent Publishing Platform | |
2222 | Cyberspace in Peace and War | Libicki, Martin C.; | 2016 | Naval Institute Press | |
2223 | China's Cyber Power | Nigel Inkster | 2016 | Routledge | |
2224 | From Parchment to Cyberspace: Medieval Literature in the Digital Age | Stephen G. Nichols | 2016 | Peter Lang Inc., International Academic Publishers | |
2225 | Cyber security for industrial control systems : from the viewpoint of close-loop | Peng Cheng, Heng Zhang, Jiming Chen (eds.) | 2016 | CRC Press | |
2226 | Cyber Flame: The invasion of cyberbullying and the motives of bullies | Alexander Bostic | 2016 | UNKNOWN | |
2227 | Complete CompTIA A+ Guide to IT Hardware and Software (Pearson IT Cybersecurity Curriculum (ITCC)) | Cheryl A. Schmidt | 2016 | Pearson IT Certification | |
2228 | From Parchment to Cyberspace: Medieval Literature in the Digital Age (Medieval Interventions) | Stephen G. Nichols | 2016 | Peter Lang Inc., International Academic Publishers | |
2229 | Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage | Gordon Corera | 2016 | | |
2230 | International Conflict And Cyberspace Superiority: Theory And Practice | William D. Bryant | 2016 | Routledge | |
2231 | Cybersecurity And Human Rights In The Age Of Cyberveillance | Joanna Kulesza, Roy Balleste | 2016 | Rowman & Littlefield | |
2232 | Conflict in Cyber Space: Theoretical, Strategic and Legal Pespectives | Karsten Friis; Jens Ringsmose | 2016 | Routledge | |
2233 | Cyberbullying Across the Globe | Raúl Navarro, Santiago Yubero and Elisa Larrañaga | 2016 | Springer International Publishing, Cham | |
2234 | Cyberbullying Across the Globe | Raúl Navarro, Santiago Yubero; Elisa Larrañaga | 2016 | Springer International Publishing, Cham | |
2235 | Cyberbullying: approaches, consequences and interventions | Lucy R Betts | 2016 | Springer Nature | |
2236 | Hacked: The Inside Story Of America's Struggle To Secure Cyberspace | Charlie Mitchell | 2016 | Rowman & Littlefield | |
2237 | CyberGenetics: Health genetics and new media | Anna Harris, Susan Kelly, Sally Wyatt | 2016 | Routledge | |
2238 | The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values—and What We Can Do About It | Mary Aiken | 2016 | Random House Publishing Group | |
2239 | Hamelt on the Holodeck The Future of Narrative in Cyberspace | Janet H. Murray | 2016 | The Free Press | |
2240 | Cybersecurity: Issues of Today, a Path for Tomorrow | Daniel Reis | 2016 | Archway Publishing | |
2241 | Cyber Conflicts and Small States | Lech J. Janczewski, William Caelli | 2016 | Routledge | |
2242 | CyberGenetics: Health genetics and new media | Anna Harris; Susan Kelly; Sally Wyatt | 2016 | Routledge | |
2243 | Anonymity, Cybercrime, and the Connection to Cryptocurrency | Jesse D. Bray | 2016 | | |
2244 | Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition | Strategic Studies Institute (U.S.) (editor), Phil Williams (editor), Dighton Fiddner (editor) | 2016 | Department of the Army | |
2245 | Cyber Security Cyber Attacks and Counter Measures: User Perspective (PGDCS-03) | Nihar Ranjan Pande (ed.) | 2016 | Uttarakhand Open University | |
2246 | Management of Cyber Physical Objects in the Future Internet of Things: Methods, Architectures and Applications | Antonio Guerrieri; Valeria Loscri; Anna Rovella; Giancarlo Fortino | 2016 | Springer | |
2247 | North Korea's Cyber Operations : Strategy and Responses | Jenny Jun; Scott LaFoy; Ethan Sohn | 2016 | Center for Strategic & International Studies | |
2248 | Deleuze and Baudrillard: From Cyberpunk to Biopunk | Sean McQueen | 2016 | Edinburgh University Press | |
2249 | Online Trolling and Its Perpetrators: Under the Cyberbridge | Pnina Fichman, Madelyn Sanfilippo | 2016 | Rowman & Littlefield Publishers | |
2250 | A Social-ecological Approach to Cyberbullying | Michelle F. Wright | 2016 | Nova Science | |
2251 | Cyberbullying: From Theory to Intervention | Trijntje Völlink, Francine Dehue, Conor Mc Guckin | 2016 | Routledge | |
2252 | Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies | Ira Winkler, Araceli Treu Gomes | 2016 | Syngress | |
2253 | Cyberbullying in social media within educational institutions: featuring student, employee, and parent information | American Association of School Administrators;Bollinger, Dorothy M.;Horowitz, Merle | 2015 | Rowman & Littlefield Publishers | |
2254 | A Human Readable Guide to Cyber Security | Dane Christian | 2015 | | |
2255 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki | 2015 | Springer International Publishing | |
2256 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
2257 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
2258 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki (eds.) | 2015 | Springer International Publishing | |
2259 | Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings | Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.) | 2015 | Springer International Publishing | |
2260 | Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2015 | Springer International Publishing | |
2261 | Psycho-Cybernetics | Maxwell Maltz | 2015 | Tarcher Perigee | |
2262 | Cyber reconnaissance, surveillance, and defense | Robert Shimonski | 2015 | Elsevier/Syngress, Syngress | |
2263 | Intelligent Methods for Cyber Warfare | Ronald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.) | 2015 | Springer International Publishing | |
2264 | Hardware/Software Co-Design and Optimization for Cyberphysical Integration in Digital Microfluidic Biochips | Yan Luo, Krishnendu Chakrabarty, Tsung-Yi Ho (auth.) | 2015 | Springer International Publishing | |
2265 | Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding Principles | Rolf H. Weber (auth.) | 2015 | Springer-Verlag Berlin Heidelberg | |
2266 | Propagation of Interval and Probabilistic Uncertainty in Cyberinfrastructure-related Data Processing and Data Fusion | Christian Servin, Vladik Kreinovich (auth.) | 2015 | Springer International Publishing | |
2267 | Cyber Physical Systems Approach to Smart Electric Power Grid | Siddhartha Kumar Khaitan, James D. McCalley, Chen Ching Liu (eds.) | 2015 | Springer-Verlag Berlin Heidelberg | |
2268 | China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain | Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron | 2015 | Oxford University Press | |
2269 | Cyber Blackout: When the Lights Go Out -- Nation at Risk | John A. Adams Jr. | 2015 | FriesenPress | |
2270 | A Human Readable Guide to Cyber Security | Dane Christian | 2015 | | |
2271 | Cyber Warfare: Building the Scientific Foundation | Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (eds.) | 2015 | Springer International Publishing | |
2272 | Cybercrime, Digital Forensics and Jurisdiction | Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.) | 2015 | Springer International Publishing | |
2273 | Counterterrorism and Cybersecurity: Total Information Awareness | Newton Lee (auth.) | 2015 | Springer International Publishing | |
2274 | Foundations & Principles of Distributed Manufacturing: Elements of Manufacturing Networks, Cyber-Physical Production Systems and Smart Automation | Hermann Kühnle, Günter Bitsch (auth.) | 2015 | Springer International Publishing | |
2275 | Chinese Cybersecurity and Cyberdefense | Daniel Ventre | 2015 | Wiley-ISTE | |
2276 | Cyber-security Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare | | 2015 | CRC Pr I Llc, Johnson, Thomas A | |
2277 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki | 2015 | Springer International Publishing | |
2278 | The Cybernetics Moment: Or Why We Call Our Age the Information Age | Ronald R. Kline | 2015 | Johns Hopkins University Press | |
2279 | Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare | Thomas A. Johnson | 2015 | CRC Press | |
2280 | Cyber-Physical Attacks: A Growing Invisible Threat | George Loukas | 2015 | Butterworth-Heinemann | |
2281 | MAC Protocols for Cyber-Physical Systems | Feng Xia, Azizur Rahim (auth.) | 2015 | Springer-Verlag Berlin Heidelberg | |
2282 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
2283 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
2284 | Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats | Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam | 2015 | Apress | |
2285 | Cyber-physical attacks: a growing invisible threat | Loukas, George | 2015 | Butterworth-Heinemann is an imprint of Elsevier | |
2286 | Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats | Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam (auth.) | 2015 | Apress | |
2287 | Self- and Co-regulation in Cybercrime, Cybersecurity and National Security | Tatiana Tropina, Cormac Callanan (auth.) | 2015 | Springer International Publishing | |
2288 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki (eds.) | 2015 | Springer International Publishing | |
2289 | Intelligent Systems in Cybernetics and Automation Theory: Proceedings of the 4th Computer Science On-line Conference 2015 (CSOC2015), Vol 2: Intelligent Systems in Cybernetics and Automation Theory | Radek Silhavy, Roman Senkerik, Zuzana Kominkova Oplatkova, Zdenka Prokopova, Petr Silhavy (eds.) | 2015 | Springer International Publishing | |
2290 | Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease Management | Nikolaos S. Voros, Christos P. Antonopoulos (eds.) | 2015 | Springer International Publishing | |
2291 | Formal Modeling and Verification of Cyber-Physical Systems: 1st International Summer School on Methods and Tools for the Design of Digital Systems, Bremen, Germany, September 2015 | Rolf Drechsler, Ulrich Kühne (eds.) | 2015 | Springer Vieweg | |
2292 | Cyber Fraud: The Web of Lies | Bryan Seely, Jonathan David Chicquette, Brian Muchinsky | 2015 | Amazon | |
2293 | Privacy in a Cyber Age: Policy and Practice | Amitai Etzioni | 2015 | Palgrave Macmillan | |
2294 | Cyber-Proletariat: Global Labour in the Digital Vortex | Nick Dyer-Witheford | 2015 | Pluto Press | |
2295 | Cyberphobia: Identity, Trust, Security and the Internet | Lucas Edward | 2015 | Bloomsbury | |
2296 | Cyber Warfare: A Multidisciplinary Analysis | James A. Green | 2015 | Routledge | |
2297 | Cybercrime Risks and Responses: Eastern and Western Perspectives | Russell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau | 2015 | Palgrave Macmillan | |
2298 | The Internet Revolution: From Dotcom Capitalism to Cybernetic Communism | Richard Barbrook, Andy Cameron | 2015 | Institute of Network Cultures | |
2299 | Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice | Frederic Lemieux | 2015 | Palgrave Macmillan | |
2300 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O'Leary (auth.) | 2015 | Apress | |
2301 | Cybersecurity in Israel | Lior Tabansky, Isaac Ben Israel (auth.) | 2015 | Springer International Publishing | |
2302 | Digital Defense: A Cybersecurity Primer | Joseph Pelton, Indu B. Singh (auth.) | 2015 | Springer International Publishing | |
2303 | Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings | Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.) | 2015 | Springer International Publishing | |
2304 | Cyber-Risk Management | Atle Refsdal, Bjørnar Solhaug, Ketil Stølen (auth.) | 2015 | Springer International Publishing | |
2305 | Cyber Physical Systems. Design, Modeling, and Evaluation: 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, October 8, 2015, Proceedings | Mohammad Reza Mousavi, Christian Berger (eds.) | 2015 | Springer International Publishing | |
2306 | Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2015 | Springer International Publishing | |
2307 | Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015, Revised Selected Papers | Joshua I. James, Frank Breitinger (eds.) | 2015 | Springer International Publishing | |
2308 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O'Leary | 2015 | Apress | |
2309 | Proceedings of the 5th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2015 | D.O. Terletskyi, I.O. Lytvynenko (eds.) | 2015 | Bukrek | |
2310 | Cyberbullying Across the Globe: Gender, Family, and Mental Health | Raúl Navarro, Santiago Yubero, Elisa Larrañaga (eds.) | 2015 | Springer | |
2311 | @Heaven: The Online Death of a Cybernetic Futurist | Hastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard | 2015 | OR Books | |
2312 | @Heaven: The Online Death of a Cybernetic Futurist | Hastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard | 2015 | OR Books | |
2313 | The Cybernetics Moment: Or Why We Call Our Age the Information Age | Kline, Ronald R | 2015 | Johns Hopkins University Press | |
2314 | Cyber warfare : a reference handbook | Springer, Paul J | 2015 | ABC-CLIO | |
2315 | Cyber warfare : a reference handbook | Springer, Paul J | 2015 | ABC-CLIO | |
2316 | Securing cyber-physical systems | Pathan, Al-Sakib Khan | 2015 | CRC Press | |
2317 | Terrorism in cyberspace : the next generation | Weimann, Gabriel | 2015 | Woodrow Wilson Center Press ; New York : Columbia University Press | |
2318 | The Cybernetics Moment: Or Why We Call Our Age the Information Age | Kline, Ronald R | 2015 | Johns Hopkins University Press | |
2319 | The real cyber war : the political economy of Internet freedom | Jablonski, Michael; Powers, Shawn M | 2015 | University of Illinois Press | |
2320 | Cyber-Physical Systems: From Theory to Practice | Danda B. Rawat, Joel Rodrigues, Ivan Stojmenovic (eds.) | 2015 | CRC Press | |
2321 | Cyber-Humans: Our Future with Machines | Woodrow Barfield (auth.) | 2015 | Copernicus | |
2322 | Firebrand Waves of Digital Activism 1994–2014: The Rise and Spread of Hacktivism and Cyberconflict | Athina Karatzogianni (auth.) | 2015 | Palgrave Macmillan UK | |
2323 | Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice | Frederic Lemieux (eds.) | 2015 | Palgrave Macmillan UK | |
2324 | Cybercrime Risks and Responses: Eastern and Western Perspectives | Russell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau (eds.) | 2015 | Palgrave Macmillan UK | |
2325 | Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace | Brian M. Mazanec, Bradley A. Thayer (auth.) | 2015 | Palgrave Macmillan UK | |
2326 | Russia’s Coercive Diplomacy: Energy, Cyber, and Maritime Policy as New Sources of Power | Ryan C. Maness, Brandon Valeriano (auth.) | 2015 | Palgrave Macmillan UK | |
2327 | Privacy in a Cyber Age: Policy and Practice | Amitai Etzioni (auth.) | 2015 | Palgrave Macmillan US | |
2328 | Principles of object oriented modeling and simulation with Modelica 3.3 : a cyber-physical approach | Fritzson, Peter A | 2015 | Wiley-IEEE Press | |
2329 | Cyber reconnaissance, surveillance, and defense | Robert Shimonski | 2015 | Elsevier/Syngress, Syngress | |
2330 | Intelligent Methods for Cyber Warfare | Ronald R. Yager, Marek Z. Reformat, Naif Alajlan (eds.) | 2015 | Springer International Publishing | |
2331 | Hardware/Software Co-Design and Optimization for Cyberphysical Integration in Digital Microfluidic Biochips | Yan Luo, Krishnendu Chakrabarty, Tsung-Yi Ho (auth.) | 2015 | Springer International Publishing | |
2332 | Realizing a New Global Cyberspace Framework: Normative Foundations and Guiding Principles | Rolf H. Weber (auth.) | 2015 | Springer-Verlag Berlin Heidelberg | |
2333 | Propagation of Interval and Probabilistic Uncertainty in Cyberinfrastructure-related Data Processing and Data Fusion | Christian Servin, Vladik Kreinovich (auth.) | 2015 | Springer International Publishing | |
2334 | Cyber Physical Systems Approach to Smart Electric Power Grid | Siddhartha Kumar Khaitan, James D. McCalley, Chen Ching Liu (eds.) | 2015 | Springer-Verlag Berlin Heidelberg | |
2335 | China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain | Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron | 2015 | Oxford University Press | |
2336 | Cyber Blackout: When the Lights Go Out -- Nation at Risk | John A. Adams Jr. | 2015 | FriesenPress | |
2337 | A Human Readable Guide to Cyber Security | Dane Christian | 2015 | | |
2338 | Cyber Warfare: Building the Scientific Foundation | Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang (eds.) | 2015 | Springer International Publishing | |
2339 | Cybercrime, Digital Forensics and Jurisdiction | Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.) | 2015 | Springer International Publishing | |
2340 | Counterterrorism and Cybersecurity: Total Information Awareness | Newton Lee (auth.) | 2015 | Springer International Publishing | |
2341 | Foundations & Principles of Distributed Manufacturing: Elements of Manufacturing Networks, Cyber-Physical Production Systems and Smart Automation | Hermann Kühnle, Günter Bitsch (auth.) | 2015 | Springer International Publishing | |
2342 | Chinese Cybersecurity and Cyberdefense | Daniel Ventre | 2015 | Wiley-ISTE | |
2343 | Cyber-security Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare | | 2015 | CRC Pr I Llc, Johnson, Thomas A | |
2344 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki | 2015 | Springer International Publishing | |
2345 | The Cybernetics Moment: Or Why We Call Our Age the Information Age | Ronald R. Kline | 2015 | Johns Hopkins University Press | |
2346 | Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare | Thomas A. Johnson | 2015 | CRC Press | |
2347 | Cyber-Physical Attacks: A Growing Invisible Threat | George Loukas | 2015 | Butterworth-Heinemann | |
2348 | MAC Protocols for Cyber-Physical Systems | Feng Xia, Azizur Rahim (auth.) | 2015 | Springer-Verlag Berlin Heidelberg | |
2349 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
2350 | Hack-X-Crypt: A Straight Forward Guide Towards Ethical Hacking And Cyber Security | Ujjwal Sahay | 2015 | | |
2351 | Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats | Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam | 2015 | Apress | |
2352 | Cyber-physical attacks: a growing invisible threat | Loukas, George | 2015 | Butterworth-Heinemann is an imprint of Elsevier | |
2353 | Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats | Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam (auth.) | 2015 | Apress | |
2354 | Self- and Co-regulation in Cybercrime, Cybersecurity and National Security | Tatiana Tropina, Cormac Callanan (auth.) | 2015 | Springer International Publishing | |
2355 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmäki (eds.) | 2015 | Springer International Publishing | |
2356 | Intelligent Systems in Cybernetics and Automation Theory: Proceedings of the 4th Computer Science On-line Conference 2015 (CSOC2015), Vol 2: Intelligent Systems in Cybernetics and Automation Theory | Radek Silhavy, Roman Senkerik, Zuzana Kominkova Oplatkova, Zdenka Prokopova, Petr Silhavy (eds.) | 2015 | Springer International Publishing | |
2357 | Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease Management | Nikolaos S. Voros, Christos P. Antonopoulos (eds.) | 2015 | Springer International Publishing | |
2358 | Formal Modeling and Verification of Cyber-Physical Systems: 1st International Summer School on Methods and Tools for the Design of Digital Systems, Bremen, Germany, September 2015 | Rolf Drechsler, Ulrich Kühne (eds.) | 2015 | Springer Vieweg | |
2359 | Cyber Fraud: The Web of Lies | Bryan Seely, Jonathan David Chicquette, Brian Muchinsky | 2015 | Amazon | |
2360 | Privacy in a Cyber Age: Policy and Practice | Amitai Etzioni | 2015 | Palgrave Macmillan | |
2361 | Cyber-Proletariat: Global Labour in the Digital Vortex | Nick Dyer-Witheford | 2015 | Pluto Press | |
2362 | Cyberphobia: Identity, Trust, Security and the Internet | Lucas Edward | 2015 | Bloomsbury | |
2363 | Cyber Warfare: A Multidisciplinary Analysis | James A. Green | 2015 | Routledge | |
2364 | Cybercrime Risks and Responses: Eastern and Western Perspectives | Russell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau | 2015 | Palgrave Macmillan | |
2365 | The Internet Revolution: From Dotcom Capitalism to Cybernetic Communism | Richard Barbrook, Andy Cameron | 2015 | Institute of Network Cultures | |
2366 | Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice | Frederic Lemieux | 2015 | Palgrave Macmillan | |
2367 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O'Leary (auth.) | 2015 | Apress | |
2368 | Cybersecurity in Israel | Lior Tabansky, Isaac Ben Israel (auth.) | 2015 | Springer International Publishing | |
2369 | Digital Defense: A Cybersecurity Primer | Joseph Pelton, Indu B. Singh (auth.) | 2015 | Springer International Publishing | |
2370 | Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings | Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian-Far (eds.) | 2015 | Springer International Publishing | |
2371 | Cyber-Risk Management | Atle Refsdal, Bjørnar Solhaug, Ketil Stølen (auth.) | 2015 | Springer International Publishing | |
2372 | Cyber Physical Systems. Design, Modeling, and Evaluation: 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, October 8, 2015, Proceedings | Mohammad Reza Mousavi, Christian Berger (eds.) | 2015 | Springer International Publishing | |
2373 | Cyber Security and Privacy: 4th Cyber Security and Privacy Innovation Forum, CSP Innovation Forum 2015, Brussels, Belgium April 28-29, 2015, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2015 | Springer International Publishing | |
2374 | Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6–8, 2015, Revised Selected Papers | Joshua I. James, Frank Breitinger (eds.) | 2015 | Springer International Publishing | |
2375 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O'Leary | 2015 | Apress | |
2376 | Proceedings of the 5th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2015 | D.O. Terletskyi, I.O. Lytvynenko (eds.) | 2015 | Bukrek | |
2377 | Cyberbullying Across the Globe: Gender, Family, and Mental Health | Raúl Navarro, Santiago Yubero, Elisa Larrañaga (eds.) | 2015 | Springer | |
2378 | @Heaven: The Online Death of a Cybernetic Futurist | Hastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard | 2015 | OR Books | |
2379 | @Heaven: The Online Death of a Cybernetic Futurist | Hastreiter, Kim; Mandel, Thomas; Van der Leun, Gerard | 2015 | OR Books | |
2380 | The Cybernetics Moment: Or Why We Call Our Age the Information Age | Kline, Ronald R | 2015 | Johns Hopkins University Press | |
2381 | Cyber warfare : a reference handbook | Springer, Paul J | 2015 | ABC-CLIO | |
2382 | Cyber warfare : a reference handbook | Springer, Paul J | 2015 | ABC-CLIO | |
2383 | Securing cyber-physical systems | Pathan, Al-Sakib Khan | 2015 | CRC Press | |
2384 | Terrorism in cyberspace : the next generation | Weimann, Gabriel | 2015 | Woodrow Wilson Center Press ; New York : Columbia University Press | |
2385 | The Cybernetics Moment: Or Why We Call Our Age the Information Age | Kline, Ronald R | 2015 | Johns Hopkins University Press | |
2386 | The real cyber war : the political economy of Internet freedom | Jablonski, Michael; Powers, Shawn M | 2015 | University of Illinois Press | |
2387 | Cyber-Physical Systems: From Theory to Practice | Danda B. Rawat, Joel Rodrigues, Ivan Stojmenovic (eds.) | 2015 | CRC Press | |
2388 | Cyber-Humans: Our Future with Machines | Woodrow Barfield (auth.) | 2015 | Copernicus | |
2389 | Firebrand Waves of Digital Activism 1994–2014: The Rise and Spread of Hacktivism and Cyberconflict | Athina Karatzogianni (auth.) | 2015 | Palgrave Macmillan UK | |
2390 | Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice | Frederic Lemieux (eds.) | 2015 | Palgrave Macmillan UK | |
2391 | Cybercrime Risks and Responses: Eastern and Western Perspectives | Russell G. Smith, Ray Chak-Chung Cheung, Laurie Yiu-Chung Lau (eds.) | 2015 | Palgrave Macmillan UK | |
2392 | Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace | Brian M. Mazanec, Bradley A. Thayer (auth.) | 2015 | Palgrave Macmillan UK | |
2393 | Russia’s Coercive Diplomacy: Energy, Cyber, and Maritime Policy as New Sources of Power | Ryan C. Maness, Brandon Valeriano (auth.) | 2015 | Palgrave Macmillan UK | |
2394 | Privacy in a Cyber Age: Policy and Practice | Amitai Etzioni (auth.) | 2015 | Palgrave Macmillan US | |
2395 | Principles of object oriented modeling and simulation with Modelica 3.3 : a cyber-physical approach | Fritzson, Peter A | 2015 | Wiley-IEEE Press | |
2396 | Cybersecurity policies and strategies for cyberwarfare prevention | Richet, Jean-Loup | 2015 | Information Science Reference, IGI Global | |
2397 | New threats and countermeasures in digital crime and cyber terrorism | Dawson, Maurice; Omar, Marwan | 2015 | Information Science Reference | |
2398 | Cyber Physical Systems: Architectures, Protocols and Applications | Chi (Harold) Liu, Yan Zhang | 2015 | CRC Press | |
2399 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O'Leary | 2015 | Apress | |
2400 | Cyber Security: Analytics, Technology and Automation | Martti Lehto, Pekka Neittaanmaki | 2015 | Springer | |
2401 | Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats | Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam | 2015 | Apress | |
2402 | Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems | Josiah Dykstra | 2015 | O'Reilly Media | |
2403 | Evolution of Cyber Technologies and Operations to 2035 | Misty Blowers (eds.) | 2015 | Springer International Publishing | |
2404 | Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense | Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker, Alexander W. Tsow (auth.) | 2015 | Springer International Publishing | |
2405 | Lights out: a cyberattack, a nation unprepared, surviving the aftermath | Koppel, Ted | 2015 | Crown Publishers | |
2406 | An Introduction to Cybernetics | W. Ross Ashby | 2015 | Martino Fine Books | |
2407 | An Introduction to Cybernetics | W. Ross Ashby | 2015 | Martino Fine Books | |
2408 | Cybersonic Arts: Adventures in American New Music | Gordon Mumma | 2015 | University of Illinois Press | |
2409 | Cyber war versus cyber realities : cyber conflict in the international system | Maness, Ryan C.; Valeriano, Brandon | 2015 | Oxford University Press | |
2410 | Cyber Strategy | U S Department of Defense | 2015 | | |
2411 | A simpler guide to online security for everyone : how to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services | Clark, Ceri | 2015 | Ceri Clark;Lycan Books | |
2412 | Cybersecurity and Human Rights in the Age of Cyberveillance | Kulesza, Joanna; Balleste, Roy | 2015 | Rowman & Littlefield Publishers | |
2413 | Cybersecurity and Human Rights in the Age of Cyberveillance | Kulesza, Joanna; Balleste, Roy | 2015 | Rowman & Littlefield Publishers | |
2414 | Warrior elite : Australia's special forces, Z force to the SAS intelligence operations to cyber warfare | Macklin, Robert | 2015 | Hachette Australia | |
2415 | Warrior elite : Australia's special forces, Z force to the SAS intelligence operations to cyber warfare | Macklin, Robert | 2015 | Hachette Australia | |
2416 | Protecting our future : educating a cybersecurity workforce. Volume 2 | Jane LeClair, Sherri W Ramsay | 2015 | Hudson Whitman/ Excelsior College Press | |
2417 | Principles of Cyber-Physical Systems | Rajeev Alur | 2015 | The MIT Press | |
2418 | A Human Readable Guide to Cyber Security | Christian, Dane | 2015 | | |
2419 | Master Internet and Computer Security: How to protect yourself from cyber crime, malicious software and data loss | Williamson Steve | 2015 | | |
2420 | The CIS Critical Security Controls for Effective Cyber Defense, Version 6.0 | Center for Internet Security | 2015 | Center for Internet Security | |
2421 | CCFP Certified Cyber Forensics Professional Certification All-in-One Exam Guide | Chuck Easttom | 2015 | McGraw-Hill Education | |
2422 | Cyber Security Incident Management Guide | Centre For Cyber Security Belgium | 2015 | Centre For Cyber Security Belgium | |
2423 | Cybernetics and the philosophy of mind | Sayre, Kenneth M. | 2015 | Routledge | |
2424 | Book club kit. Lights out: a cyberattack, a nation unprepared, surviving the aftermanth | Ted Koppel | 2015 | Crown Publishers | |
2425 | Psycho-Cybernetics: Updated and Expanded | Maxwell Maltz | 2015 | Perigee;TarcherPerigee | |
2426 | Cybersecurity in our digital lives | Keeley, Gregory; LeClair, Jane | 2015 | Hudson Whitman | |
2427 | Cybersecurity : protecting critical infrastructures from cyber attack and cyber warfare | Johnson, Thomas Alfred | 2015 | CRC Press | |
2428 | CSX Cybersecurity Fundamentals Study Guide | ISACA | 2015 | ISACA | |
2429 | Cyber Security Awareness for Corporate Directors and Board Members | Willson, David; Dalziel, Henry | 2015 | Elsevier Science | |
2430 | Cyber Security Awareness for Lawyers | David Willson, Henry Dalziel | 2015 | Syngress | |
2431 | Cyber Security Awareness for Accountants and CPAs | David Willson, Henry Dalziel | 2015 | Syngress | |
2432 | Computer Law: A Guide to Cyberlaw and Data Privacy Law | David Bender | 2015 | LexisNexis | |
2433 | Intelligent Methods for Cyber Warfare | Alajlan, Naif;Reformat, Marek Z.;Yager, Ronald R | 2015 | Springer International Publishing : Imprint : Springer | |
2434 | Cyberphysical Systems for Epilepsy and Related Brain Disorders: Multi-parametric Monitoring and Analysis for Diagnosis and Optimal Disease Management | Antonopoulos, Christos P.;Voros, Nikolaos S | 2015 | Springer International Publishing | |
2435 | Cybercrime, digital forensics and jurisdiction | Chawki, Mohamed;Darwish, Ashraf;Khan, Mohammad Ayoub;Tyagi, Sapna | 2015 | Springer | |
2436 | CCFP certified cyber forensics professional certification: exam guide | Easttom, Chuck | 2015 | McGraw-Hill Education | |
2437 | Cybernethisms: Aldo Giorgini’s Computer Art Legacy | Garca? Bravo, Esteban;Giorgini, Aldo | 2015 | Bookmasters Group;Purdue University Press | |
2438 | Cybernethisms: Aldo Giorgini's computer art legacy | Garca? Bravo, Esteban;Giorgini, Aldo | 2015 | Purdue University Press | |
2439 | Essential cybersecurity science: build, test, and evaluate secure systems | Josiah Dykstra | 2015 | O'Reilly Media | |
2440 | Book club kit. Lights out: a cyberattack, a nation unprepared, surviving the aftermanth | Koppel, Ted | 2015 | Crown;Archetype;Crown Publishers | |
2441 | Introduction to US Cybersecurity Careers | Dalziel, Max | 2015 | Elsevier Science;Syngress | |
2442 | @heaven: The Online Death of a Cybernetic Futurist | Hastreiter, Kim;Mandel, Thomas;Van der Leun, Gerard | 2015 | OR Books | |
2443 | @heaven: The Online Death of a Cybernetic Futurist | Hastreiter, Kim;Mandel, Thomas;Van der Leun, Gerard | 2015 | OR Books | |
2444 | Psycho-Cybernetics, Updated And Expanded | Recorded Books, Inc.;Maltz, Maxwell | 2015 | Penguin Publishing Group;Perigee | |
2445 | Principles Of Cybercrime | Jonathan Clough | 2015 | Cambridge University Press | |
2446 | Making your primary school e-safe: whole school cyberbullying and e-safety strategies for meeting Ofsted requirements | Great Britain. Office for Standards in Education.; Katz, Adrienne | 2015 | Jessica Kingsley Publishers | |
2447 | Beyond cybersecurity: protecting your digital business | Kaplan, James M;Bailey, Tucker;O'Halloran, Derek;Marcus, Alan J | 2015 | John Wiley & Sons | |
2448 | Bit wars: cyber crime, hacking & information warfare | Hyslip, Dr Thomas S | 2015 | Createspace Independent Publishing Platform | |
2449 | Psycho-Cybernetics | Maxwell Maltz | 2015 | Penguin Publishing Group | |
2450 | Cyber War: Law and Ethics for Virtual Conflicts | Jens David Ohlin (editor), Kevin Govern (editor), Claire Finkelstein (editor) | 2015 | Oxford University Press | |
2451 | Cybercrime : legislation, cases and commentary | Gregor Urbas | 2015 | LexisNexis Butterworths | |
2452 | Cyber Security Awareness for CEOs and Management | David Willson, Henry Dalziel | 2015 | Syngress | |
2453 | Cyber-Proletariat: Global Labour in the Digital Vortex | Nick Dyer-Witheford | 2015 | Between the Lines | |
2454 | International Conflict and Cyberspace Superiority: Theory and Practice | William D. Bryant | 2015 | Routledge | |
2455 | Cyber Threat: The Rise of Information Geopolitics in U.S. National Security | Chris Bronk | 2015 | ABC-CLIO | |
2456 | Principles of Cyber-Physical Systems (Complete Instructor's Resources, Solution Manual) (Solutions) | Rajeev Alur | 2015 | The MIT Press | |
2457 | Hackers Wanted: An Examination of the Cybersecurity Labor Market | Martin C. Libicki; David Senty; Julia Pollak | 2015 | RAND Corporation | |
2458 | Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems | Josiah Dykstra | 2015 | O'Reilly Media | |
2459 | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks | Mike O'Leary | 2015 | Apress | |
2460 | A Practical Guide to Coping with Cyberstalking | National Centre for Cyberstalking Research | 2015 | Andrews UK | |
2461 | The Evolution of Cyber War: International Norms for Emerging-Technology Weapons | Brian M. Mazanec | 2015 | Potomac Books | |
2462 | Finance: Cloud Computing, Cyber Security and Cyber Heist--Beginners Guide to Help Protect Against Online Theft in the Cyber World | Alex Nkenchor Uwajeh | 2015 | Alex Nkenchor Uwajeh | |
2463 | Men Are From Cyberspace: The Single Woman's Guide To Flirting, Dating, & Finding Love | Lisa Skriloff; Jodie Gould | 2015 | St. Martin's Publishing Group | |
2464 | Regulating Speech in Cyberspace: Gatekeepers, Human Rights and Corporate Responsibility | Emily B. Laidlaw | 2015 | Cambridge University Press | |
2465 | Cybersecurity and the Internet of Things | coll. | 2015 | | |
2466 | Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks | Claude Fachkha | 2015 | Concordia University | |
2467 | Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense | Kristin E. Heckman; Frank J. Stech; Roshan K. Thomas; Ben Schmoker; Alexander W. Tsow | 2015 | Springer | |
2468 | Evolution of Cyber Technologies and Operations to 2035 | Misty Blowers | 2015 | Springer | |
2469 | Cyber Defense and Situational Awareness | Alexander Kott; Cliff Wang; Robert F. Erbacher | 2015 | Springer | |
2470 | Cyber Spy Hunters! | Mari Rich | 2015 | National Highlights Inc | |
2471 | Cyber-Attacks and the Exploitable Imperfections of International Law | Yaroslav Radziwill | 2015 | BRILL | |
2472 | Interim Report on 21st Century Cyber-Physical Systems Education | National Research Council; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Committee on 21st Century Cyber-Physical Systems Education | 2015 | National Academies Press | |
2473 | Globalization’s Impact on Cultural Identity Formation : Queer Diasporic Males in Cyberspace | Ahmet Atay | 2015 | Lexington Books | |
2474 | Reporting in the MENA Region : Cyber Engagement and Pan-Arab Social Media | Mohammad Ayish; Noha Mellor | 2015 | Rowman & Littlefield Publishers | |
2475 | Perspectives on Bullying : Research on Childhood, Workplace, and Cyberbullying | Roland D. Maiuro | 2015 | Springer Publishing Company, Incorporated | |
2476 | Perspectives on Stalking : Victims, Perpetrators, and Cyberstalking | Roland D. Maiuro | 2015 | Springer Publishing Company, Incorporated | |
2477 | New Media Politics : Rethinking Activism and National Security in Cyberspace | Banu Baybars-Hawks; Lemi Baruh | 2015 | Cambridge Scholars Publishing | |
2478 | Framework for SCADA Cybersecurity ePub | Richard Clark | 2015 | InduSoft | |
2479 | Perspectives on Bullying : Research on Childhood, Workplace, and Cyberbullying | Roland D. Maiuro | 2015 | Springer Publishing Company | |
2480 | HACK-X-CRYPT: A Straight Forward Guide Towards Ethical Hacking and Cyber Security | Ujjwal Sahay | 2015 | Ujjwal Sahay | |
2481 | The Cybernetic Brain: Sketches of Another Future | Pickering, Andrew | 2014 | University of Chicago Press | |
2482 | Black code: inside the battle for cyberspace | Deibert, Ronald J | 2014 | McClelland & Stewart;Signal | |
2483 | Cyber Warfare and the Laws of War | Harrison Dinniss, Heather | 2014 | Cambridge University Press | |
2484 | DarkMarket: Cyberthieves, Cybercops and You | Glenny, Misha | 2014 | Vintage;House of Anansi Press | |
2485 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 | Anthony Bonato, Stephen Finbow, Przemyslaw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) | 2014 | Springer India | |
2486 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut, Daniel Bachrach | 2014 | Apress | |
2487 | 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy | Daniel G. Bachrach, Eric J. Rzeszut (auth.) | 2014 | Apress | |
2488 | Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations | Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2489 | Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2014 | Springer International Publishing | |
2490 | Cyber Security | Voeller, John G. | 2014 | Wiley | |
2491 | Applied Cyber-Physical Systems | Bernd J. Krämer (auth.), Sang C. Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu (eds.) | 2014 | Springer-Verlag New York | |
2492 | Network science and cybersecurity | Alexander Kott (auth.), Robinson E. Pino (eds.) | 2014 | Springer-Verlag New York | |
2493 | Cyberspace and International Relations: Theory, Prospects and Challenges | Roxana Radu (auth.), Jan-Frederik Kremer, Benedikt Müller (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2494 | Investigating Internet Crimes. An Introduction to Solving Crimes in Cyberspace | Todd Shipley and Art Bowker (Auth.) | 2014 | Syngress | |
2495 | Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE. Developing Cyber-Physical Systems | Bran Selic and Sébastien Gérard (Auth.) | 2014 | Morgan Kaufmann | |
2496 | Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners | Jason Andress and Steve Winterfeld (Auth.) | 2014 | Syngress | |
2497 | Cybersecurity and Cyberwar: What Everyone Needs to Know | P.W. Singer, Allan Friedman | 2014 | Oxford University Press, USA | |
2498 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 | Anthony Bonato, Stephen Finbow, Przemyslaw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) | 2014 | Springer India | |
2499 | Developments in the Theory and Practice of Cybercartography: Applications and Indigenous Mapping | D.R.Fraser Taylor (Eds.) | 2014 | Elsevier Science | |
2500 | Impacts of Cyberbullying, Building Social and Emotional Resilience in Schools | Sharlene Chadwick (auth.) | 2014 | Springer International Publishing | |
2501 | Computer Network Security and Cyber Ethics, 4th ed. | Joseph Migga Kizza | 2014 | McFarland | |
2502 | Innovative Approaches Towards Low Carbon Economics: Regional Development Cybernetics | Jiuping Xu, Liming Yao, Yi Lu (auth.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2503 | Cybernics: Fusion of human, machine and information systems | Yoshiyuki Sankai, Kenji Suzuki, Yasuhisa Hasegawa (eds.) | 2014 | Springer Japan | |
2504 | Computational Intelligence for Decision Support in Cyber-Physical Systems | Zeashan H Khan, A. B. M. Shawkat Ali, Zahid Riaz (eds.) | 2014 | Springer-Verlag Singapur | |
2505 | Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware | Aditya Sood and Richard Enbody (Auth.) | 2014 | Syngress | |
2506 | Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns | Clive Blackwell, Hong Zhu (eds.) | 2014 | Springer International Publishing | |
2507 | Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach | Armando W. Colombo, Thomas Bangemann, Stamatis Karnouskos, Jerker Delsing, Petr Stluka, Robert Harrison, Francois Jammes, Jose L. Lastra (eds.) | 2014 | Springer International Publishing | |
2508 | Cybersecurity for Executives: A Practical Guide | Gregory J. Touhill, C. Joseph Touhill | 2014 | Wiley-AIChE | |
2509 | Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks | MacDonnell Ulsch | 2014 | Wiley | |
2510 | Cyber Policy in China | Greg Austin | 2014 | Polity | |
2511 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut, Daniel Bachrach | 2014 | Apress | |
2512 | Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition | James E Fitzpatrick; Joseph G Morelli | 2014 | Elsevier/Mosby, CRC Press | |
2513 | Cyber crime and cyber terrorism investigator's handbook | Babak Akhgar; Andrew Staniforth; Francesca Bosco | 2014 | Syngress, , Elsevier Inc | |
2514 | 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy | Daniel G. Bachrach, Eric J. Rzeszut (auth.) | 2014 | Apress | |
2515 | Cyberterrorism: Understanding, Assessment, and Response | Thomas M. Chen, Lee Jarvis, Stuart Macdonald (eds.) | 2014 | Springer-Verlag New York | |
2516 | Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice | Elias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos (eds.) | 2014 | Springer-Verlag New York | |
2517 | Legal Principles for Combatting Cyberlaundering | Daniel Adeoyé Leslie (auth.) | 2014 | Springer International Publishing | |
2518 | Cybersecurity Systems for Human Cognition Augmentation | Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.) | 2014 | Springer International Publishing | |
2519 | Cybersecurity in Switzerland | Myriam Dunn Cavelty (auth.) | 2014 | Springer International Publishing | |
2520 | Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations | Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2521 | Transactions on Computational Science XXIII: Special Issue on Cyberworlds | Marina L. Gavrilova, C. J. Kenneth Tan, Xiaoyang Mao, Lichan Hong (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2522 | Cyber Disobedience: Re://Presenting Online Anarchy | Jeff Shantz, Jordon Tomblin | 2014 | Zero Books | |
2523 | Cyber and Electromagnetic Threats in Modern Relay Protection | Vladimir Gurevich | 2014 | CRC Press | |
2524 | Spam nation: the inside story of organized cybercrime—from global epidemic to your front door | Brian Krebs | 2014 | Sourcebooks | |
2525 | Markets for cybercrime tools and stolen data : hackers' bazaar | Lillian Ablon;Martin C Libicki;Andrea A Golay;Rand Corporation,;Acquisition and Technology Policy Center,;All authors | 2014 | RAND Corporation | |
2526 | Automation, Communication and Cybernetics in Science and Engineering 2013/2014 | Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.) | 2014 | Springer International Publishing | |
2527 | Cyber Defense and Situational Awareness | Alexander Kott, Cliff Wang, Robert F. Erbacher (eds.) | 2014 | Springer International Publishing | |
2528 | Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2014 | Springer International Publishing | |
2529 | Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers | Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (eds.) | 2014 | Springer International Publishing | |
2530 | Machine Learning and Cybernetics: 13th International Conference, Lanzhou, China, July 13-16, 2014. Proceedings | Xizhao Wang, Witold Pedrycz, Patrick Chan, Qiang He (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2531 | Proceedings of the 4th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2014 | D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.) | 2014 | Bukrek | |
2532 | Neocybernetics and Narrative | Bruce Clarke | 2014 | University of Minnesota Press | |
2533 | Spam nation: the inside story of organized cybercrime—from global epidemic to your front door | Brian Krebs | 2014 | Sourcebooks | |
2534 | Spam nation: the inside story of organized cybercrime—from global epidemic to your front door | Brian Krebs | 2014 | Sourcebooks | |
2535 | Cyberbullying: Causes, Consequences, and Coping Strategies | Nicole L. Weber, William V., Jr. Pelfrey | 2014 | Lfb Scholarly Pub Llc | |
2536 | Cyber Attack | Margaret J. Goldstein,Martin Gitlin | 2014 | Lerner Publishing Group;Twenty-First Century Books | |
2537 | Cyber Policy in China | Greg Austin | 2014 | Polity | |
2538 | Labor in the Global Digital Economy: The Cybertariat Comes of Age | Ursula Huws | 2014 | Monthly Review Press | |
2539 | Managing Trust in Cyberspace | Sabu M. Thampi, Bharat Bhargava | 2014 | Taylor & Francis Group, LLC | |
2540 | Cyberwar, Cyberterror, Cybercrime and Cyberactivism | Julie E. Mehan | 2014 | IT Governance Publishing | |
2541 | Data Analysis for Network Cyber-Security | Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard | 2014 | World Scientific Publishing Company | |
2542 | Introduction to US Cybersecurity Careers | Henry Dalziel | 2014 | Syngress | |
2543 | How to Define and Build an Effective Cyber Threat Intelligence Capability | Henry Dalziel, Eric Olson, James Carnall | 2014 | Syngress | |
2544 | Cybersecurity and Cyberwar: What Everyone Needs to Know® | P.W. Singer, Allan Friedman | 2014 | Oxford University Press | |
2545 | Hate Crimes in Cyberspace | Danielle Keats Citron | 2014 | Harvard University Press | |
2546 | Cyber Operations and the Use of Force in International Law | Marco Roscini | 2014 | Oxford University Press | |
2547 | Cyber operations and the use of force in international law | Roscini, Marco | 2014 | Oxford University Press | |
2548 | Cybersecurity and cyberwar : what everyone needs to know | Singer, Peter Warren; Friedman, Allan | 2014 | Oxford University Press | |
2549 | Cybertheology : thinking Christianity in the era of the internet | Spadaro, Antonio; Way, Maria | 2014 | Fordham University Press | |
2550 | Hate crimes in cyberspace | Citron, Danielle Keats | 2014 | Harvard University Press | |
2551 | Neocybernetics and narrative | Clarke, Bruce | 2014 | Univ Of Minnesota Press | |
2552 | The beginning of heaven and Earth has no name : seven days with second-order cybernetics | Heinz von Foerster & Albert Muller & Karl H. Muller & Elinor Rooks & Michael Kasenbacher | 2014 | Fordham University Press | |
2553 | Cyber Security | Voeller, John G. | 2014 | Wiley | |
2554 | Cybercrime and Cyber Warfare | Bernik, Igor | 2014 | Wiley-ISTE | |
2555 | Cyber-War: The Anatomy of the global Security Threat | Julian Richards (auth.) | 2014 | Palgrave Macmillan UK | |
2556 | Cyber Ireland: Text, Image, Culture | Claire Lynch (auth.) | 2014 | Palgrave Macmillan UK | |
2557 | Body, Soul and Cyberspace in Contemporary Science Fiction Cinema: Virtual Worlds and Ethical Problems | Sylvie Magerstädt (auth.) | 2014 | Palgrave Macmillan UK | |
2558 | Cameron’s Conservatives and the Internet: Change, Culture and Cyber Toryism | Anthony Ridge-Newman (auth.) | 2014 | Palgrave Macmillan UK | |
2559 | Applied Cyber-Physical Systems | Bernd J. Krämer (auth.), Sang C. Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu (eds.) | 2014 | Springer-Verlag New York | |
2560 | Network science and cybersecurity | Alexander Kott (auth.), Robinson E. Pino (eds.) | 2014 | Springer-Verlag New York | |
2561 | Cyberspace and International Relations: Theory, Prospects and Challenges | Roxana Radu (auth.), Jan-Frederik Kremer, Benedikt Müller (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2562 | Investigating Internet Crimes. An Introduction to Solving Crimes in Cyberspace | Todd Shipley and Art Bowker (Auth.) | 2014 | Syngress | |
2563 | Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE. Developing Cyber-Physical Systems | Bran Selic and Sébastien Gérard (Auth.) | 2014 | Morgan Kaufmann | |
2564 | Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners | Jason Andress and Steve Winterfeld (Auth.) | 2014 | Syngress | |
2565 | Cybersecurity and Cyberwar: What Everyone Needs to Know | P.W. Singer, Allan Friedman | 2014 | Oxford University Press, USA | |
2566 | Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3, 2013 | Anthony Bonato, Stephen Finbow, Przemyslaw Gordinowicz, Ali Haidar (auth.), G. Sai Sundara Krishnan, R. Anitha, R. S. Lekshmi, M. Senthil Kumar, Anthony Bonato, Manuel Graña (eds.) | 2014 | Springer India | |
2567 | Developments in the Theory and Practice of Cybercartography: Applications and Indigenous Mapping | D.R.Fraser Taylor (Eds.) | 2014 | Elsevier Science | |
2568 | Impacts of Cyberbullying, Building Social and Emotional Resilience in Schools | Sharlene Chadwick (auth.) | 2014 | Springer International Publishing | |
2569 | Computer Network Security and Cyber Ethics, 4th ed. | Joseph Migga Kizza | 2014 | McFarland | |
2570 | Innovative Approaches Towards Low Carbon Economics: Regional Development Cybernetics | Jiuping Xu, Liming Yao, Yi Lu (auth.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2571 | Cybernics: Fusion of human, machine and information systems | Yoshiyuki Sankai, Kenji Suzuki, Yasuhisa Hasegawa (eds.) | 2014 | Springer Japan | |
2572 | Computational Intelligence for Decision Support in Cyber-Physical Systems | Zeashan H Khan, A. B. M. Shawkat Ali, Zahid Riaz (eds.) | 2014 | Springer-Verlag Singapur | |
2573 | Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware | Aditya Sood and Richard Enbody (Auth.) | 2014 | Syngress | |
2574 | Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns | Clive Blackwell, Hong Zhu (eds.) | 2014 | Springer International Publishing | |
2575 | Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach | Armando W. Colombo, Thomas Bangemann, Stamatis Karnouskos, Jerker Delsing, Petr Stluka, Robert Harrison, Francois Jammes, Jose L. Lastra (eds.) | 2014 | Springer International Publishing | |
2576 | Cybersecurity for Executives: A Practical Guide | Gregory J. Touhill, C. Joseph Touhill | 2014 | Wiley-AIChE | |
2577 | Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks | MacDonnell Ulsch | 2014 | Wiley | |
2578 | Cyber Policy in China | Greg Austin | 2014 | Polity | |
2579 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut, Daniel Bachrach | 2014 | Apress | |
2580 | Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition | James E Fitzpatrick; Joseph G Morelli | 2014 | Elsevier/Mosby, CRC Press | |
2581 | Cyber crime and cyber terrorism investigator's handbook | Babak Akhgar; Andrew Staniforth; Francesca Bosco | 2014 | Syngress, , Elsevier Inc | |
2582 | 10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy | Daniel G. Bachrach, Eric J. Rzeszut (auth.) | 2014 | Apress | |
2583 | Cyberterrorism: Understanding, Assessment, and Response | Thomas M. Chen, Lee Jarvis, Stuart Macdonald (eds.) | 2014 | Springer-Verlag New York | |
2584 | Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice | Elias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos (eds.) | 2014 | Springer-Verlag New York | |
2585 | Legal Principles for Combatting Cyberlaundering | Daniel Adeoyé Leslie (auth.) | 2014 | Springer International Publishing | |
2586 | Cybersecurity Systems for Human Cognition Augmentation | Robinson E. Pino, Alexander Kott, Michael Shevenell (eds.) | 2014 | Springer International Publishing | |
2587 | Cybersecurity in Switzerland | Myriam Dunn Cavelty (auth.) | 2014 | Springer International Publishing | |
2588 | Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations | Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2589 | Transactions on Computational Science XXIII: Special Issue on Cyberworlds | Marina L. Gavrilova, C. J. Kenneth Tan, Xiaoyang Mao, Lichan Hong (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2590 | Cyber Disobedience: Re://Presenting Online Anarchy | Jeff Shantz, Jordon Tomblin | 2014 | Zero Books | |
2591 | Cyber and Electromagnetic Threats in Modern Relay Protection | Vladimir Gurevich | 2014 | CRC Press | |
2592 | Spam nation: the inside story of organized cybercrime—from global epidemic to your front door | Brian Krebs | 2014 | Sourcebooks | |
2593 | Markets for cybercrime tools and stolen data : hackers' bazaar | Lillian Ablon;Martin C Libicki;Andrea A Golay;Rand Corporation,;Acquisition and Technology Policy Center,;All authors | 2014 | RAND Corporation | |
2594 | Automation, Communication and Cybernetics in Science and Engineering 2013/2014 | Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.) | 2014 | Springer International Publishing | |
2595 | Cyber Defense and Situational Awareness | Alexander Kott, Cliff Wang, Robert F. Erbacher (eds.) | 2014 | Springer International Publishing | |
2596 | Cyber Security and Privacy: Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers | Frances Cleary, Massimo Felici (eds.) | 2014 | Springer International Publishing | |
2597 | Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers | Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili (eds.) | 2014 | Springer International Publishing | |
2598 | Machine Learning and Cybernetics: 13th International Conference, Lanzhou, China, July 13-16, 2014. Proceedings | Xizhao Wang, Witold Pedrycz, Patrick Chan, Qiang He (eds.) | 2014 | Springer-Verlag Berlin Heidelberg | |
2599 | Proceedings of the 4th International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2014 | D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.) | 2014 | Bukrek | |
2600 | Neocybernetics and Narrative | Bruce Clarke | 2014 | University of Minnesota Press | |
2601 | Spam nation: the inside story of organized cybercrime—from global epidemic to your front door | Brian Krebs | 2014 | Sourcebooks | |
2602 | Spam nation: the inside story of organized cybercrime—from global epidemic to your front door | Brian Krebs | 2014 | Sourcebooks | |
2603 | Cyberbullying: Causes, Consequences, and Coping Strategies | Nicole L. Weber, William V., Jr. Pelfrey | 2014 | Lfb Scholarly Pub Llc | |
2604 | Cyber Attack | Margaret J. Goldstein,Martin Gitlin | 2014 | Lerner Publishing Group;Twenty-First Century Books | |
2605 | Cyber Policy in China | Greg Austin | 2014 | Polity | |
2606 | Labor in the Global Digital Economy: The Cybertariat Comes of Age | Ursula Huws | 2014 | Monthly Review Press | |
2607 | Managing Trust in Cyberspace | Sabu M. Thampi, Bharat Bhargava | 2014 | Taylor & Francis Group, LLC | |
2608 | Cyberwar, Cyberterror, Cybercrime and Cyberactivism | Julie E. Mehan | 2014 | IT Governance Publishing | |
2609 | Data Analysis for Network Cyber-Security | Niall Adams, Nicholas Heard, Niall Adams, Nicholas Heard | 2014 | World Scientific Publishing Company | |
2610 | Introduction to US Cybersecurity Careers | Henry Dalziel | 2014 | Syngress | |
2611 | How to Define and Build an Effective Cyber Threat Intelligence Capability | Henry Dalziel, Eric Olson, James Carnall | 2014 | Syngress | |
2612 | Cybersecurity and Cyberwar: What Everyone Needs to Know® | P.W. Singer, Allan Friedman | 2014 | Oxford University Press | |
2613 | Hate Crimes in Cyberspace | Danielle Keats Citron | 2014 | Harvard University Press | |
2614 | Cyber Operations and the Use of Force in International Law | Marco Roscini | 2014 | Oxford University Press | |
2615 | Cyber operations and the use of force in international law | Roscini, Marco | 2014 | Oxford University Press | |
2616 | Cybersecurity and cyberwar : what everyone needs to know | Singer, Peter Warren; Friedman, Allan | 2014 | Oxford University Press | |
2617 | Cybertheology : thinking Christianity in the era of the internet | Spadaro, Antonio; Way, Maria | 2014 | Fordham University Press | |
2618 | Hate crimes in cyberspace | Citron, Danielle Keats | 2014 | Harvard University Press | |
2619 | Neocybernetics and narrative | Clarke, Bruce | 2014 | Univ Of Minnesota Press | |
2620 | The beginning of heaven and Earth has no name : seven days with second-order cybernetics | Heinz von Foerster & Albert Muller & Karl H. Muller & Elinor Rooks & Michael Kasenbacher | 2014 | Fordham University Press | |
2621 | Cyber Security | Voeller, John G. | 2014 | Wiley | |
2622 | Cybercrime and Cyber Warfare | Bernik, Igor | 2014 | Wiley-ISTE | |
2623 | Cyber-War: The Anatomy of the global Security Threat | Julian Richards (auth.) | 2014 | Palgrave Macmillan UK | |
2624 | Cyber Ireland: Text, Image, Culture | Claire Lynch (auth.) | 2014 | Palgrave Macmillan UK | |
2625 | Body, Soul and Cyberspace in Contemporary Science Fiction Cinema: Virtual Worlds and Ethical Problems | Sylvie Magerstädt (auth.) | 2014 | Palgrave Macmillan UK | |
2626 | Cameron’s Conservatives and the Internet: Change, Culture and Cyber Toryism | Anthony Ridge-Newman (auth.) | 2014 | Palgrave Macmillan UK | |
2627 | Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks | MacDonnell Ulsch | 2014 | Wiley | |
2628 | Cybersecurity for Executives: A Practical Guide | Gregory J. Touhill, C. Joseph Touhill | 2014 | Wiley | |
2629 | Cyberactivism on the Participatory Web | Martha McCaughey; (ed.) | 2014 | Routledge | |
2630 | Cyber Self-Defense Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying | Alexis Moore, Laurie Edwards | 2014 | Lyons Press | |
2631 | Feminist Cyberethics in Asia: Religious Discourses on Human Connectivity | Agnes M. Brazal, Kochurani Abraham (eds.) | 2014 | Palgrave Macmillan US | |
2632 | Cyber-War: The Anatomy of the global Security Threat | Julian Richards (auth.) | 2014 | Palgrave Macmillan UK | |
2633 | Sex, Drugs and Tessellation: The truth about Virtual Reality, as revealed in the pages of CyberEdge Journal | Ben Delaney | 2014 | CyberEdge Information Services | |
2634 | Implementing the NIST : cybersecurity Framework | | 2014 | ISACA | |
2635 | Computer Forensics: Cybercriminals, Laws, and Evidence | Marie-Helen Maras | 2014 | Jones & Bartlett Learning | |
2636 | Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door | Brian Krebs | 2014 | Sourcebooks | |
2637 | CANSO Cyber Security and Risk Assessment Guide | coll. | 2014 | Civil Air Navigation Services Organisation | |
2638 | Cyber-attacks: Effects on UK Companies | anon. | 2014 | CPNI, Oxford Economics | |
2639 | Helixtrolysis: Cyberology & the Joycean Machine | Louis Armand | 2014 | Charles University | |
2640 | Cybersecurity Leadership: Powering the Modern Organization | Mansur Hasib | 2014 | Tomorrow’s Strategy Today, LLC | |
2641 | Cyber Disobedience: Re://Presenting Online Anarchy | Jeff Shantz, Jordon Tomblin | 2014 | Zero Books | |
2642 | 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy | Eric J. Rzeszut & Daniel G. Bachrach | 2014 | Friends of ED/Apress | |
2643 | Cyber Crime and Cyber Terrorism Investigator's Handbook | Babak Akhgar; Andrew Staniforth; Francesca Bosco | 2014 | Syngress | |
2644 | Implementing the NIST Cybersecurity Framework | ISACA | 2014 | ISACA | |
2645 | Neocybernetics and Narrative | Bruce Clarke | 2014 | University of Minnesota Press | |
2646 | Labor in the Global Digital Economy: The Cybertariat Comes of Age | Huws, Ursula | 2014 | Monthly Review Press | |
2647 | 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy | Eric Rzeszut; Daniel Bachrach | 2014 | Apress | |
2648 | Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns | Blackwell, Clive;Zhu, Hong | 2014 | Springer International Publishing | |
2649 | Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns | Blackwell, Clive;Zhu, Hong | 2014 | Springer International Publishing | |
2650 | Cyberterrorism: understanding, assessment, and response | Chen, Thomas M.;Jarvis, Lee;Macdonald, Stuart | 2014 | Springer | |
2651 | Industrial cloud-based cyber-physical systems: the IMC-AESOP approach | Colombo, Armando W | 2014 | Springer | |
2652 | No Dogs in Philly: A Cyberpunk Noir | Futuro, Andy | 2014 | June Day Press | |
2653 | Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying | Alexis Moore;Laurie J. Edwards | 2014 | Lyons Press | |
2654 | Neocybernetics and Narrative | Clarke, Bruce | 2014 | University of Minnesota Press | |
2655 | Cybernetic Brain: Sketches of Another Future | Pickering, Andrew | 2014 | University of Chicago Press | |
2656 | Rhetoric and Ethics in the Cybernetic Age: The Transhuman Condition | Pruchnic, Jeff | 2014 | Taylor and Francis;Routledge | |
2657 | Cyber security and IT infrastructure protection | Vacca, John R | 2014 | Syngress | |
2658 | Spam Nation: The Inside Story Of Organized Cybercrime—From Global Epidemic To Your Front Door | Brian Krebs | 2014 | Sourcebooks | |
2659 | Labor in the global digital economy the cybertariat comes of age | Huws, Ursula | 2014 | Monthly Review Press | |
2660 | Cyber Reconnaissance, Surveillance and Defense | Robert Shimonski | 2014 | Syngress | |
2661 | Security in Cyberspace: Targeting Nations, Infrastructures, Individuals | Giampiero Giacomello (editor) | 2014 | Bloomsbury Academic | |
2662 | Cybertheology: Thinking Christianity in the Era of the Internet | Antonio Spadaro; Maria Way | 2014 | Fordham University Press | |
2663 | Cyber Crime and Cyber Terrorism Investigator's Handbook | Babak Akhgar (editor), Andrew Staniforth (editor), Francesca Bosco (editor) | 2014 | Syngress | |
2664 | How to Define and Build an Effective Cyber Threat Intelligence Capability | Henry Dalziel, Eric Olson (editor), James Carnall (editor) | 2014 | Syngress | |
2665 | Cyber Blockades | Alison Lawlor Russell | 2014 | Georgetown University Press | |
2666 | Cybercrime: Investigating High-Technology Computer Crime | Robert Moore | 2014 | Routledge | |
2667 | Extreme Mean: Ending Cyberabuse at Work, School, and Home | Paula Todd | 2014 | McClelland & Stewart | |
2668 | Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying | Sameer Hinduja, Justin W. Patchin | 2014 | SAGE Publications | |
2669 | Visions of War: Picturing Warfare from the Stone Age to the Cyber Age | David D. Perlmutter | 2014 | St. Martin's Publishing Group | |
2670 | Nation as Network: Diaspora, Cyberspace, and Citizenship | Victoria Bernal | 2014 | University of Chicago Press | |
2671 | Cybercrime and Cyber Warfare | Igor Bernik | 2014 | Wiley-ISTE | |
2672 | Security in Cyberspace: Targeting Nations, Infrastructures, Individuals | Giampiero Giacomello (editor) | 2014 | Bloomsbury Academic | |
2673 | Computer Forensics: Cybercriminals, Laws, and Evidence | Marie-Helen Maras | 2014 | Jones & Bartlett Learning | |
2674 | Computer Forensics: Cybercriminals, Laws, and Evidence | Marie-Helen Maras | 2014 | Jones & Bartlett Learning | |
2675 | The Emergence of EU Criminal Law: Cybercrime and the Regulation of the Information Society | Sarah Summers; Christian Schwarzenegger; Gian Ege; Finlay Young | 2014 | Hart Publishing | |
2676 | Helixtrolysis: Cyberology & the Joycean "Tyrondynamon Machine" | Louis Armand | 2014 | Litteraria Pragensia | |
2677 | Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex | Bill Blunden; Violet Cheung | 2014 | Trine Day | |
2678 | Cyber Security and Resiliency Policy Framework | A. Vaseashta; P. Susmann; E. Braman | 2014 | IOS Press, Incorporated | |
2679 | Nation as Network: Diaspora, Cyberspace, and Citizenship | Victoria Bernal | 2014 | University of Chicago Press | |
2680 | The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces | Christopher Paul; III Isaac R. Porche; Elliot Axelband | 2014 | RAND Corporation, The | |
2681 | At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues | National Research Council; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work; Herbert S. Lin; Thomas Berson; David Clark | 2014 | National Academies Press | |
2682 | Hate Crimes in Cyberspace | Danielle Keats Citron | 2014 | Harvard University Press | |
2683 | Cybertheology: Thinking Christianity in the Era of the Internet | Antonio Spadaro; Maria Way | 2014 | Fordham University Press | |
2684 | Cybersecurity and Cyberwar | P.W. Singer | 2014 | | |
2685 | Cyber attacks: protecting national infrastructure | Vacca, John R.;Amoroso, Edward G | 2013 | Elsevier Science;Butterworth-Heinemann | |
2686 | Dr. Ecco's cyberpuzzles: 36 puzzles for hackers and other mathematical detectives | Shasha, Dennis Elliott | 2013 | W. W. Norton & Company | |
2687 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
2688 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2689 | Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp and Raj Samani (Auth.) | 2013 | Syngress | |
2690 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Maurizio Martellini | 2013 | Springer | |
2691 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
2692 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
2693 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2694 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2695 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco | 2013 | CRC Press | |
2696 | Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology Policies | Richard Phillips, Rayton R. Sianjina | 2013 | Routledge | |
2697 | Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects | Brett Shavers | 2013 | Syngress | |
2698 | Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects | Brett Shavers | 2013 | Syngress | |
2699 | Black code: Inside the battle for cyberspace | Ronald J. Deibert | 2013 | Signal | |
2700 | Control of Cyber-Physical Systems: Workshop held at Johns Hopkins University, March 2013 | Matthew Hartman, Anantharaman Subbaraman, Andrew R. Teel (auth.), Danielle C. Tarraf (eds.) | 2013 | Springer International Publishing | |
2701 | Proceedings of the 2012 International Conference on Cybernetics and Informatics | Qingyun Luo, Jinguo Zhao (auth.), Shaobo Zhong (eds.) | 2013 | Springer-Verlag New York | |
2702 | Cybernetic Approach to Project Management | Bogdan Lent (auth.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2703 | Counterterrorism and cybersecurity: total information awareness | Newton Lee (auth.) | 2013 | Springer New York | |
2704 | Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings | Kun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2705 | Visual Mathematics and Cyberlearning | Keith Jones, Eirini Geraniou, Thanassis Tiropanis (auth.), Dragana Martinovic, Viktor Freiman, Zekeriya Karadag (eds.) | 2013 | Springer Netherlands | |
2706 | Automation, Communication and Cybernetics in Science and Engineering 2011/2012 | Ursula Bach, Ingo Leisten (auth.), Sabina Jeschke, Ingrid Isenhardt, Frank Hees, Klaus Henning (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2707 | Introduction to cyber-warfare: a multidisciplinary approach | Paulo Shakarian, Jana Shakarian, Andrew Ruef | 2013 | Elsevier / Syngress | |
2708 | Introduction to cyber-warfare: a multidisciplinary approach | Paulo Shakarian, Jana Shakarian, Andrew Ruef | 2013 | Elsevier / Syngress | |
2709 | Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers | Keyun Ruan, Joe Carthy (auth.), Marcus Rogers, Kathryn C. Seigfried-Spellar (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2710 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
2711 | Cyberpunk Women, Feminism and Science Fiction: A Critical Study | Carlen Lavigne | 2013 | McFarland | |
2712 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2713 | Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp and Raj Samani (Auth.) | 2013 | Syngress | |
2714 | Black Code: Inside the Battle for Cyberspace | Ronald J. Deibert | 2013 | Signal | |
2715 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Maurizio Martellini | 2013 | Springer | |
2716 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
2717 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
2718 | Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard | Brett Shavers | 2013 | Syngress | |
2719 | Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | Thomas J. Mowbray | 2013 | Wiley | |
2720 | Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard | Brett Shavers | 2013 | Syngress | |
2721 | Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings | Jan-Min Chen (auth.), Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan (eds.) | 2013 | Springer International Publishing | |
2722 | Transactions on Computational Science XVIII: Special Issue on Cyberworlds | Evangelos Zotos, Rainer Herpers (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Arjan Kuijper (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2723 | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace | Todd Shipley, Art Bowker, Nick Selby | 2013 | Syngress | |
2724 | Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013 | D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.) | 2013 | Bukrek | |
2725 | Counterterrorism and Cybersecurity: Total Information Awareness | Newton Lee (auth.) | 2013 | Springer New York | |
2726 | Culture contact in Evenki land : a cybernetic anthropology of the Baikal Region | by Tatiana Safonova and Istva´n Sa´ntha. | 2013 | Brill | |
2727 | Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | Thomas J. Mowbray | 2013 | Wiley | |
2728 | Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | Thomas J. Mowbray | 2013 | Wiley | |
2729 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2730 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2731 | Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | 2013 | Syngress | |
2732 | Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | 2013 | Syngress | |
2733 | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace | Todd Shipley, Art Bowker, Nick Selby | 2013 | Syngress | |
2734 | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace | Todd Shipley, Art Bowker, Nick Selby | 2013 | Syngress | |
2735 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco | 2013 | CRC Press | |
2736 | Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World | Paul Rosenzweig | 2013 | Praeger | |
2737 | Cybernetic approach to project management | Bogdan Lent (auth.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2738 | Conflict and Cooperation in Cyberspace: The Challenge to National Security | Panayotis A Yannakogeorgos, Adam B Lowther | 2013 | CRC Press | |
2739 | Cyber Power: Crime, Conflict and Security in Cyberspace | Solange Ghernaouti-Helie | 2013 | EPFL Press,CRC Press | |
2740 | Cyber-Physical Systems: Integrated Computing and Engineering Design | Fei Hu | 2013 | CRC Press | |
2741 | Managing Trust in Cyberspace | Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey | 2013 | Chapman and Hall/CRC | |
2742 | Cybersexism: Sex, Gender and Power on the Internet | Laurie Penny | 2013 | Bloomsbury Publishing | |
2743 | Cyber War Will Not Take Place | Thomas Rid | 2013 | Oxford University Press | |
2744 | Cyberpunk: Stories of Hardware, Software, Wetware, Evolution, and Revolution | Pat Cadigan, Benjamin Parzybok, William Gibson, Jonathan Lethem, Greg Bear, Mark Teppo, Cory Doctorow, Cat Rambo, Kim Stanley Robinson, Bruce Sterling, Victoria Blake | 2013 | Underland Press | |
2745 | Words Wound. Delete Cyberbullying and Make Kindness Go Viral | Justin Patchin, Ph.D.,Sameer Hinduja, Ph.D. | 2013 | Free Spirit Publishing | |
2746 | The ABA Cybersecurity Handbook. A Resource for Attorneys, Law Firms, and Business Professionals | Jill D. Rhodes,Vincent I. Polley | 2013 | National Book Network (NBN);American Bar Association | |
2747 | Bullying Workbook for Teens. Activities to Help You Deal with Social Aggression and Cyberbullying | Julia V. Taylor,Raychelle Cassada Lohmann,Haley Kilpatrick | 2013 | New Harbinger Publications;Instant Help | |
2748 | Access Controlled. The Shaping of Power, Rights, and Rule in Cyberspace | Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 18.01.2013Street date: 28.02.2014 | 2013 | MIT Press | |
2749 | How Serious a Problem Is Cyberbullying? | Patricia D. Netzley | 2013 | ReferencePoint Press | |
2750 | Rhetoric and Ethics in the Cybernetic Age: The Transhuman Condition | Jeff Pruchnic | 2013 | Routledge | |
2751 | Rhetoric and Ethics in the Cybernetic Age: The Transhuman Condition | Jeff Pruchnic | 2013 | Routledge | |
2752 | Transforming Cybersecurity: Using COBIT 5 | Isaca | 2013 | Isaca | |
2753 | Digital whoness : identity, privacy and freedom in the cyberworld | Capurro, Rafael; Eldred, Michael; Nagel, Daniel | 2013 | Ontos Verlag | |
2754 | Computer Forensics and Cyber Crime An Introduction, 3rd Edition | Marjie T. Britz | 2013 | PEARSON | |
2755 | Introduction to computer networks and cybersecurity | Irwin, J. David; Wu, Chwan-Hwa | 2013 | CRC Press | |
2756 | Cyber War Will Not Take Place | Thomas Rid | 2013 | Oxford University Press | |
2757 | Annual review of cybertherapy and telemedicine. 2013 : positive technology and health engagement for health living and active ageing | Riva, Giuseppe; Wiederhold, B. K. | 2013 | IOS Press | |
2758 | Blackhatonomics : an inside look at the economics of cybercrime | Will Gragido & Johnl Pirc & Nick Selby & Daniel Molina | 2013 | Elsevier Inc.;Syngress | |
2759 | Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology Policies | Richard Phillips, Rayton R. Sianjina | 2013 | Routledge | |
2760 | Cybercrime and Cybersecurity in the Global South | Nir Kshetri (auth.) | 2013 | Palgrave Macmillan UK | |
2761 | Cybersecurity Enhancement Act of 2013 : report (to accompany H.R. 756) (including cost estimate of the Congressional Budget Office) | | 2013 | [U.S. G.P.O.] | |
2762 | Introduction to cyber-warfare: a multidisciplinary approach | Paulo Shakarian, Jana Shakarian, Andrew Ruef | 2013 | Elsevier / Syngress | |
2763 | Introduction to cyber-warfare: a multidisciplinary approach | Paulo Shakarian, Jana Shakarian, Andrew Ruef | 2013 | Elsevier / Syngress | |
2764 | Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers | Keyun Ruan, Joe Carthy (auth.), Marcus Rogers, Kathryn C. Seigfried-Spellar (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2765 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
2766 | Cyberpunk Women, Feminism and Science Fiction: A Critical Study | Carlen Lavigne | 2013 | McFarland | |
2767 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2768 | Applied Cyber Security and the Smart Grid. Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp and Raj Samani (Auth.) | 2013 | Syngress | |
2769 | Black Code: Inside the Battle for Cyberspace | Ronald J. Deibert | 2013 | Signal | |
2770 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Maurizio Martellini | 2013 | Springer | |
2771 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
2772 | Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure | Eric D. Knapp, Raj Samani | 2013 | Syngress | |
2773 | Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard | Brett Shavers | 2013 | Syngress | |
2774 | Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | Thomas J. Mowbray | 2013 | Wiley | |
2775 | Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard | Brett Shavers | 2013 | Syngress | |
2776 | Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings | Jan-Min Chen (auth.), Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan (eds.) | 2013 | Springer International Publishing | |
2777 | Transactions on Computational Science XVIII: Special Issue on Cyberworlds | Evangelos Zotos, Rainer Herpers (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Arjan Kuijper (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2778 | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace | Todd Shipley, Art Bowker, Nick Selby | 2013 | Syngress | |
2779 | Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013 | D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.) | 2013 | Bukrek | |
2780 | Counterterrorism and Cybersecurity: Total Information Awareness | Newton Lee (auth.) | 2013 | Springer New York | |
2781 | Culture contact in Evenki land : a cybernetic anthropology of the Baikal Region | by Tatiana Safonova and Istva´n Sa´ntha. | 2013 | Brill | |
2782 | Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | Thomas J. Mowbray | 2013 | Wiley | |
2783 | Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions | Thomas J. Mowbray | 2013 | Wiley | |
2784 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2785 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2786 | Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | 2013 | Syngress | |
2787 | Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | 2013 | Syngress | |
2788 | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace | Todd Shipley, Art Bowker, Nick Selby | 2013 | Syngress | |
2789 | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace | Todd Shipley, Art Bowker, Nick Selby | 2013 | Syngress | |
2790 | What Every Engineer Should Know About Cyber Security and Digital Forensics | Joanna F. DeFranco | 2013 | CRC Press | |
2791 | Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World | Paul Rosenzweig | 2013 | Praeger | |
2792 | Cybernetic approach to project management | Bogdan Lent (auth.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2793 | Conflict and Cooperation in Cyberspace: The Challenge to National Security | Panayotis A Yannakogeorgos, Adam B Lowther | 2013 | CRC Press | |
2794 | Cyber Power: Crime, Conflict and Security in Cyberspace | Solange Ghernaouti-Helie | 2013 | EPFL Press,CRC Press | |
2795 | Cyber-Physical Systems: Integrated Computing and Engineering Design | Fei Hu | 2013 | CRC Press | |
2796 | Managing Trust in Cyberspace | Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey | 2013 | Chapman and Hall/CRC | |
2797 | Cybersexism: Sex, Gender and Power on the Internet | Laurie Penny | 2013 | Bloomsbury Publishing | |
2798 | Cyber War Will Not Take Place | Thomas Rid | 2013 | Oxford University Press | |
2799 | Cyberpunk: Stories of Hardware, Software, Wetware, Evolution, and Revolution | Pat Cadigan, Benjamin Parzybok, William Gibson, Jonathan Lethem, Greg Bear, Mark Teppo, Cory Doctorow, Cat Rambo, Kim Stanley Robinson, Bruce Sterling, Victoria Blake | 2013 | Underland Press | |
2800 | Words Wound. Delete Cyberbullying and Make Kindness Go Viral | Justin Patchin, Ph.D.,Sameer Hinduja, Ph.D. | 2013 | Free Spirit Publishing | |
2801 | The ABA Cybersecurity Handbook. A Resource for Attorneys, Law Firms, and Business Professionals | Jill D. Rhodes,Vincent I. Polley | 2013 | National Book Network (NBN);American Bar Association | |
2802 | Bullying Workbook for Teens. Activities to Help You Deal with Social Aggression and Cyberbullying | Julia V. Taylor,Raychelle Cassada Lohmann,Haley Kilpatrick | 2013 | New Harbinger Publications;Instant Help | |
2803 | Access Controlled. The Shaping of Power, Rights, and Rule in Cyberspace | Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 18.01.2013Street date: 28.02.2014 | 2013 | MIT Press | |
2804 | How Serious a Problem Is Cyberbullying? | Patricia D. Netzley | 2013 | ReferencePoint Press | |
2805 | Rhetoric and Ethics in the Cybernetic Age: The Transhuman Condition | Jeff Pruchnic | 2013 | Routledge | |
2806 | Rhetoric and Ethics in the Cybernetic Age: The Transhuman Condition | Jeff Pruchnic | 2013 | Routledge | |
2807 | Transforming Cybersecurity: Using COBIT 5 | Isaca | 2013 | Isaca | |
2808 | Digital whoness : identity, privacy and freedom in the cyberworld | Capurro, Rafael; Eldred, Michael; Nagel, Daniel | 2013 | Ontos Verlag | |
2809 | Computer Forensics and Cyber Crime An Introduction, 3rd Edition | Marjie T. Britz | 2013 | PEARSON | |
2810 | Introduction to computer networks and cybersecurity | Irwin, J. David; Wu, Chwan-Hwa | 2013 | CRC Press | |
2811 | Cyber War Will Not Take Place | Thomas Rid | 2013 | Oxford University Press | |
2812 | Annual review of cybertherapy and telemedicine. 2013 : positive technology and health engagement for health living and active ageing | Riva, Giuseppe; Wiederhold, B. K. | 2013 | IOS Press | |
2813 | Blackhatonomics : an inside look at the economics of cybercrime | Will Gragido & Johnl Pirc & Nick Selby & Daniel Molina | 2013 | Elsevier Inc.;Syngress | |
2814 | Cyber Security for Educational Leaders: A Guide to Understanding and Implementing Technology Policies | Richard Phillips, Rayton R. Sianjina | 2013 | Routledge | |
2815 | Cybercrime and Cybersecurity in the Global South | Nir Kshetri (auth.) | 2013 | Palgrave Macmillan UK | |
2816 | Cybersecurity Enhancement Act of 2013 : report (to accompany H.R. 756) (including cost estimate of the Congressional Budget Office) | | 2013 | [U.S. G.P.O.] | |
2817 | Cyber Security and IT Infrastructure Protection | John R. Vacca | 2013 | Syngress | |
2818 | Information Spaces The Architecture of Cyberspace | Robert M. Colomb | 2013 | Springer | |
2819 | Tallinn Manual on the International Law Applicable to Cyber Warfare | Michael N. Schmitt | 2013 | Cambridge University Press | |
2820 | Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE. Developing Cyber-Physical Systems | Bran Selic, Sebastien Gerard | 2013 | Morgan Kaufmann | |
2821 | Cybersecurity in Our Digital Lives | Mowbray, Thomas J; LeClair, Jane | 2013 | John Wiley & Sons, Inc. | |
2822 | Technobiophilia: Nature and Cyberspace | Sue Thomas | 2013 | Bloomsbury Academic | |
2823 | Cybersecurity | Mowbray, Thomas J. | 2013 | Wiley | |
2824 | Cyber Warfare | Andress, Jason;Winterfeld, Steve | 2013 | Syngress | |
2825 | Holistic darwinism: synergy, cybernetics, and the bioeconomics of evolution | Corning, Peter A | 2013 | University of Chicago Press | |
2826 | Cyberpunk: stories of hardware, software, wetware, evolution and revolution | Blake, Victoria | 2013 | Underland Press | |
2827 | Cyberpunk: Stories of Hardware, Software, Wetware, Evolution, and Revolution | Blake,Victoria | 2013 | Resurrection House | |
2828 | Black code: inside the battle for cyberspace | Deibert, Ronald, J | 2013 | McClelland & Stewart | |
2829 | Digital Whoness: Identity, Privacy And Freedom In The Cyberworld | Rafael Capurro, Michael Eldred, Daniel Nagel | 2013 | De Gruyter | |
2830 | Glass houses: privacy, secrecy, and cyber insecurity in a transparent world | Brenner, Joel | 2013 | Penguin Group US | |
2831 | Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers | Francesco Di Cerbo, Pascal Bisson, Alan Hartman, Sebastien Keller, Per Håkon Meland (auth.), Massimo Felici (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2832 | Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings | Kun Peng, Matt Henricksen (auth.), Lorenzo Cavallaro, Dieter Gollmann (eds.) | 2013 | Springer-Verlag Berlin Heidelberg | |
2833 | Cyber Security: Deterrence and IT Protection for Critical Infrastructures | Sandro Gaycken, Maurizio Martellini (auth.), Maurizio Martellini (eds.) | 2013 | Springer International Publishing | |
2834 | The Information Society Cyber Dreams and Digital Nightmares | Hassan, Robert | 2013 | John Wiley & Sons | |
2835 | The Information Society: Cyber Dreams and Digital Nightmares | Hassan, Robert | 2013 | Wiley | |
2836 | Counterterrorism and cybersecurity: total information awareness | Lee, Newton | 2013 | Springer | |
2837 | The bullying workbook for teens: activities to help you deal with social aggression and cyberbullying | Lohmann, Raychelle Cassada;Taylor, Julia V | 2013 | New Harbinger Publications;Instant Help Books | |
2838 | Technobiophilia: Nature And Cyberspace | Sue Thomas | 2013 | Bloomsbury Academic | |
2839 | Cyber Warfare | Rosenzweig, Paul | 2013 | ABC-CLIO, LLC | |
2840 | Computer Forensics and Cyber Crime: An Introduction | Britz, Marjie | 2013 | Pearson | |
2841 | Introduction to Cyber-Warfare: A Multidisciplinary Approach [Lingua inglese] | Dr. Paulo Shakarian | 2013 | Syngress | |
2842 | Love and Empire: Cybermarriage and Citizenship Across the Americas | Felicity Amaya Schaeffer | 2013 | New York University Press | |
2843 | Zero Day: The Threat In Cyberspace | Robert O'Harrow | 2013 | Diversion Books | |
2844 | No More Victims: Protecting Those with Autism from Cyber Bullying, Internet Predators & ... | Jed Baker | 2013 | BookBaby | |
2845 | Tallinn Manual on the International Law Applicable to Cyber Warfare | Michael N. Schmitt | 2013 | Cambridge University Press | |
2846 | Technobiophilia: Nature and cyberspace | Sue Thomas | 2013 | Bloomsbury Academic | |
2847 | Cyber Hacking: Wars in Virtual Space | Scientific American | 2013 | Scientific American | |
2848 | Advances in Cyber Security : Technology, Operations, and Experiences | D. Frank Hsu; Dorothy Marinucci | 2013 | Fordham University Press | |
2849 | Cybercrime | Noah Berlatsky | 2013 | Greenhaven Publishing LLC | |
2850 | The Politics of the Internet: Political Claims-making in Cyberspace and Its Effect on Modern Political Activism | R.J. Maratea | 2013 | Lexington Books | |
2851 | The Beginning of Heaven and Earth Has No Name: Seven Days with Second-Order Cybernetics | Heinz von Foerster (editor); Albert Müller (editor); Karl H. Müller (editor); Elinor Rooks (editor); Michael Kasenbacher (editor) | 2013 | Fordham University Press | |
2852 | Cyberprotest: Environmental activism online | Jenny Pickerill | 2013 | Manchester University Press | |
2853 | Cyber Law & Cyber Crimes: Information Technology Act, 2000 with New IT Rules: e-Contracts, Software Piracy, Cloud Computing, IPR in Cyber World, Electronic Evidence, Forensics & Investigation, Reasonable Security Practices & Case Laws | Prashant Mali | 2013 | Snow White | |
2854 | Cyber security policy guidebook | Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss | 2012 | Wiley | |
2855 | FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security | Stephen D. Gantz and Daniel R. Philpott (Eds.) | 2012 | Syngress | |
2856 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2857 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2858 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2859 | Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems | Christophe Tricaud, YangQuan Chen (auth.) | 2012 | Springer-Verlag London | |
2860 | We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency | Parmy Olson | 2012 | Little, Brown and Company | |
2861 | We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency | Parmy Olson | 2012 | Little, Brown and Company | |
2862 | Network Forensics: Tracking Hackers through Cyberspace | Sherri Davidoff, Jonathan Ham | 2012 | Prentice Hall | |
2863 | Network Forensics: Tracking Hackers through Cyberspace | Sherri Davidoff, Jonathan Ham | 2012 | Prentice Hall | |
2864 | Cyber crime and the victimization of women : laws, rights and regulations | Debarati Halder; K Jaishankar | 2012 | Information Science Reference | |
2865 | Cyberbullying prevention and response : expert perspectives | Justin W Patchin; Sameer Hinduja | 2012 | Routledge | |
2866 | Cyberpolitics in International Relations | Nazli Choucri | 2012 | The MIT Press | |
2867 | Blackhatonomics: An Inside Look at the Economics of Cybercrime | Will Gragido, Daniel Molina, John Pirc, Nick Selby | 2012 | Syngress | |
2868 | Blackhatonomics: An Inside Look at the Economics of Cybercrime | Will Gragido, Daniel Molina, John Pirc, Nick Selby | 2012 | Syngress | |
2869 | Cyber security policy guidebook | Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus Sachs, Jeffrey Schmidt, Joseph Weiss | 2012 | Wiley | |
2870 | Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems | Christophe Tricaud, YangQuan Chen (auth.) | 2012 | Springer-Verlag London | |
2871 | Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia: Volume 1: Intelligent Control and Network Communication | Shuqin Zhao, Yucui Guo, Shang Lv (auth.), Liangzhong Jiang (eds.) | 2012 | Springer-Verlag Berlin Heidelberg | |
2872 | Proceedings of the 2011, International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19–20, 2011, Melbourne, Australia: Volume 2: Information Systems and Computer Engineering | Zhengwei Zhu, Zongwen Chen (auth.), Liangzhong Jiang (eds.) | 2012 | Springer-Verlag Berlin Heidelberg | |
2873 | Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19–20, 2011, Melbourne, Australia: Volume 3: Computer Networks and Electronic Engineering | Li Siming, Wang Huaiqing (auth.), Liangzhong Jiang (eds.) | 2012 | Springer-Verlag Berlin Heidelberg | |
2874 | Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011 | Jing-bo He, Sheng-liang Hu, Zhong Liu (auth.), Xingui He, Ertian Hua, Yun Lin, Xiaozhu Liu (eds.) | 2012 | Springer Netherlands | |
2875 | Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers | Cynthia A. Murphy (auth.), Pavel Gladyshev, Marcus K. Rogers (eds.) | 2012 | Springer-Verlag Berlin Heidelberg | |
2876 | Cyber Conflict | Daniel Ventre (ed.) | 2012 | Wiley-ISTE | |
2877 | Cyberbullying in the global playground: research from international perspectives | Qing Li, Donna Cross, Peter K. Smith (editors) | 2012 | Wiley-Blackwell | |
2878 | The Changing Face of Empire: Special Ops, Drones, Spies, Proxy Fighters, Secret Bases, and Cyberwarfare | Nick Turse | 2012 | Haymarket Books | |
2879 | We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency | Parmy Olson | 2012 | Little, Brown and Company | |
2880 | The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld and Jason Andress (Eds.) | 2012 | Syngress | |
2881 | Handbook on Securing Cyber-Physical Critical Infrastructure | Sajal K. Das, Krishna Kant and Nan Zhang (Auth.) | 2012 | Morgan Kaufmann | |
2882 | FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security | Stephen D. Gantz and Daniel R. Philpott (Eds.) | 2012 | Syngress | |
2883 | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones | 2012 | McGraw-Hill Osborne Media | |
2884 | Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2885 | Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2886 | Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings | Fengling Han, Ron van Schyndel (auth.), Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (eds.) | 2012 | Springer-Verlag Berlin Heidelberg | |
2887 | The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld, Jason Andress | 2012 | Syngress | |
2888 | Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2889 | Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2890 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2891 | Proceedings of the 2nd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2012 | I.O. Lytvynenko (ed.), D.O. Terletskyi (ed.) | 2012 | Bukrek | |
2892 | The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld, Jason Andress | 2012 | Syngress | |
2893 | Cyberbullying in the Global Playground: Research from International Perspectives | Qing Li, Donna Cross, Peter K. Smith | 2012 | Wiley-Blackwell | |
2894 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2895 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2896 | The Anti-Social Network: Cyberstalking Victimization Among College Students | Bradford W. Reyns | 2012 | Lfb Scholarly Pub Llc | |
2897 | We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency | Parmy Olson | 2012 | Little, Brown and Company | |
2898 | Cyberfactories: How News Agencies Produce News | Barbara Czarniawska | 2012 | Edward Elgar Pub | |
2899 | Discoursal Construction of Academic Identity in Cyberspace: The Example of an E-Seminar | Malgorzata Sokól | 2012 | Cambridge Scholars Publishing | |
2900 | Feminist Cyberspaces: Pedagogies in Transition | Sharon Collingwood, Alvina E. Quintana, Caroline J. Smith (eds.) | 2012 | Cambridge Scholars Publishing | |
2901 | Access Contested. Security, Identity, and Resistance in Asian Cyberspace | Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 05.06.2012Street date: 05.06.2012 | 2012 | MIT Press | |
2902 | Cyberbullying | Peggy J. Parks | 2012 | ReferencePoint Press | |
2903 | Cyberwarfare | Peggy J. Parks | 2012 | ReferencePoint Press | |
2904 | Cyberspaces and Global Affairs | Perry, Jake; Costigan, Sean S, Professor | 2012 | Ashgate Publishing Ltd | |
2905 | Cyberspace and Cybersecurity | Kostopoulos, George | 2012 | CRC Press | |
2906 | Cyber Challenges and National Security: Threats, Opportunities, and Power in a Virtual World | Derek S. Reveron (ed.) | 2012 | Georgetown University Press | |
2907 | Between page and screen : remaking literature through cinema and cyberspace | Brillenburg Wurth, Kiene | 2012 | Fordham University Press | |
2908 | Cybertext poetics : the critical landscape of new media literary theory | Eskelinen, Markku | 2012 | Bloomsbury Academic;Continuum | |
2909 | The Changing Face of Empire: Special Ops, Drones, Spies, Proxy Fighters, Secret Bases, and Cyberwarfare | Nick Turse | 2012 | Haymarket Books | |
2910 | We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency | Parmy Olson | 2012 | Little, Brown and Company | |
2911 | The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld and Jason Andress (Eds.) | 2012 | Syngress | |
2912 | Handbook on Securing Cyber-Physical Critical Infrastructure | Sajal K. Das, Krishna Kant and Nan Zhang (Auth.) | 2012 | Morgan Kaufmann | |
2913 | FISMA and the Risk Management Framework. The New Practice of Federal Cyber Security | Stephen D. Gantz and Daniel R. Philpott (Eds.) | 2012 | Syngress | |
2914 | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones | 2012 | McGraw-Hill Osborne Media | |
2915 | Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2916 | Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2917 | Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings | Fengling Han, Ron van Schyndel (auth.), Yang Xiang, Javier Lopez, C.-C. Jay Kuo, Wanlei Zhou (eds.) | 2012 | Springer-Verlag Berlin Heidelberg | |
2918 | The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld, Jason Andress | 2012 | Syngress | |
2919 | Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2920 | Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard | Brett Shavers | 2012 | Syngress | |
2921 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2922 | Proceedings of the 2nd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2012 | I.O. Lytvynenko (ed.), D.O. Terletskyi (ed.) | 2012 | Bukrek | |
2923 | The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld, Jason Andress | 2012 | Syngress | |
2924 | Cyberbullying in the Global Playground: Research from International Perspectives | Qing Li, Donna Cross, Peter K. Smith | 2012 | Wiley-Blackwell | |
2925 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2926 | FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security | Stephen D. Gantz, Daniel R. Philpott | 2012 | Syngress | |
2927 | The Anti-Social Network: Cyberstalking Victimization Among College Students | Bradford W. Reyns | 2012 | Lfb Scholarly Pub Llc | |
2928 | We are Anonymous: inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency | Parmy Olson | 2012 | Little, Brown and Company | |
2929 | Cyberfactories: How News Agencies Produce News | Barbara Czarniawska | 2012 | Edward Elgar Pub | |
2930 | Discoursal Construction of Academic Identity in Cyberspace: The Example of an E-Seminar | Malgorzata Sokól | 2012 | Cambridge Scholars Publishing | |
2931 | Feminist Cyberspaces: Pedagogies in Transition | Sharon Collingwood, Alvina E. Quintana, Caroline J. Smith (eds.) | 2012 | Cambridge Scholars Publishing | |
2932 | Access Contested. Security, Identity, and Resistance in Asian Cyberspace | Ronald Deibert,John Palfrey,Rafal Rohozinski, et al.MIT Press|MIT Press||Adult NonfictionComputer TechnologyLanguage(s): EnglishOn sale date: 05.06.2012Street date: 05.06.2012 | 2012 | MIT Press | |
2933 | Cyberbullying | Peggy J. Parks | 2012 | ReferencePoint Press | |
2934 | Cyberwarfare | Peggy J. Parks | 2012 | ReferencePoint Press | |
2935 | Cyberspaces and Global Affairs | Perry, Jake; Costigan, Sean S, Professor | 2012 | Ashgate Publishing Ltd | |
2936 | Cyberspace and Cybersecurity | Kostopoulos, George | 2012 | CRC Press | |
2937 | Cyber Challenges and National Security: Threats, Opportunities, and Power in a Virtual World | Derek S. Reveron (ed.) | 2012 | Georgetown University Press | |
2938 | Between page and screen : remaking literature through cinema and cyberspace | Brillenburg Wurth, Kiene | 2012 | Fordham University Press | |
2939 | Cybertext poetics : the critical landscape of new media literary theory | Eskelinen, Markku | 2012 | Bloomsbury Academic;Continuum | |
2940 | Cyber Security Policy Guidebook | Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss | 2012 | Wiley | |
2941 | Reverse Deception Organized Cyber Threat Counter-Exploitation | Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones | 2012 | McGraw-Hill Education | |
2942 | Cyberspace and Cybersecurity | George Kostopoulos | 2012 | Auerbach Publications | |
2943 | Frontiers of Cyberspace | Daniel Riha | 2012 | Brill/Rodopi | |
2944 | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Sean Bodmer & Dr. Max Kilger & Gregory Carpenter & Jade Jones | 2012 | McGraw-Hill Publishing | |
2945 | Network Forensics: Tracking Hackers through Cyberspace | Sherri Davidoff & Jonathan Ham | 2012 | Prentice Hall | |
2946 | Cyberlaw | Brian Craig | 2012 | Pearson Education (US) | |
2947 | 21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors | Hagestad, William T | 2012 | IT Governance Publishing | |
2948 | Cyber forensics: a field manual for collecting, examining, and preserving evidence of computer crimes | Albert J. Marcella, Jr.;Frederic Guillossou | 2012 | Wiley | |
2949 | Hacked: the inside story of America's struggle to secure cyberspace | Charlie Mitchell | 2012 | Rowman & Littlefield Publishers | |
2950 | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Bodmer, Sean;Carpenter, Gregory;Jones, Jade;Kilger, Max | 2012 | McGraw-Hill Education | |
2951 | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Bodmer, Sean;Carpenter, Gregory;Jones, Jade;Kilger, Max | 2012 | McGraw-Hill Companies,Inc. | |
2952 | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Bodmer, Sean;Carpenter, Gregory;Jones, Jade;Kilger, Max | 2012 | McGraw-Hill | |
2953 | Cyberpolitics in international relations | Choucri, Nazli | 2012 | MIT Press | |
2954 | We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency | Olson, Parmy | 2012 | Little, Brown & Company | |
2955 | We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous and the Global Cyber Insurgency | Olson, Parmy | 2012 | Little, Brown and Company | |
2956 | Cyberbullying bullying in the digital age | Robin M. Kowalski;Susan P. Limber;Patricia W. Agatston | 2012 | Wiley-Blackwell | |
2957 | Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security Professionals | Y. Anto | 2012 | LAP LAMBERT Academic Publishing | |
2958 | The changing face of empire: special ops, drones, spies, proxy fighters, secret bases, and cyberwarfare | Turse, Nick | 2012 | Dispatch Books, Haymarket | |
2959 | The Changing Face of Empire: Special Ops, Drones, Spies, Proxy Fighters, Secret Bases, and Cyberwarfare | Turse, Nick | 2012 | Dispatch Books, Haymarket | |
2960 | Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World | Reveron, Derek S(Editor) | 2012 | Georgetown University Press | |
2961 | Cyber-Physical Systems: Driving Force for Innovations in Mobility, Health, Energy and Production | AcatechEditor | 2012 | Springer | |
2962 | The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld | 2012 | Syngress | |
2963 | The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice | Steve Winterfeld, Jason Andress | 2012 | Syngress | |
2964 | Cyberculture and the Subaltern: Weavings of the Virtual and Real | Radhika Gajjala (editor) | 2012 | Lexington Books | |
2965 | Cyber Forensics: From Data to Digital Evidence | Albert J. Marcella Jr., Frederic Guillossou | 2012 | Wiley | |
2966 | The Dark Sides of the Internet: On Cyber Threats and Information Warfare | Roland Heickerö | 2012 | Peter Lang GmbH, Internationaler Verlag der Wissenschaften | |
2967 | Cyber Security Policy Guidebook | Jennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus H. Sachs; Jeffrey Schmidt | 2012 | John Wiley & Sons | |
2968 | Cyberbullying | Tamara L. Roleff | 2012 | Greenhaven Publishing LLC | |
2969 | Issues in Cyberspace: From Privacy to Piracy | Britannica Educational Publishing | 2012 | Britannica Educational Publishing | |
2970 | Crisis and Escalation in Cyberspace | Martin C. Libicki | 2012 | RAND Corporation | |
2971 | Is There a Home in Cyberspace?: The Internet in Migrants' Everyday Life and the Emergence of Global Communities | Heike Mónika Greschke | 2012 | Routledge | |
2972 | Cybertext Poetics: The Critical Landscape of New Media Literary Theory | Markku Eskelinen | 2012 | Continuum | |
2973 | Digital Whoness: Identity, Privacy and Freedom in the Cyberworld | Rafael Capurro; Michael Eldred; Daniel Nagel | 2012 | De Gruyter | |
2974 | Cybercrime and the Law : Challenges, Issues, and Outcomes | Susan W. Brenner | 2012 | Northeastern University Press | |
2975 | Misbehavior in Cyber Places : The Regulation of Online Conduct in Virtual Communities on the Internet | Janet Sternberg | 2012 | UPA | |
2976 | Policing Cyber Hate, Cyber Threats and Cyber Terrorism | Brian Blakemore; Imran Awan | 2012 | Taylor & Francis Group | |
2977 | Principles of Cyberbullying Research : Definitions, Measures, and Methodology | Sheri Bauman; Donna Cross; Jenny Walker | 2012 | Taylor & Francis Group | |
2978 | Love and Empire: Cybermarriage and Citizenship across the Americas | Felicity Amaya Schaeffer | 2012 | New York University Press | |
2979 | Storming the Reality Studio: A Casebook of Cyberpunk & Postmodern Science Fiction | Larry McCaffery (editor) | 2012 | Duke University Press | |
2980 | Annual Review of Cybertherapy and Telemedicine 2012: Advanced Technologies in the Behavioral, Social and Neurosciences | Brenda K. Wiederhold, Giuseppe Riva | 2012 | IOS Press | |
2981 | Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors | Brittson, Richard; O'Shea, Kevin; Reyes, Anthony; Steele, James | 2011 | Syngress Publishing; Elsevier Science | |
2982 | Cyber Security Essentials | James Graham, Ryan Olson, Rick Howard | 2011 | Auerbach Publications | |
2983 | Cyber Security Essentials | Rick Howard | 2011 | CRC Press | |
2984 | Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies | Junaid Ahmed Zubairi, Athar Mahboob | 2011 | IGI Global snippet | |
2985 | A System-Aware Cyber Security architecture | Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 | 2011 | | |
2986 | Kingpin: How one hacker took over the billion-dollar cybercrime underground | Kevin Poulsen | 2011 | Crown | |
2987 | Cybercrimes: A Multidisciplinary Analysis | Elliot Turrini, Sumit Ghosh (auth.), Sumit Ghosh, Elliot Turrini (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
2988 | Embedded System Design: Embedded Systems Foundations of Cyber-physical Systems | Peter Marwedel (auth.) | 2011 | Springer Netherlands | |
2989 | Australia and Cyber-warfare (Canberra Papers on Strategy and Defence No. 168) | Gary Waters, Desmond Ball & Ian Dudgeon | 2011 | | |
2990 | Introduction to Embedded Systems - A Cyber-Physical Systems Approach | E. A. Lee and S. A. Seshia | 2011 | | |
2991 | Cybercrimes: A multidisciplinary analysis | Elliot Turrini, Sumit Ghosh (auth.), Sumit Ghosh, Elliot Turrini (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
2992 | Kingpin: How one hacker took over the billion-dollar cybercrime underground | Kevin Poulsen | 2011 | Crown | |
2993 | Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers | Ali Alkaabi, George Mohay, Adrian McCullagh (auth.), Ibrahim Baggili (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
2994 | Cyber Security Essentials | James Graham, Ryan Olson, Rick Howard | 2011 | Auerbach Publications | |
2995 | The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals | Steve Schroeder | 2011 | Course Technology PTR | |
2996 | A Cybernetic View of Biological Growth: The Maia Hypothesis | Tony Stebbing | 2011 | Cambridge University Press | |
2997 | Kingpin: How one hacker took over the billion-dollar cybercrime underground | Kevin Poulsen | 2011 | Crown | |
2998 | Data Mining and Machine Learning in Cybersecurity | Sumeet Dua, Xian Du | 2011 | CRC Press | |
2999 | Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | 2011 | Syngress | |
3000 | Cyber Infrastructure Protection | Tarek N. Saadawi, Louis H. Jordan Jr. (Editors) | 2011 | Strategic Studies Institute (U.S. Army War College) | |
3001 | Data Mining and Machine Learning in Cybersecurity | Sumeet Dua, Xian Du | 2011 | CRC Press | |
3002 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2011 | O'Reilly Media | |
3003 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2011 | O'Reilly Media | |
3004 | Cyberpragmatics: Internet-Mediated Communication in Context | Francisco Yus | 2011 | John Benjamins | |
3005 | DarkMarket: how hackers became the new mafia [cyberthieves, cybercops and you] | Misha Glenny | 2011 | Knopf | |
3006 | Transforming Combustion Research through Cyberinfrastructure | Committee on Building Cyberinfrastructure for Combustion Research, National Research Council | 2011 | National Academies Press | |
3007 | Doctor Who and the Cybermen | Gerry Davis | 2011 | BBC Books | |
3008 | Cyber Security Essentials | Rick Howard | 2011 | CRC Press | |
3009 | Cyber Criminology: Exploring Internet Crimes and Criminal Behavior | K. Jaishankar | 2011 | CRC Press | |
3010 | Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies | Junaid Ahmed Zubairi, Athar Mahboob | 2011 | IGI Global snippet | |
3011 | Ahead of Change: How Crowd Psychology and Cybernetics Transform the Way We Govern | Constantin Malik (editor) | 2011 | Campus Verlag | |
3012 | Cyberbullying Prevention and Response: Expert Perspectives | Justin W. Patchin, Sameer Hinduja | 2011 | Routledge | |
3013 | Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats | Pratyusa K. Manadhata, Jeannette M. Wing (auth.), Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang (eds.) | 2011 | Springer-Verlag New York | |
3014 | Creating Second Lives: Community, Identity and Spatiality as Constructions of the Virtual (Routledge Studies in New Media and Cyberculture) | Astrid Ensslin, Eben Muse | 2011 | Routledge | |
3015 | Reading Communities from Salons to Cyberspace | DeNel Rehberg Sedo | 2011 | Palgrave Macmillan | |
3016 | Reading Communities from Salons to Cyberspace | DeNel Rehberg Sedo | 2011 | Palgrave Macmillan | |
3017 | Kingpin: How one hacker took over the billion-dollar cybercrime underground | Kevin Poulsen | 2011 | Crown | |
3018 | Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems | Peter Marwedel (auth.) | 2011 | Springer Netherlands | |
3019 | Transactions on Computational Science XII: Special Issue on Cyberworlds | Mathieu Hopmann, Mario Gutierrez (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Alexei Sourin, Olga Sourina (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
3020 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2011 | O'Reilly Media | |
3021 | Kingpin: How one hacker took over the billion-dollar cybercrime underground | Kevin Poulsen | 2011 | Crown | |
3022 | “Rome Wasn’t Digitized in a Day”: Building a Cyberinfrastructure for Digital Classicists | Alison Babeu | 2011 | Council on Library and Information Resources | |
3023 | Geoinformatics: Cyberinfrastructure for the Solid Earth Sciences | G. Randy Keller, Chaitanya Baru | 2011 | Cambridge University Press | |
3024 | Anonymity and Learning in Digitally Mediated Communications: Authenticity and Trust in Cyber Communication | Bobbe Baggio and Yoany Beldarrain | 2011 | IGI Global | |
3025 | Access Contested: Security, Identity, and Resistance in Asian Cyberspace | Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain | 2011 | MIT Press | |
3026 | Libraries, Telecentres, Cybercafes and Public Access to ICT: International Comparisons | Ricardo Gomez | 2011 | Igi Global | |
3027 | Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices | Alfreda Dudley, James Braman, Giovanni Vincenti | 2011 | Igi Global | |
3028 | Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems | Peter Marwedel (auth.) | 2011 | Springer Netherlands | |
3029 | Automation, Communication and Cybernetics in Science and Engineering 2009/2010 | Ursula Bach, Ingo Leisten (auth.), Sabina Jeschke, Ingrid Isenhardt, Klaus Henning (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
3030 | Introduction to Embedded Systems: A Cyber-Physical Systems Approach | Edward Ashford Lee, Sanjit Arunkumarr Seshia | 2011 | Lulu.com | |
3031 | Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats | Will Gragido, John Pirc | 2011 | Syngress | |
3032 | Cybersecurity: Public Sector Threats and Responses | Kim J. Andreasson | 2011 | CRC Press | |
3033 | Kingpin: How one hacker took over the billion-dollar cybercrime underground | Kevin Poulsen | 2011 | Crown | |
3034 | Transactions on Computational Science XII: Special Issue on Cyberworlds | Mathieu Hopmann, Mario Gutierrez (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Alexei Sourin, Olga Sourina (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
3035 | Internet co-regulation: European law, regulatory governance and legitimacy in cyberspace | Christopher T. Marsden | 2011 | Cambridge University Press | |
3036 | Embedded System Design: Embedded Systems Foundations of Cyber-Physical Systems | Peter Marwedel (auth.) | 2011 | Springer Netherlands | |
3037 | Automation, Communication and Cybernetics in Science and Engineering 2009/2010 | Ursula Bach, Ingo Leisten (auth.), Sabina Jeschke, Ingrid Isenhardt, Klaus Henning (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
3038 | Cybercrimes: A Multidisciplinary Analysis | Elliot Turrini, Sumit Ghosh (auth.), Sumit Ghosh, Elliot Turrini (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
3039 | Cyberwar and Information Warfare | Daniel Ventre (ed.) | 2011 | Wiley-ISTE | |
3040 | Cyber warfare : techniques, tactics and tools for security practitioners | Jason Andress; Steve Winterfeld; Russ Rogers | 2011 | Syngress/Elsevier | |
3041 | A System-Aware Cyber Security architecture | Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 | 2011 | | |
3042 | Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats | Will Gragido, John Pirc | 2011 | Syngress | |
3043 | Cyberwar and Information Warfare | Daniel Ventre | 2011 | Wiley-ISTE | |
3044 | Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace | Christopher T. Marsden | 2011 | Cambridge University Press | |
3045 | Cyber-Physical Systems: Driving force for innovation in mobility, health, energy and production | | 2011 | Springer-Verlag Berlin Heidelberg | |
3046 | Cyber Infrastructure Protection | Tarek Saadawi, Jr. Louis Jordan | 2011 | Strategic Studies Institute | |
3047 | Ahead of Change: How Crowd Psychology and Cybernetics Transform the Way We Govern | Constantin Malik | 2011 | Campus | |
3048 | DarkMarket: how hackers became the new mafia [cyberthieves, cybercops and you] | Misha Glenny | 2011 | House of Anansi Press | |
3049 | Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS | Tyson Macaulay, Bryan L. Singer | 2011 | Auerbach Publications,CRC Press | |
3050 | Cybernetic Revolutionaries: Technology and Politics in Allende’s Chile | Eden Medina | 2011 | The MIT Press | |
3051 | Cyber Bullying | Nick Hunter | 2011 | Raintree UK | |
3052 | The Law of Cybercrimes and Their Investigations | Curtis, George | 2011 | CRC Press | |
3053 | Cybernetic revolutionaries : technology and politics in Allende's Chile | Medina, Eden | 2011 | The MIT Press | |
3054 | Cybernetic revolutionaries : technology and politics in Allende's Chile | Medina, Eden | 2011 | The MIT Press | |
3055 | Darkmarket : cyberthieves, cybercops and you | Glenny, Misha | 2011 | House of Anansi Press Inc. | |
3056 | The Law of Cybercrimes and Their Investigations | Curtis, George | 2011 | CRC Press | |
3057 | Reading Communities from Salons to Cyberspace | DeNel Rehberg Sedo (eds.) | 2011 | Palgrave Macmillan UK | |
3058 | Cyber warfare : techniques, tactics and tools for security practitioners | Jason Andress; Steve Winterfeld; Russ Rogers | 2011 | Syngress/Elsevier | |
3059 | A System-Aware Cyber Security architecture | Rick A Jones Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904; Barry Horowitz Affiliation: Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 | 2011 | | |
3060 | Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats | Will Gragido, John Pirc | 2011 | Syngress | |
3061 | Cyberwar and Information Warfare | Daniel Ventre | 2011 | Wiley-ISTE | |
3062 | Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace | Christopher T. Marsden | 2011 | Cambridge University Press | |
3063 | Cyber-Physical Systems: Driving force for innovation in mobility, health, energy and production | | 2011 | Springer-Verlag Berlin Heidelberg | |
3064 | Cyber Infrastructure Protection | Tarek Saadawi, Jr. Louis Jordan | 2011 | Strategic Studies Institute | |
3065 | Ahead of Change: How Crowd Psychology and Cybernetics Transform the Way We Govern | Constantin Malik | 2011 | Campus | |
3066 | DarkMarket: how hackers became the new mafia [cyberthieves, cybercops and you] | Misha Glenny | 2011 | House of Anansi Press | |
3067 | Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS | Tyson Macaulay, Bryan L. Singer | 2011 | Auerbach Publications,CRC Press | |
3068 | Cybernetic Revolutionaries: Technology and Politics in Allende’s Chile | Eden Medina | 2011 | The MIT Press | |
3069 | Cyber Bullying | Nick Hunter | 2011 | Raintree UK | |
3070 | The Law of Cybercrimes and Their Investigations | Curtis, George | 2011 | CRC Press | |
3071 | Cybernetic revolutionaries : technology and politics in Allende's Chile | Medina, Eden | 2011 | The MIT Press | |
3072 | Cybernetic revolutionaries : technology and politics in Allende's Chile | Medina, Eden | 2011 | The MIT Press | |
3073 | Darkmarket : cyberthieves, cybercops and you | Glenny, Misha | 2011 | House of Anansi Press Inc. | |
3074 | The Law of Cybercrimes and Their Investigations | Curtis, George | 2011 | CRC Press | |
3075 | Reading Communities from Salons to Cyberspace | DeNel Rehberg Sedo (eds.) | 2011 | Palgrave Macmillan UK | |
3076 | Cyberpragmatics: Internet-mediated Communication in Context | Francisco Yus | 2011 | | |
3077 | Data Mining and Machine Learning in Cybersecurity | Sumeet Dua, Xian Du | 2011 | CRC | |
3078 | New Perspectives on Cybernetics: Self-Organization, Autonomy and Connectionism | G. Vijver | 2011 | Springer | |
3079 | Ethnopolitics in Cyberspace: The Internet, Minority Nationalism, and the Web of Identity | Saunders, R.A. | 2011 | Lexington Books | |
3080 | The science of cybersecurity and a roadmap to research | Benjamin J. Colfer (editor) | 2011 | Nova Science Publishers, Inc. | |
3081 | Cyber warfare: techniques, tactics and tools for security practitioners | Andress, Jason;Winterfeld, Steve;Northcutt, Stephen;Rogers, Russ | 2011 | Elsevier Science;Syngress;Elsevier | |
3082 | DarkMarket: cyberthieves, cybercops, and you | Glenny, Misha | 2011 | Knopf Doubleday Publishing Group;Alfred A. Knopf | |
3083 | Transactions on Computational Science XII: Special Issue on Cyberworlds | Mathieu Hopmann, Mario Gutierrez (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Alexei Sourin, Olga Sourina (eds.) | 2011 | Springer-Verlag Berlin Heidelberg | |
3084 | Internet Co-Regulation: European Law, Regulatory Governance And Legitimacy In Cyberspace | Christopher T. Marsden | 2011 | Cambridge University Press | |
3085 | Cybernetic revolutionaries technology and politics in Allende's Chile | Medina, Eden;Allende Gossens, Salvador | 2011 | The MIT Press | |
3086 | Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | Poulsen, Kevin | 2011 | Crown Publ | |
3087 | Girls on the edge: the four factors driving the new crisis for girls?sexual identity, the cyberbubble, obsessions, envi | Sax, Leonard | 2011 | Basic Books | |
3088 | Embedded system design: embedded systems foundations of cyber-physical systems | Marwedel, Peter | 2011 | Springer | |
3089 | Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives | WILEY INDIA | 2011 | Nina Godbole, Sunit Belapure, Kamlesh Bajaj | |
3090 | Transformers: Exodus - The Official History of the War for Cybertron | Alex Irvine | 2011 | Del Rey | |
3091 | Cyber Savvy: Embracing Digital Safety and Civility | Nancy Willard | 2011 | SAGE Publications | |
3092 | Cyber Meltdown: Bible Prophecy and the Imminent Threat of Cyberterrorism | Ron Rhodes | 2011 | Harvest House Publishers | |
3093 | Responding to Cyber Bullying : An Action Tool for School Leaders | Jill J. Myers; Donna S. McCaw; Leaunda S. Hemphill | 2011 | Corwin Press | |
3094 | Wars of Disruption and Resilience : Cybered Conflict, Power, and National Security | Chris C. Demchak; Gary Bertsch; Howard J. Wiarda | 2011 | University of Georgia Press | |
3095 | Culture, Communication and Cyberspace : Rethinking Technical Communication for International Online Environments | Kirk St. Amant; Filipp Sapienza; Charles H. Sides | 2011 | Taylor & Francis Group | |
3096 | Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime | Ralph Clifford (editor) | 2011 | Carolina Academic Press | |
3097 | Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers | Ibrahim Baggili (editor) | 2011 | Springer | |
3098 | How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics | Hayles, N. Katherine | 2010 | University of Chicago Press | |
3099 | Computer forensics: investigating network intrusions and cybercrime | EC-Council | 2010 | Cengage Learning | |
3100 | Cyber Law and Cyber Security in Developing and Emerging Economies | Zeinab Karake Shalhoub, Lubna Al Qasimi | 2010 | | |
3101 | Digital Security: Cyber Terror and Cyber Security (The Digital World) | Ananda Mitra | 2010 | | |
3102 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
3103 | Cyber Security Essentials | Rick Howard | 2010 | CRC Press | |
3104 | Cyber Security Essentials | James Graham, Ryan Olson, Rick Howard | 2010 | CRC Press | |
3105 | Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering | Hamid R. Nemati | 2010 | IGI Global | |
3106 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
3107 | Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Commu | Margot P. C. Weijnen, Zofia Lukszo (auth.), Zofia Lukszo, Geert Deconinck, Margot P. C. We | 2010 | Springer Netherlands | |
3108 | The global cybercrime industry: economic, institutional and strategic perspectives | Nir Kshetri (auth.) | 2010 | Springer-Verlag Berlin Heidelberg | |
3109 | Principles of Cybercrime | Jonathan Clough | 2010 | Cambridge University Press | |
3110 | Principles of Cybercrime | Jonathan Clough | 2010 | Cambridge University Press | |
3111 | Access controlled: the shaping of power, rights, and rule in cyberspace | Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti | 2010 | The MIT Press | |
3112 | Cyber Risks for Business Professionals A Management Guide | Rupert Kendrick | 2010 | IT Governance Publishing | |
3113 | Access controlled: the shaping of power, rights, and rule in cyberspace | Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, Jonathan Zittrain, Miklos Haraszti | 2010 | The MIT Press | |
3114 | Cyber Situational Awareness: Issues and Research | Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sush | 2010 | Springer US | |
3115 | Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing o | Committee on Deterring Cyberattacks: Informing Strategies and Developing Options, National | 2010 | National Academies Press | |
3116 | The Cybernetic Brain: Sketches of Another Future | Andrew Pickering | 2010 | | |
3117 | Cyber Attacks: Protecting National Infrastructure | Edward Amoroso | 2010 | Butterworth-Heinemann | |
3118 | The global cybercrime industry: economic, institutional and strategic perspectives | Nir Kshetri (auth.) | 2010 | Springer-Verlag Berlin Heidelberg | |
3119 | Cyber Situational Awareness: Issues and Research | Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sush | 2010 | Springer US | |
3120 | Digital Communications: From E-Mail to the Cyber Community (The Digital World) | Ananda Mitra | 2010 | | |
3121 | Cyber Law and Cyber Security in Developing and Emerging Economies | Zeinab Karake Shalhoub, Lubna Al Qasimi | 2010 | | |
3122 | Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Commu | Margot P. C. Weijnen, Zofia Lukszo (auth.), Zofia Lukszo, Geert Deconinck, Margot P. C. We | 2010 | Springer Netherlands | |
3123 | Digital Security: Cyber Terror and Cyber Security (The Digital World) | Ananda Mitra | 2010 | | |
3124 | The global cybercrime industry: economic, institutional and strategic perspectives | Nir Kshetri (auth.) | 2010 | Springer-Verlag Berlin Heidelberg | |
3125 | Cyber War: The Next Threat to National Security and What to Do About It | Richard A. Clarke, Robert Knake | 2010 | HarperCollins | |
3126 | Cyber War: The Next Threat to National Security and What to Do About It | Richard A. Clarke, Robert Knake | 2010 | | |
3127 | CyberForensics: Understanding Information Security Investigations | Jennifer Bayuk (auth.), Jennifer Bayuk (eds.) | 2010 | Humana Press | |
3128 | Cybercrime: criminal threats from cyberspace | Susan W. Brenner | 2010 | Praeger | |
3129 | Cyber War: The Next Threat to National Security and What to Do About It | Richard A. Clarke, Robert Knake | 2010 | Ecco | |
3130 | Cyberfiction: After the Future | Paul Youngquist | 2010 | Palgrave Macmillan | |
3131 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
3132 | Cyber Security Essentials | Rick Howard | 2010 | CRC Press | |
3133 | Emerging practices in cyberculture and social networking | Daniel Riha, Anna Maj (editors) | 2010 | Rodopi | |
3134 | Cyber Security Essentials | James Graham, Ryan Olson, Rick Howard | 2010 | CRC Press | |
3135 | Global copyright: three hundred years since the Statute of Anne, from 1709 to cyberspace | Lionel Bently, Uma Suthersanen, Paul Torremans (editors) | 2010 | Edward Elgar Publishing | |
3136 | Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches | Jerzy Jozefczyk | 2010 | IGI Global | |
3137 | Disability and New Media (Routledge Studies in New Media and Cyberculture) | Katie Ellis, Mike Kent | 2010 | Routledge | |
3138 | Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering | Hamid R. Nemati | 2010 | IGI Global | |
3139 | Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policy | Committee on Deterring Cyberattacks: Informing Strategies and Developing Options, National Research Council | 2010 | National Academies Press | |
3140 | Proceedings of a Workshop on Deterring Cyberattacks | National Research Council | 2010 | The National Academies Press | |
3141 | Policing cyber crime | Petter Gottschalk | 2010 | [S.l.] BookBooN.com | |
3142 | Surviving cyberwar | Richard Stiennon | 2010 | Government Institutes | |
3143 | Digital Forensics and Cyber Crime: First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers | Sriram Raghavan, S. V. Raghavan (auth.), Sanjay Goel (eds.) | 2010 | Springer-Verlag Berlin Heidelberg | |
3144 | Cyber Situational Awareness: Issues and Research | Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jon Giffin (auth.), Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (eds.) | 2010 | Springer US | |
3145 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
3146 | Surviving Cyberwar | Richard Stiennon | 2010 | Government Institutes | |
3147 | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace | Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan L. Zittrain, Miklos Haraszti | 2010 | The MIT Press | |
3148 | Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin? | Tom Jacobs | 2010 | Perfection Learning | |
3149 | China's cyberwarfare capability | Elisabette M. Marvel (editor) | 2010 | Nova Science Publishers | |
3150 | Internet governance in an age of cyber insecurity | Robert K. Knake | 2010 | Council on Foreign Relations Press | |
3151 | Music and Cyberliberties | Patrick Burkart | 2010 | Wesleyan | |
3152 | Tokyo Cyberpunk: Posthumanism in Japanese Visual Culture | Steven T. Brown | 2010 | Palgrave Macmillan | |
3153 | Cyberfiction After the Future | Paul Youngquist (auth.) | 2010 | Palgrave Macmillan US | |
3154 | Cyber risks for business professionals : a management guide | Kendrick, Rupert | 2010 | IT Governance | |
3155 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
3156 | Surviving Cyberwar | Richard Stiennon | 2010 | Government Institutes | |
3157 | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace | Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan L. Zittrain, Miklos Haraszti | 2010 | The MIT Press | |
3158 | Teen Cyberbullying Investigated: Where Do Your Rights End and Consequences Begin? | Tom Jacobs | 2010 | Perfection Learning | |
3159 | China's cyberwarfare capability | Elisabette M. Marvel (editor) | 2010 | Nova Science Publishers | |
3160 | Internet governance in an age of cyber insecurity | Robert K. Knake | 2010 | Council on Foreign Relations Press | |
3161 | Music and Cyberliberties | Patrick Burkart | 2010 | Wesleyan | |
3162 | Tokyo Cyberpunk: Posthumanism in Japanese Visual Culture | Steven T. Brown | 2010 | Palgrave Macmillan | |
3163 | Cyberfiction After the Future | Paul Youngquist (auth.) | 2010 | Palgrave Macmillan US | |
3164 | Cyber risks for business professionals : a management guide | Kendrick, Rupert | 2010 | IT Governance | |
3165 | Tokyo Cyberpunk: Posthumanism in Japanese Visual Culture | Steven T. Brown | 2010 | Palgrave Macmillan US | |
3166 | Shakespeare in Hollywood, Asia, and cyberspace | Huang, Alexander Cheng-Yuan; Ross (eds.) | 2010 | Purdue University Press | |
3167 | Girls on the Edge: The Four Factors Driving the New Crisis for Girls: Sexual Identity, the Cyberbubble, Obsessions, Environmental Toxins | Leonard Sax | 2010 | Basic Books (AZ) | |
3168 | Girls on the Edge: The Four Factors Driving the New Crisis for Girls: Sexual Identity, the Cyberbubble, Obsessions, Environmental Toxins | Leonard Sax | 2010 | Basic Books (AZ) | |
3169 | Pyramid. Cyberpunk | Steve Jackson | 2010 | Steve Jackson Games Incorporated | |
3170 | Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking World | Vanessa Rogers | 2010 | Jessica Kingsley Publishers | |
3171 | Cyber Junkie: Escape the Gaming and Internet Trap | Kevin Roberts | 2010 | Hazelden Publishing | |
3172 | Cyber Junkie: Escape the Gaming and Internet Trap | Kevin Roberts | 2010 | Hazelden Publishing | |
3173 | How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics | N. Katherine Hayles | 2010 | University of Chicago Press | |
3174 | Dave Barry in Cyberspace | Barry, Dave | 2010 | Random House Publishing Group;Fawcett Books | |
3175 | Inside cyber warfare: mapping the cyber underworld | Carr, Jeffrey | 2010 | O'Reilly | |
3176 | The First Cyber Death Extravaganza! | Douglas, Scott | 2010 | Feedbooks | |
3177 | The First Cyber Death Extravaganza! A Mock Passion Play | Douglas, Scott | 2010 | Feedbooks | |
3178 | Insider Threats in Cyber Security | Christian W. Probst, Jeffrey Hunker, Dieter Gollmann (auth.), Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop (eds.) | 2010 | Springer US | |
3179 | How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics | Hayles, N. Katherine | 2010 | University of Chicago Press | |
3180 | Changing the Center of Gravity: Transforming Classical Studies Through Cyberinfrastructure | Melissa Terras, Gregory Crane | 2010 | Gorgias Press | |
3181 | Cyber junkie: escape the gaming and internet trap | Roberts, Kevin | 2010 | Hazelden Publishing | |
3182 | Cyber junkie: escape the gaming and internet trap | Roberts, Kevin | 2010 | Hazelden Publishing | |
3183 | Principles Of Cybercrime | Jonathan Clough | 2010 | Cambridge University Press | |
3184 | Music and cyberliberties | Burkart, Patrick | 2010 | Wesleyan University Press | |
3185 | Cyber Junkie: Escape the Gaming and Internet Trap | Kevin Roberts | 2010 | Hazelden Publishing | |
3186 | CyberSafe: Protecting and Empowering Kids in the Digital World of Texting, Gaming, and Social Media | Gwenn Schurgin O'Keeffe | 2010 | American Academy of Pediatrics | |
3187 | Cyber-Archaeology | Maurizio Forte | 2010 | BAR Publishing | |
3188 | Changing the Center of Gravity: Transforming Classical Studies Through Cyberinfrastructure | Melissa Terras (editor); Gregory Crane (editor) | 2010 | Gorgias Press | |
3189 | Cyberbullying : What Counselors Need to Know | Sheri Bauman | 2010 | American Counseling Association | |
3190 | Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of Evolution | Peter Corning | 2010 | University of Chicago Press | |
3191 | The Cybernetic Brain: Sketches of Another Future | Andrew Pickering | 2010 | University of Chicago Press | |
3192 | Cyberprotest : Environmental Activism Online | Jenny Pickerill | 2010 | Manchester University Press | |
3193 | CyberForensics: Understanding Information Security Investigations | Jennifer Bayuk (editor) | 2010 | Humana | |
3194 | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (A | Kenneth J. Knapp | 2009 | Information Science Reference | |
3195 | Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for | U. Gori | 2009 | | |
3196 | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) | Kenneth J. Knapp | 2009 | Information Science Reference | |
3197 | Optimal observation for cyber-physical systems: a fisher-information-matrix-based approach | Zhen Song, YangQuan Chen, Chellury Ram Sastry, Nazif Cihan Tas (auth.) | 2009 | Springer-Verlag London | |
3198 | Encyclopedia of Cybercrime | Samuel C. McQuade III (editor) | 2009 | Greenwood Press | |
3199 | Ethics in cyberspace: How cyberspace may influence interpersonal interaction | Professor Thomas Ploug (auth.) | 2009 | Springer Netherlands | |
3200 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2009 | O'Reilly Media | |
3201 | Machine Learning in Cyber Trust: Security, Privacy, and Reliability | Lui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wang (auth.), Philip S. Yu, Jeffrey J. P. | 2009 | Springer US | |
3202 | Digital Diaspora: A Race for Cyberspace | Anna Everett | 2009 | State University of New York Press | |
3203 | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (A | Kenneth J. Knapp | 2009 | Information Science Reference | |
3204 | Cyberinfrastructure Technologies and Applications | Junwei Cao | 2009 | Nova Science Publishers | |
3205 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2009 | O'Reilly Media | |
3206 | Creating a National Framework for Cybersecurity | Eric A. Fischer | 2009 | Nova Science Publishers | |
3207 | The Virtual Battlefield: Perspectives on Cyber Warfare | C. Czosseck and K. Geers | 2009 | | |
3208 | Ethics in cyberspace: How cyberspace may influence interpersonal interaction | Professor Thomas Ploug (auth.) | 2009 | Springer Netherlands | |
3209 | Technobohemians or the new cybertariat? | Rosalind Gill | 2009 | | |
3210 | Intelligent Engineering Systems and Computational Cybernetics | J.A. Tenreiro Machado, Bela Patkai, Imre J. Rudas | 2009 | | |
3211 | Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Perspectives in a | Jessie Daniels | 2009 | | |
3212 | Cyberthreats: The Emerging Fault Lines of the Nation State | Susan W Brenner | 2009 | | |
3213 | Machine Learning in Cyber Trust: Security, Privacy, and Reliability | Lui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wang (auth.), Philip S. Yu, Jeffrey J. P. | 2009 | Springer US | |
3214 | Cybersecurity, Cyberanalysis and Warning | Kerry T. Norwood, Sandra P. Catwell | 2009 | Nova Science Publishers | |
3215 | In Search of Jefferson's Moose: Notes on the State of Cyberspace (Law and Current Events M | David Post | 2009 | | |
3216 | Modelling Cyber Security: Approaches, Methodology, Strategies - Volume 59 NATO Science for | U. Gori | 2009 | | |
3217 | Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy) | Kenneth J. Knapp | 2009 | Information Science Reference | |
3218 | Cyberpunk 2.0 | Herlander Elias | 2009 | LabCom | |
3219 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2009 | O'Reilly Media | |
3220 | Bibliometrics and Citation Analysis: From the Science Citation Index to Cybermetrics | Nicola De Bellis | 2009 | The Scarecrow Press, Inc. | |
3221 | Cyber Fraud: Tactics, Techniques and Procedures | Rick Howard | 2009 | | |
3222 | Cyberdeterrence and Cyberwar | Martin C. Libicki | 2009 | | |
3223 | Astronomical Cybersketching: Observational Drawing with PDAs and Tablet PCs | Peter Grego (auth.) | 2009 | Springer-Verlag New York | |
3224 | Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences | Shaheen Shariff | 2009 | | |
3225 | Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities | William A. Owens, Kenneth W. Dam, Herbert S. Lin | 2009 | National Academies Press | |
3226 | Cyberchiefs: Autonomy and Authority in Online Tribes | Mathieu O'Neil | 2009 | Pluto Press | |
3227 | Operations Research and Cyber-Infrastructure | William E. Hart (auth.), John W. Chinneck, Bjarni Kristjansson, Matthew J. Saltzman (eds.) | 2009 | Springer US | |
3228 | A Missing Link in Cybernetics: Logic and Continuity | Alex M. Andrew (auth.) | 2009 | Springer-Verlag New York | |
3229 | Optimal Observation for Cyber-physical Systems: A Fisher-information-matrix-based Approach | Zhen Song, YangQuan Chen, Chellury Ram Sastry, Nazif Cihan Tas (auth.) | 2009 | Springer-Verlag London | |
3230 | Cyberinfrastructure Technologies and Applications | Junwei Cao | 2009 | Nova Science Pub Inc | |
3231 | Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities | William A. Owens, Kenneth W. Dam, Herbert S. Lin | 2009 | National Academies Press | |
3232 | Intelligent Engineering Systems and Computational Cybernetics | J. A. Tenreiro Machado, Béla Pátkai, Imre J. Rudas | 2009 | Springer | |
3233 | Computer Forensics: Investigating Network Intrusions and Cybercrime | EC-Council | 2009 | Cengage Learning | |
3234 | The Digital Cast of Being: Metaphysics, Mathematics, Cartesianism, Cybernetics, Capitalism, Communication | Michael Eldred | 2009 | Ontos Verlag | |
3235 | Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities | William A. Owens, Kenneth W. Dam, Herbert S. Lin | 2009 | National Academies Press | |
3236 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2009 | O'Reilly Media | |
3237 | Islam Dot Com: Contemporary Islamic Discourses in Cyberspace (The Palgrave Macmillan Series in Internatioal Political Communication) | Mohammed el-Nawawy, Sahar Khamis | 2009 | Palgrave Macmillan | |
3238 | Astronomical Cybersketching: Observational Drawing with PDAs and Tablet PCs | Peter Grego (auth.) | 2009 | Springer-Verlag New York | |
3239 | Ethics in Cyberspace: How Cyberspace May Influence Interpersonal Interaction | Professor Thomas Ploug (auth.) | 2009 | Springer Netherlands | |
3240 | Optimal Observation for Cyber-physical Systems: A Fisher-information-matrix-based Approach | Zhen Song, YangQuan Chen, Chellury Ram Sastry, Nazif Cihan Tas (auth.) | 2009 | Springer-Verlag London | |
3241 | Emotional Intelligence: A Cybernetic Approach | Aruna Chakraborty, Amit Konar (auth.) | 2009 | Springer-Verlag Berlin Heidelberg | |
3242 | Ethics in Cyberspace: How Cyberspace May Influence Interpersonal Interaction | Professor Thomas Ploug (auth.) | 2009 | Springer Netherlands | |
3243 | Operations Research and Cyber-Infrastructure | William E. Hart (auth.), John W. Chinneck, Bjarni Kristjansson, Matthew J. Saltzman (eds.) | 2009 | Springer US | |
3244 | Global Initiatives to Secure Cyberspace: An Emerging Landscape | Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) | 2009 | Springer US | |
3245 | Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences | Shaheen Shariff Ph.D. | 2009 | Cambridge University Press | |
3246 | Cyberdeterrence and Cyberwar | Martin C. Libicki | 2009 | RAND Corporation | |
3247 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2009 | O'Reilly Media | |
3248 | Tracking GhostNet : investigating a cyber espionage network | the SecDev Group ; Citizen Lab, Munk Centre for International Studies, University of Toronto | 2009 | Citizen Lab | |
3249 | Cyber Bullying: Protecting Kids and Adults from Online Bullies | Samuel C. McQuade III, James P. Colt, Nancy Meyer | 2009 | Praeger | |
3250 | Islam Dot Com: Contemporary Islamic Discourses in Cyberspace | Mohammed el-Nawawy, Sahar Khamis (auth.) | 2009 | Palgrave Macmillan US | |
3251 | Astronomical Cybersketching. Observational Drawing with PDAs and Tablet PCs | Peter Grego | 2009 | Springer Publishing | |
3252 | Global Initiatives to Secure Cyberspace: An Emerging Landscape | Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) | 2009 | Springer US | |
3253 | Confronting Cyber-Bullying: What Schools Need to Know to Control Misconduct and Avoid Legal Consequences | Shaheen Shariff Ph.D. | 2009 | Cambridge University Press | |
3254 | Cyberdeterrence and Cyberwar | Martin C. Libicki | 2009 | RAND Corporation | |
3255 | Inside cyber warfare: mapping the cyber underworld | Jeffrey Carr | 2009 | O'Reilly Media | |
3256 | Tracking GhostNet : investigating a cyber espionage network | the SecDev Group ; Citizen Lab, Munk Centre for International Studies, University of Toronto | 2009 | Citizen Lab | |
3257 | Cyber Bullying: Protecting Kids and Adults from Online Bullies | Samuel C. McQuade III, James P. Colt, Nancy Meyer | 2009 | Praeger | |
3258 | Islam Dot Com: Contemporary Islamic Discourses in Cyberspace | Mohammed el-Nawawy, Sahar Khamis (auth.) | 2009 | Palgrave Macmillan US | |
3259 | Astronomical Cybersketching. Observational Drawing with PDAs and Tablet PCs | Peter Grego | 2009 | Springer Publishing | |
3260 | The Lost Blogs: From Jesus to Jim Morrison--The Historically Inaccurate and Totally Fictitious Cyber Diaries of Everyone Worth Knowing | Paul Davidson | 2009 | Warner Books | |
3261 | The everything parent's guide to dealing with bullies: from playground teasing to cyber bullying, all you need to ensure your child's safety and happiness | Ferguson, Christopher J.; Carpenter, Deborah | 2009 | Adams Media, David & Charles ;F+W Media | |
3262 | Inside Cyber Warfare: Mapping the Cyber Underworld | Jeffrey Carr | 2009 | O'Reilly Media, Inc | |
3263 | The First Cyber Death Extravaganza!: A Mock Passion Play | Douglas, Scott | 2009 | CreateSpace Independent Publishing Platform | |
3264 | Global Initiatives to Secure Cyberspace: An Emerging Landscape | Michael Portnoy, Seymour Goodman (auth.), Michael Portnoy, Seymour Goodman (eds.) | 2009 | Springer US | |
3265 | Astronomical Cybersketching: Observational Drawing with PDAs and Tablet PCs | Peter Grego (auth.) | 2009 | Springer-Verlag New York | |
3266 | In search of Jefferson's moose notes on the state of cyberspace | Post, David G | 2009 | Oxford University Press | |
3267 | Figurations of Violence and Belonging: Queerness, migranthood and nationalism in cyberspace and beyond | Adi Kuntsman | 2009 | Peter Lang | |
3268 | Cyberpower and National Security | Franklin Kramer (editor), Stuart H. Starr (editor), Larry Wentz (editor) | 2009 | POTOMAC BOOKS | |
3269 | Cyberpower and National Security | Franklin Kramer (editor), Stuart H. Starr (editor), Larry Wentz (editor) | 2009 | POTOMAC BOOKS | |
3270 | The Digital Cast of Being: Metaphysics, Mathematics, Cartesianism, Cybernetics, Capitalism, Communication | Michael Eldred | 2009 | De Gruyter | |
3271 | Cyber Law : Maximizing Safety and Minimizing Risk in Classrooms | Aimee M. Bissonette | 2009 | Corwin Press | |
3272 | Global Medium, Local Laws : Regulating Cross-Border Cyberhate | Bastiaan Vanacker | 2009 | LFB Scholarly Publishing LLC | |
3273 | Insider Attack and Cyber Security. Beyond the Hacker | Salvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, | 2008 | Springer | |
3274 | Insider attack and cyber security : beyond the hacker | Salvatore J Stolfo; et al | 2008 | Springer | |
3275 | Security and Software for Cybercafes | Esharenana E. Adomi, Esharenana E. Adomi | 2008 | IGI | |
3276 | Insider Attack and Cyber Security. Beyond the Hacker | Salvatore Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, | 2008 | Springer | |
3277 | The Allure of Machinic Life - Cybernetics, Artificial Life and the New AI | John Johnston | 2008 | The MIT Press | |
3278 | Cyber warfare and cyber terrorism | Lech J. Janczewski, Lech J. Janczewski, Andrew M. Colarik | 2008 | Information Science Reference | |
3279 | Systematics as Cyberscience: Computers, Change, and Continuity in Science (Inside Technol | Christine Hine | 2008 | The MIT Press | |
3280 | Architectural Principles in the Age of Cybernetics | Christopher Hight | 2008 | Routledge | |
3281 | Responses to Cyber Terrorism | Center of Excellence Defence Against Terror, Center of Excellence Defence Against Ter | 2008 | IOS Press | |
3282 | Cyber-Conflict and Global Politics | Athina Karatzogianni | 2008 | Routledge | |
3283 | Cyber-Bullying: Issues and Solutions for the School, the Classroom and the Home | Shaheen Shariff | 2008 | | |
3284 | Cyber Bullying: Bullying in the Digital Age | Robin M., PhD Kowalski, Susan P., PhD Limber, Patricia W., PhD Agatston | 2008 | | |
3285 | Global Initiatives to Secure Cyberspace: An Emerging Landscape (Advances in Information Se | Michael Portnoy, Seymour Goodman | 2008 | | |
3286 | Cyberculture and new media | Francisco J. Ricardo (editor) | 2008 | Rodopi | |
3287 | Encyclopedia of cybercrime | Samuel C. McQuade III (editor) | 2008 | Greenwood Press | |
3288 | The Politics of Caribbean Cyberculture | Curwen Best | 2008 | | |
3289 | Chinese Women and the Cyberspace (ICAS Publications Edited Volumes) | Khun Eng Kuah-Pearce | 2008 | | |
3290 | Security and Software for Cybercafes (Premier Reference Source) | Esharenana E. Adomi | 2008 | | |
3291 | Psychological aspects of cyberspace: theory, research, applications | Azy Barak (editor) | 2008 | Cambridge University Press | |
3292 | Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet | Ken Dunham, Jim Melnick | 2008 | | |
3293 | The Medicalization of Cyberspace | Andy Miah, Emma Rich | 2008 | Routledge | |
3294 | Cyber Ethics | Diane Bailey | 2008 | The Rosen Publishing Group | |
3295 | The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AI | John Johnston | 2008 | The MIT Press | |
3296 | Scene of the Cybercrime, Second Edition | Debra Littlejohn Shinder, Michael Cross | 2008 | Syngress | |
3297 | Technology and Nationalism in India: Cultural Negotiations from Colonialism to Cyberspace | Rohit Chopra | 2008 | Cambria Press | |
3298 | Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes | Albert J Marcella; Doug Menendez | 2008 | Auerbach Publications | |
3299 | Insider attack and cyber security : beyond the hacker | Salvatore J Stolfo; et al | 2008 | Springer | |
3300 | Cyber Bullying: The New Moral Frontier | Robin M. Kowalski, Susan P. Limber, Patricia W. Agatston(auth.) | 2008 | Wiley | |
3301 | Latin American cyberculture and cyberliterature | Claire Taylor, Thea Pitman (editors) | 2008 | Liverpool University Press | |
3302 | Latin American cyberculture and cyberliterature | Claire Taylor, Thea Pitman (editors) | 2008 | Liverpool University Press | |
3303 | The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AI | John Johnston | 2008 | A Bradford Book | |
3304 | Chinese Women and the Cyberspace | Khun Eng Kuah-Pearce | 2008 | Amsterdam University Press | |
3305 | Cybersemiotics: Why Information Is Not Enough! | Soren Brier | 2008 | University of Toronto Press | |
3306 | The Politics of Caribbean Cyberculture | Curwen Best (auth.) | 2008 | Palgrave Macmillan US | |
3307 | Latin American cyberculture and cyberliterature | Claire Taylor, Thea Pitman (editors) | 2008 | Liverpool University Press | |
3308 | Latin American cyberculture and cyberliterature | Claire Taylor, Thea Pitman (editors) | 2008 | Liverpool University Press | |
3309 | The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AI | John Johnston | 2008 | A Bradford Book | |
3310 | Chinese Women and the Cyberspace | Khun Eng Kuah-Pearce | 2008 | Amsterdam University Press | |
3311 | Cybersemiotics: Why Information Is Not Enough! | Soren Brier | 2008 | University of Toronto Press | |
3312 | The Politics of Caribbean Cyberculture | Curwen Best (auth.) | 2008 | Palgrave Macmillan US | |
3313 | Postmodern orientalism : William Gibson, cyberpunk and Japan | Leonard Patrick Sanders | 2008 | Massey University | |
3314 | The Allure of Machinic Life: Cybernetics, Artificial Life, and the New AI | John Johnston | 2008 | A Bradford Book,MIT | |
3315 | Complete 31 Free Lessons by GM Tejas Bakre, Cyberchess Lectures | coll. | 2008 | | |
3316 | Cyber Crime Fighters: Tales from the Trenches | Felicia Donovan | 2008 | Que Publishing | |
3317 | Cyberliteracy: Navigating the Internet with Awareness | Laura J. Gurak | 2008 | Yale University Press | |
3318 | Short Course in International Payments : Letters of Credit, Documentary Collections and Cyber Payments in International Transactions | Edward G. Hinkelman | 2008 | World Trade Press | |
3319 | Chinese Women and the Cyberspace | Khun Eng Kuah-Pearce (editor) | 2008 | Amsterdam University Press | |
3320 | Cybersemiotics: Why Information Is Not Enough | Soren Brier | 2008 | University of Toronto Press | |
3321 | Data Warehousing and Data Mining Techniques for Cyber Security | Anoop Singhal (auth.) | 2007 | Springer US | |
3322 | Cyber Forensics: A Field Manual for Collecting,Examining,and Preserving Evidence of Comput | Jr. Albert J. Marcella | 2007 | Unknown | |
3323 | Cyber crime investigations: bridging the gaps between security professionals, law enforcem | Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele | 2007 | Syngress Publishing | |
3324 | The best damn cybercrime and digital forensics book period | Jack Wiles, Anthony Reyes | 2007 | Syngress | |
3325 | Conquest in Cyberspace - National Security and Information Warfare | Martin C. Libicki | 2007 | Cambridge University Press | |
3326 | Cyberculture Theorists: Manuel Castells and Donna Haraway | David Bell | 2007 | Routledge | |
3327 | Cyberculture Theorists (Routledge Critical Thinkers) | David Bell | 2007 | Routledge | |
3328 | Sex in Cyberspace: Men Who Pay for Sex | Sarah Earle, Keith Sharp | 2007 | | |
3329 | Sex in Cyberspace: Men Who Pay for Sex | Sarah Earle, Keith Sharp | 2007 | | |
3330 | Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Comp | Albert Marcella Jr., Doug Menendez | 2007 | Auerbach Publications | |
3331 | Laws On Cyber Crimes: Alongwith IT Act and Relevant Rules | P.K. Singh | 2007 | Book Enclave | |
3332 | The Regulation of Cyberspace: Control in the Online Environment (Glasshouse) | Andrew D. Murray | 2007 | | |
3333 | Power and security in the information age: investigating the role of the state in cyberspa | Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) | 2007 | Ashgate | |
3334 | Toward a Safer and More Secure Cyberspace | Committee on Improving Cybersecurity Research in the United States, National Research Council | 2007 | | |
3335 | Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors | Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel, | 2007 | | |
3336 | Cybermancy (Ravirn, Book 2) | Kelly McCullough | 2007 | | |
3337 | Conquest in Cyberspace: National Security and Information Warfare | Martin C. Libicki | 2007 | Cambridge University Press | |
3338 | Rewired: The Post-Cyberpunk Anthology | James Patrick Kelly, John Kessel | 2007 | | |
3339 | Decoding Liberation: The Promise of Free and Open Source Software (Routledge Studies in New Media and Cyberculture) | Samir Chopra, Scott Dexter | 2007 | | |
3340 | Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors | Anthony Reyes, Richard Brittson, Kevin O'Shea, Jim Steel, | 2007 | | |
3341 | Cyber-Security and Threat Politics: US Efforts to Secure the Information Age (Css Studies in Security and International Relations) | Myriam Dunn Cavelty | 2007 | | |
3342 | Cyberlaw, Security and Privacy | Sylvia Mercado Kierkegaard (ed.) | 2007 | Ankara Bar Association Press | |
3343 | Cybernetical Physics: From Control of Chaos to Quantum Control (Understanding Complex Systems) | A. Fradkov | 2007 | Springer | |
3344 | The best damn cybercrime and digital forensics book period | Jack Wiles, Anthony Reyes | 2007 | Syngress | |
3345 | The total work of art: from Bayreuth to cyberspace | Matthew Wilson Smith | 2007 | Routledge | |
3346 | Rewired: The Post-Cyberpunk Anthology | James Patrick Kelly, John Kessel | 2007 | Tachyon Publications | |
3347 | Cybernetical Physics: From Control of Chaos to Quantum Control | Alexander L. Fradkov (auth.) | 2007 | Springer-Verlag Berlin Heidelberg | |
3348 | Data Warehousing and Data Mining Techniques for Cyber Security | Anoop Singhal (auth.) | 2007 | Springer US | |
3349 | The best damn cybercrime and digital forensics book period | Jack Wiles, Anthony Reyes | 2007 | Syngress | |
3350 | The best damn cybercrime and digital forensics book period | Jack Wiles, Anthony Reyes | 2007 | Syngress | |
3351 | Cyber Cop | Patricia Hynes | 2007 | Cherry Lake Publishing | |
3352 | Power and security in the information age: investigating the role of the state in cyberspace | Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) | 2007 | Ashgate | |
3353 | Power and security in the information age: investigating the role of the state in cyberspace | Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) | 2007 | Ashgate | |
3354 | Cybercrime : digital cops in a networked environment | J. M. Balkin, Katz Eddan, James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman | 2007 | New York University Press | |
3355 | Cybercrime : digital cops in a networked environment | J. M. Balkin & Jack Balkin & James Grimmelmann & Eddan Katz & Nimrod Kozlovski & Shlomit Wagman & Tal Zarsky | 2007 | New York University Press | |
3356 | The best damn cybercrime and digital forensics book period | Jack Wiles, Anthony Reyes | 2007 | Syngress | |
3357 | The best damn cybercrime and digital forensics book period | Jack Wiles, Anthony Reyes | 2007 | Syngress | |
3358 | Cyber Cop | Patricia Hynes | 2007 | Cherry Lake Publishing | |
3359 | Power and security in the information age: investigating the role of the state in cyberspace | Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) | 2007 | Ashgate | |
3360 | Power and security in the information age: investigating the role of the state in cyberspace | Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel (editors) | 2007 | Ashgate | |
3361 | Cybercrime : digital cops in a networked environment | J. M. Balkin, Katz Eddan, James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman | 2007 | New York University Press | |
3362 | Cybercrime : digital cops in a networked environment | J. M. Balkin & Jack Balkin & James Grimmelmann & Eddan Katz & Nimrod Kozlovski & Shlomit Wagman & Tal Zarsky | 2007 | New York University Press | |
3363 | Cybermapping and the writing of myth | Jahshan, Paul | 2007 | P. Lang | |
3364 | Chinese cyber nationalism : evolution, characteristics, and implications | Wu, Xu | 2007 | Lexington Books | |
3365 | Evidence Explained: Citing History Sources from Artifacts to Cyberspace | Elizabeth Shown Mills | 2007 | Genealogical Publishing Company | |
3366 | Rewired: the post-cyberpunk anthology | Kessel, John;Kelly, James, Patrick;editor | 2007 | Tachyon Publications | |
3367 | The Resurgence of the State: Trends and Processes in Cyberspace Governance | Cavelty, Myriam Dunn;Krishna-Hensel, Sai Felicia(Editor) | 2007 | Routledge | |
3368 | Cybernetics and Design | Ranulph Glanville; Ranulph Glanville | 2007 | Emerald Publishing Limited | |
3369 | Cybercrime: Digital Cops in a Networked Environment | Jack M. Balkin (editor); James Grimmelmann (editor); Eddan Katz (editor); Nimrod Kozlovski (editor); Shlomit Wagman (editor); Tal Zarsky (editor) | 2007 | New York University Press | |
3370 | Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Se | Anoop Singhal | 2006 | | |
3371 | Cyber Terrorism: Political and Economic Implications | Andrew M. Colarik | 2006 | Idea Group Publishing | |
3372 | Digital Crime and Forensic Science in Cyberspace | et al, Panagiotis Kanellis | 2006 | Idea Group Pub | |
3373 | Code: And Other Laws of Cyberspace, Version 2.0 | Lawrence Lessig | 2006 | Basic Books | |
3374 | Handbook for bloggers and cyberdissidents | Sylvie Devilette, Anne Martinez-Saiz, Nuit de Chine | 2006 | Reporters Without Borders | |
3375 | Cyberculture, cyborgs and science fiction: consciousness and the posthuman | William S. Haney II | 2006 | Rodopi | |
3376 | The Law and Economics of Cybersecurity | Mark F. Grady, Francesco Parisi | 2006 | Cambridge University Press | |
3377 | Handbook for Bloggers and Cyber-Dissidents | Sylvie Devilette, Anne Martinez-Saiz, Nuit de Chine | 2006 | Reporters Without Borders | |
3378 | Cyberpop: digital lifestyles and commodity culture | Sidney Eve Matrix | 2006 | Routledge | |
3379 | Cybercrime and society | Majid Yar | 2006 | SAGE Publications | |
3380 | Advances in Machine Learning and Cybernetics: 4th International Conference, ICMLC 2005, Gu | Li Xu, Wen-Xiang Gu, Xin-Mei Zhang (auth.), Daniel S. Yeung, Zhi-Qiang Liu, Xi-Zhao Wang, | 2006 | Springer-Verlag Berlin Heidelberg | |
3381 | The Internet in China: cyberspace and civil society | Zixue Tai | 2006 | Routledge | |
3382 | Cyber Terrorism: Political And Economic Implications | Andrew M. Colarik | 2006 | | |
3383 | Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Se | Anoop Singhal | 2006 | | |
3384 | From counterculture to cyberculture: Stewart Brand, the Whole Earth Network, and the rise | Fred Turner | 2006 | University of Chicago Press | |
3385 | Cyberwar, Netwar and the Revolution in Military Affairs | Edward F. Halpin, Philippa Trevorrow, David Webb, Steve Wright | 2006 | | |
3386 | Faux Paw Meets the First Lady: How to Handle Cyber-bullying | Jacalyn Leavitt, Sally Linford | 2006 | | |
3387 | Chinese Cyberspaces Technological Changes and Political Effects (Asia's Transformations) | Jens Damm, Simona Thomas | 2006 | | |
3388 | Cyberwar, Netwar and the Revolution in Military Affairs | Edward F. Halpin, Philippa Trevorrow, David Webb, Steve Wright | 2006 | | |
3389 | The Politics of Cyberconflict: Security, Ethnoreligious and Sociopolitical conflicts (Routledge Research in Information Technology and Society) | Karatzogianni | 2006 | | |
3390 | ‘We’re Okay with Fake’: Cybercinematography and the Spectre of Virtual Actors in S1MØNE | Sidney Eve Matrix | 2006 | | |
3391 | Cyberwar-netwar: Security in the Information Age (NATO Security Through Science Series) (Nato Security Through Science Series) | et al F. D. Garvalho (Editor) | 2006 | | |
3392 | Cybercrime and society | Majid Yar | 2006 | SAGE Publications | |
3393 | World Weavers: Globalization, Science Fiction, and The Cybernetic Revolution | Wong Kin Yuen, Gary Westfahl, Amy Kit-sze Chan | 2006 | Hong Kong Univ Pr | |
3394 | Cybernetics and public administration | Angela Ma Espinosa Salazar, Allenna Leonard | 2006 | The International Journal of Systems & Cybernetics | |
3395 | Cybercultures: Critical Concepts in Media and Cultural Studies Vol 1 | David Bell | 2006 | Informa HealthCare | |
3396 | Cybercultures: Critical Concepts in Media and Cultural Studies Vol. 2 | David Bell | 2006 | Routledge | |
3397 | Cybercultures: Critical Concepts in Media and Cultural Studies Vol. 3 | David Bell | 2006 | Informa HealthCare | |
3398 | Cyberwar-Netwar : security in the information age | Fernando Duarte Carvalho; Eduardo Mateus da Silva | 2006 | IOS Press | |
3399 | Chinese cyberspaces: technological changes and political effects | Jens Damm, Simona Thomas (editors) | 2006 | Routledge | |
3400 | Cybersecurity for SCADA Systems | Shaw, William T. | 2006 | PennWell | |
3401 | Cybersecurity for SCADA Systems | Shaw, William T. | 2006 | PennWell | |
3402 | Cyberculture, cyborgs and science fiction : consciousness and the posthuman | William S. Haney II | 2006 | Rodopi | |
3403 | Cyberspaces of everyday life | Nunes, Mark | 2006 | Univ Of Minnesota Press | |
3404 | Cyberwar, Netwar and the Revolution in Military Affairs | Dr Edward Halpin, Dr Philippa Trevorrow, Professor David Webb, Dr Steve Wright (eds.) | 2006 | Palgrave Macmillan UK | |
3405 | Cybersecurity for SCADA Systems | Shaw, William T. | 2006 | PennWell | |
3406 | Cybersecurity for SCADA Systems | Shaw, William T. | 2006 | PennWell | |
3407 | Cyberculture, cyborgs and science fiction : consciousness and the posthuman | William S. Haney II | 2006 | Rodopi | |
3408 | Cyberspaces of everyday life | Nunes, Mark | 2006 | Univ Of Minnesota Press | |
3409 | Cyberwar, Netwar and the Revolution in Military Affairs | Dr Edward Halpin, Dr Philippa Trevorrow, Professor David Webb, Dr Steve Wright (eds.) | 2006 | Palgrave Macmillan UK | |
3410 | Critical Cyberculture Studies | David Silver; Adrienne Massanari (eds.) | 2006 | NYU Press | |
3411 | Dark Hero of the Information Age: In Search of Norbert Wiener The Father of Cybernetics | Flo Conway, Jim Siegelman | 2006 | Basic Books | |
3412 | Full metal apache : transactions between cyberpunk Japan and avant-pop America | Tatsumi, Takayuki | 2006 | Duke University Press | |
3413 | Cyberculture, Cyborgs and Science Fiction: Consciousness and the Posthuman | William S. Haney | 2006 | Rodopi | |
3414 | Cybersounds: Essays on Virtual Music Culture | Michael D. Ayer, Elizabeth Buchanan, Markus Giesler, Andrew Whelan, Andre Pinard, Sean Jacob, Adam Haupt, Darah O'Reilly, Chris Anderton, Gabrielle Consentino, Trace Reddell, Kathy Doherty, Jonathan Sterne, John Ryan, Michael Hughes | 2006 | Peter Lang Inc., International Academic Publishers | |
3415 | From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism | Fred Turner | 2006 | University of Chicago Press | |
3416 | Critical Cyberculture Studies | David Silver (editor); Adrienne Massanari (editor); Steve Jones (editor) | 2006 | New York University Press | |
3417 | Full Metal Apache: Transactions Between Cyberpunk Japan and Avant-Pop America | Takayuki Tatsumi (editor); Stanley Fish (editor); Fredric Jameson (editor); Larry McCaffery (editor) | 2006 | Duke University Press | |
3418 | Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives | Ted Fair, Michael Nordfelt, Sandra Ring, Dr. Eric Cole | 2005 | Syngress Publishing | |
3419 | Cyber Spying Tracking Your Family's Sometimes) Secret Online Lives | Ted Fair, Michael Nordfelt, Sandra Ring, Dr. Eric Cole | 2005 | Syngress Publishing | |
3420 | Managing cyber threats: issues, approaches, and challenges | Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic | 2005 | Springer | |
3421 | Fighting Terror in Cyberspace | Mark Last, Abraham Kandel | 2005 | World Scientific | |
3422 | Cyberspace security and defense: research issues. Proceedings of the NATO Advanced Researc | Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko | 2005 | Springer | |
3423 | Cybertech Publishing, Working Virtually Challenges Of Virtual Teams | | 2005 | | |
3424 | Signposts in Cyberspace: The Domain Name System And Internet Navigation | National Research Council (U. S.) | 2005 | | |
3425 | Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) | Vipin Kumar (Editor), Jaideep Srivastava (Editor), Aleksandar Lazarevic (Editor) | 2005 | | |
3426 | Managerial Guide for Handling Cyber-Terrorism and Information Warfare | Lech Janczewski, Andrew M. Colarik | 2005 | | |
3427 | Religion and Cyberspace | Morten T. Hojsgaard, Margit Warburg | 2005 | | |
3428 | Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, ... II: Mathematics, Physics and Chemistry) | Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko | 2005 | | |
3429 | Cyber Alert: How the World Is Under Attack from a New Form of Crime | Peter Warren, Michael Streeter | 2005 | | |
3430 | Holistic Darwinism: Synergy, Cybernetics, and the Bioeconomics of Evolution | Peter A. Corning | 2005 | | |
3431 | Cyber spying: tracking your family's (sometimes) secret online lives | Ted Fair, Michael Nordfelt, Eric Cole, Sandra Ring | 2005 | Syngress | |
3432 | Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives | Ted Fair, Michael Nordfelt, Sandra Ring | 2005 | Syngress Publishing | |
3433 | Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives | Ted Fair, Michael Nordfelt, Sandra Ring | 2005 | Syngress Publishing | |
3434 | Cybersecurity of Freight Information Systems: A Scoping Study (Special Report (National Research Council (U S) Transportation Research Board)) | National Research Council (U. S.) | 2005 | National Academies Press | |
3435 | Cybercartography: Theory and Practice | D.R. Fraser Taylor (Eds.) | 2005 | Elsevier Science | |
3436 | Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004 | Andrzej Bialas (auth.), Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko (eds.) | 2005 | Springer Netherlands | |
3437 | Bush, City, Cyberspace. The Development of Australian Children's Literature Into the 21st Century | John Foster, Ern Finnis and Maureen Nimon (Auth.) | 2005 | Chandos Publishing | |
3438 | Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004 | Andrzej Bialas (auth.), Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko (eds.) | 2005 | Springer Netherlands | |
3439 | Bush, City, Cyberspace. The Development of Australian Children's Literature Into the 21st Century | John Foster, Ern Finnis and Maureen Nimon (Auth.) | 2005 | Chandos Publishing | |
3440 | Cyber Consumer Law and Unfair Trading Practices | Cristina Coteanu | 2005 | Ashgate Publishing; Routledge | |
3441 | Cyberspaces of Their Own: Female Fandoms Online | Rhiannon Bury | 2005 | Peter Lang Inc., International Academic Publishers | |
3442 | Cybernetic Intelligence | Mourad Oussalah | 2005 | Emerald Publishing Limited | |
3443 | Interactive Realism : The Poetics of Cyberspace | Daniel Downes | 2005 | McGill-Queen's University Press | |
3444 | Interactive Realism: The Poetics of Cyberspace | Daniel Downes | 2005 | McGill-Queen's University Press | |
3445 | Ruling the Root: Internet Governance and the Taming of Cyberspace | Milton L. Mueller | 2004 | The MIT Press | |
3446 | Cyber Adversary Characterization: Auditing the Hacker Mind | Parker T., Sachs M., Shaw E. | 2004 | | |
3447 | Supercomputers: Charting the Future of Cybernetics | Charlene W. Billings, Sean M. Grady | 2004 | Facts on File | |
3448 | Hacktivism and Cyberwars: Rebels with a Cause? | Tim Jordan, Paul Taylor | 2004 | Routledge | |
3449 | Systematics As Cyberscience | Christine Hine | 2004 | MIT | |
3450 | Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Tr | John F. Ehlers | 2004 | Wiley | |
3451 | Cyber China: Reshaping National Identities in the Age of Information | Francoise Mengin | 2004 | Palgrave Macmillan | |
3452 | Cybercrime: A Reference Handbook | Clemens Martin, Bernadette Schell, Mildred Vasan | 2004 | ABC-CLIO | |
3453 | Cyber Criminals on Trial | Russell G. Smith, Peter Grabosky, Gregor Urbas | 2004 | Cambridge University Press | |
3454 | Cybernetic analysis for stocks and futures | John F. Ehlers | 2004 | Wiley | |
3455 | Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Tr | John F. Ehlers | 2004 | Wiley | |
3456 | Shaping the Network Society: The New Role of Civil Society in Cyberspace | Douglas Schuler, Peter Day | 2004 | The MIT Press | |
3457 | Cyber Crime Investigator's Field Guide, Second Edition | Bruce Middleton | 2004 | | |
3458 | Cyberprotest: New Media, Citizens and Social Movements | W. Van De Donk | 2004 | | |
3459 | Ruling the Root : Internet Governance and the Taming of Cyberspace | Milton L. Mueller | 2004 | | |
3460 | The Digital Sublime: Myth, Power, and Cyberspace | Vincent Mosco | 2004 | The MIT Press | |
3461 | Cyber China: Reshaping National Identities in the Age of Information (Sciences Po Series in International Relations and Political Economy) | Francoise Mengin | 2004 | | |
3462 | Cyberculture: the key concepts | David J. Bell, Brian D. Loader, Nicholas Pleace, Douglas Schuler (editors) | 2004 | Routledge | |
3463 | 4th Party Cyber Logistics for Air Cargo | Sung-Chi Chu | 2004 | | |
3464 | Dark Hero Of The Information Age: In Search of Norbert Wiener The Father of Cybernetics | Flo Conway, Jim Siegelman, | 2004 | | |
3465 | Cyberspace, Distance Learning, and Higher Education In Developing Countries: Old and Emergent Issues Of Access, Pedagogy, and Knowledge Production(International Studies in Sociology and Social Anthropology) | N'dri Therese Assie-Lumumba | 2004 | Brill Academic Publishers | |
3466 | Cybertherapy: internet and virtual reality as assessment and rehabilitation tools for clinical psychology and neuroscience | G. Riva | 2004 | IOS Press | |
3467 | The Digital Sublime: Myth, Power, and Cyberspace | Vincent Mosco | 2004 | The MIT Press | |
3468 | The Cybercities Reader (Routledge Urban Reader Series) | Steve Graham (editor) | 2004 | Routledge | |
3469 | Cybercultures: Critical Concepts in Media and Cultural Studies Vol. 4 | David Bell | 2004 | Routledge | |
3470 | Career Opportunities in Computers and Cyberspace, 2nd Edition | Harry Henderson | 2004 | Facts on File | |
3471 | Cyber adversary characterization : auditing the hacker mind | Tom Parker; et al | 2004 | Syngress | |
3472 | Cyber adversary characterization : auditing the hacker mind | Tom Parker; et al | 2004 | Syngress | |
3473 | Understanding biotechnology : an integrated and cyber-based approach | George Acquaah | 2004 | Pearson/Prentice Hall | |
3474 | 4th Party Cyber Logistics for Air Cargo | Sung-Chi Chu, Lawrence C. Leung, Yer Van Hui, Waiman Cheung (auth.), Frederick S. Hillier (eds.) | 2004 | Springer US | |
3475 | Consumer Informatics: Applications and Strategies in Cyber Health Care | D. Goldsmith, C. Safran (auth.), Rosemary Nelson RN, BC, CPHIMS, FHIMSS, Marion J. Ball EdD (eds.) | 2004 | Springer-Verlag New York | |
3476 | Cyber Adversary Characterization: Auditing the Hacker Mind | Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost | 2004 | Syngress | |
3477 | Cyber China: Reshaping National Identities in the Age of Information | Françoise Mengin (eds.) | 2004 | Palgrave Macmillan US | |
3478 | Consumer Informatics: Applications and Strategies in Cyber Health Care | D. Goldsmith, C. Safran (auth.), Rosemary Nelson RN, BC, CPHIMS, FHIMSS, Marion J. Ball EdD (eds.) | 2004 | Springer-Verlag New York | |
3479 | Cyber Adversary Characterization: Auditing the Hacker Mind | Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost | 2004 | Syngress | |
3480 | Cyber China: Reshaping National Identities in the Age of Information | Françoise Mengin (eds.) | 2004 | Palgrave Macmillan US | |
3481 | Cyber terrorism: a guide for facility managers | Gustin, Joseph F | 2004 | Fairmont Press | |
3482 | Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity | John Edward Campbell | 2004 | Routledge | |
3483 | Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity | John Edward Campbell | 2004 | Routledge | |
3484 | Cyberhenge: Modern Pagans on the Internet | Douglas E. Cowan | 2004 | Routledge | |
3485 | Hacktivism and Cyberwars | Jordan, Tim;Taylor, Paul A | 2004 | Routledge | |
3486 | Ruling the root: Internet governance and the taming of cyberspace | Mueller, Milton | 2004 | MIT Press | |
3487 | Cyber Selves: Feminist Ethnographies of South Asian Women | Radhika Gajjala | 2004 | Altamira Press | |
3488 | Race-ing for cybercultures : the performance of minoritarian cultural work as challenge to presumptive whiteness on the internet | Christopher McGahan. | 2004 | | |
3489 | Virtual Worlds: Culture and Politics in the Age of Cybertechnology | Pramod K. Nayar | 2004 | SAGE Publications | |
3490 | International Encyclopedia of Systems and Cybernetics | Charles Francois | 2004 | K. G. Saur | |
3491 | Hacktivism and Cyberwars: Rebels with a Cause? | Tim Jordan; Paul Taylor | 2004 | Routledge | |
3492 | Kybernetes: The international journal of systems & cybernetics, Volume 32, Issue 7/8, 2003 | | 2003 | | |
3493 | Cybersecurity operations handbook | John W. Rittinghouse, William M. Hancock | 2003 | Digital Press | |
3494 | Understanding understanding: essays on cybernetics and cognition | Heinz Von Foerster | 2003 | Springer | |
3495 | Cybercash: The Coming Era of Electronic Money | Guttmann R. | 2003 | | |
3496 | Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environme | Gary R. Bunt | 2003 | Pluto Press | |
3497 | Charles Dickens in Cyberspace: The Afterlife of the Nineteenth Century in Postmodern Cultu | Jay Clayton | 2003 | | |
3498 | C++ Programming Fundamentals (Cyberrookies Series) | Chuck Easttom | 2003 | | |
3499 | Cyberfeminism and Artificial Life | Sarah Kember | 2003 | | |
3500 | Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus) | Charlene W. Billings, Sean M. Grady | 2003 | | |
3501 | Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus) | Charlene W. Billings, Sean M. Grady | 2003 | | |
3502 | Living with cyberspace: technology and society in the 21st century | John Armitage, Joanne Roberts (editors) | 2003 | Continuum | |
3503 | Understanding Biotechnology: An Integrated and Cyber-Based Approach | George Acquaah | 2003 | | |
3504 | Japanese cybercultures | Nanette Gottlieb, Mark McLelland (editors) | 2003 | Routledge | |
3505 | The African American Experience In Cyberspace: A Resource Guide to the Best Web Sites on Black Culture and History | Abdul Alkalimat | 2003 | | |
3506 | Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus) | Charlene W. Billings, Sean M. Grady | 2003 | | |
3507 | The Knowledge Landscapes of Cyberspace | David Hakken | 2003 | | |
3508 | Supercomputers: Charting the Future of Cybernetics (Science and Technology in Focus) | Charlene W. Billings, Sean M. Grady | 2003 | | |
3509 | The African American Experience In Cyberspace: A Resource Guide to the Best Web Sites on Black Culture and History | Abdul Alkalimat | 2003 | | |
3510 | Cyber Rights: Defending Free speech in the Digital Age | Mike Godwin | 2003 | The MIT Press | |
3511 | The Cyberspace Handbook (Media Practice) | Jason Whittaker | 2003 | Routledge | |
3512 | Cyber Terrorism: A Guide for Facility Managers | Joseph F. Gustin | 2003 | Fairmont Pr | |
3513 | The Psychocybernetic Model of Art Therapy, Second Edition | Aina O. Nucho | 2003 | Charles C Thomas Pub Ltd | |
3514 | Virtual Society?: Technology, Cyberbole, Reality | Steve Woolgar (ed.) | 2003 | Oxford University Press | |
3515 | Islam in the digital age : e-jihad, online fatwas and cyber Islamic environments | Gary R Bunt | 2003 | Pluto Press | |
3516 | Control and Modeling of Complex Systems: Cybernetics in the 21st Century Festschrift in Honor of Hidenori Kimura on the Occasion of his 60th Birthday | Christopher I. Byrnes, Anders Lindquist (auth.), Koichi Hashimoto, Yasuaki Oishi, Yutaka Yamamoto (eds.) | 2003 | Birkhäuser Basel | |
3517 | Cybersecurity operations handbook | John W. Rittinghouse, William M. Hancock | 2003 | Digital Press | |
3518 | Cybersecurity operations handbook | John W. Rittinghouse, William M. Hancock | 2003 | Digital Press | |
3519 | Cybercash: The Coming Era of Electronic Money | Robert Guttmann (auth.) | 2003 | Palgrave Macmillan UK | |
3520 | Cyberactivism: Online Activism in Theory and Practice | Martha McCaughey, Michael D. Ayers (eds.) | 2003 | Routledge | |
3521 | Cyberactivism: Online Activism in Theory and Practice | Martha McCaughey, Michael D. Ayers | 2003 | Routledge | |
3522 | Cyberfeminism: Connectivity, Critique and Creativity | Renate Klein, Susan Hawthorne | 2003 | Spinifex Press | |
3523 | Cybercash the coming era of electronic money | Guttmann, Robert | 2003 | Palgrave Macmillan | |
3524 | Virtual Geographies: Cyberpunk At The Intersection Of The Postmodern And Science Fiction | Sabine Heuser | 2003 | Brill | Rodopi | |
3525 | Self-Games and Body-Play: Personhood in Online Chat and Cybersex | Dennis D. Waskul | 2003 | Peter Lang Inc., International Academic Publishers | |
3526 | Asian America.Net: Ethnicity, Nationalism, and Cyberspace | Rachel C. Lee (editor), Sau-ling Cynthia Wong (editor) | 2003 | Routledge | |
3527 | Asian America.Net: Ethnicity, Nationalism, and Cyberspace | Rachel C. Lee (editor), Sau-ling Cynthia Wong (editor) | 2003 | Routledge | |
3528 | The Ontology of Cyberspace: Philosophy, Law, and the Future of Intellectual Property | David R. Koepsell | 2003 | Open Court Publishing | |
3529 | The Political Mapping of Cyberspace | Jeremy Crampton | 2003 | Edinburgh University Press | |
3530 | Cyber Crime Investigator's Field Guide | Bruce Middleton | 2002 | CRC Press | |
3531 | Scene of the Cybercrime: Computer Forensics Handbook | Shinder D.L., Tittel E. | 2002 | | |
3532 | Sony Advanced Cyber-shot eBook | Peter iNova | 2002 | Graphics Management Press | |
3533 | Cyber Forensics | Albert Marcella Jr., Robert S. Greenfield | 2002 | Auerbach Publications | |
3534 | Scene of the Cybercrime | Debra Littlejohn Shinder, Ed Tittel | 2002 | Syngress | |
3535 | Cyber Forensics - A Field Manual For Collecting, Examining, And Preserving Evidence Of Com | Albert J., Jr.; Greenfield, Robert S. Marcella | 2002 | Auerbach Publications | |
3536 | Cyber crime investigator's field guide | Bruce Middleton | 2002 | CRC Press | |
3537 | Cyber crime investigator's field guide | Bruce Middleton | 2002 | CRC Press | |
3538 | Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Comp | Albert Marcella Jr., Robert S. Greenfield | 2002 | Auerbach Publications | |
3539 | Cyber Crime Investigator's Field Guide | Bruce Middleton | 2002 | CRC Press | |
3540 | Understanding Understanding: Essays on Cybernetics and Cognition | Heinz Von Foerster | 2002 | Springer | |
3541 | Understanding Understanding: Essays on Cybernetics and Cognition | Heinz Von Foerster | 2002 | Springer | |
3542 | The Cyberiad | Stanislaw Lem | 2002 | Mariner Books | |
3543 | Understanding Understanding: Essays on Cybernetics and Cognition | Heinz Von Foerster | 2002 | Springer | |
3544 | Cyber Crime Investigator's Field Guide | Bruce Middleton | 2002 | CRC Press | |
3545 | New Psycho-Cybernetics | Maxwell Maltz | 2002 | Prentice Hall Press | |
3546 | Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Comp | Albert Marcella Jr., Robert S. Greenfield | 2002 | Auerbach Publications | |
3547 | Atlas of Cyberspace | Rob Kitchin, Martin Dodge | 2002 | Pearson Education | |
3548 | Between Human and Machine: Feedback, Control, and Computing before Cybernetics | David A. Mindell | 2002 | The Johns Hopkins University Press | |
3549 | Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Comp | Albert Marcella Jr., Robert S. Greenfield | 2002 | Auerbach Publications | |
3550 | The Cyberunion Handbook: Transforming Labor Through Computer Technology | Arthur B. Shostak | 2002 | M.E. Sharpe | |
3551 | Scene of the Cybercrime: Computer Forensics Handbook | Debra Littlejohn Shinder, Ed Tittel | 2002 | Syngress Publishing | |
3552 | Cybersecurity Today and Tomorrow | National Research Council | 2002 | | |
3553 | Creating Cyber Libraries: An Instructional Guide for School Library Media Specialists | Kathleen W. Craver | 2002 | | |
3554 | From Newspeak to Cyberspeak: A History of Soviet Cybernetics | Slava Gerovitch | 2002 | | |
3555 | Cybersecurity Today and Tomorrow | National Research Council | 2002 | | |
3556 | Naked in Cyberspace: How to Find Personal Information Online | Carole A. Lane | 2002 | | |
3557 | From Celluliod to Cyberspace: The Media Arts and the Changing Arts World | Kevin F. McCarthy | 2002 | | |
3558 | Cybercash: The Coming Era of Electronic Money | Robert Guttmann | 2002 | | |
3559 | The Cyber Spellbook: Magick in the Virtual World | Patricia Telesco, Sirona Knight | 2002 | | |
3560 | Cyberia: Life in the Trenches of Cyberspace | Douglas Rushkoff | 2002 | | |
3561 | Cyber Spaces Social Spaces: Culture Clash in Computerized Classrooms | Ivor F. Goodson, Michele Knobel, Colin Lankshear, J. Marshall Mangan | 2002 | | |
3562 | Technoculture: From alphabet to cybersex | Lelia Green | 2002 | | |
3563 | Building virtual communities: learning and change in cyberspace | K. Ann Renninger, Wesley Shumar | 2002 | Cambridge University Press | |
3564 | Cybering Democracy: Public Space and the Internet | Diana Saco | 2002 | University of Minnesota Press | |
3565 | Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace | David Chanoff, Ejovi Nuwere | 2002 | William Morrow | |
3566 | Cyberia: life in the trenches of hyperspace | Douglas Rushkoff | 2002 | Clinamen Press | |
3567 | The Cyberiad | Stanislaw Lem | 2002 | Mariner Books | |
3568 | Cyber forensics - a field manual for collecting, examining, and preserving evidence of computer crimes | Albert J. Marcella, Robert Greenfield, editors | 2002 | Auerbach | |
3569 | Cyber Commerce Reframing: The End of Business Process Reengineering? | Uwe G. Seebacher (auth.) | 2002 | Springer-Verlag Berlin Heidelberg | |
3570 | The Discovery of the Artificial: Behavior, Mind and Machines Before and Beyond Cybernetics | Roberto Cordeschi (auth.) | 2002 | Springer Netherlands | |
3571 | Information Spaces: The Architecture of Cyberspace | Robert M. Colomb PhD (auth.) | 2002 | Springer-Verlag London | |
3572 | Cyber Policy and Economics in an Internet Age | William H. Lehr, Lorenzo M. Pupillo (auth.), William H. Lehr, Lorenzo M. Pupillo (eds.) | 2002 | Springer US | |
3573 | Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes | Albert Marcella Jr., Robert S. Greenfield | 2002 | Auerbach Publications | |
3574 | Understanding Understanding: Essays on Cybernetics and Cognition | Heinz Von Foerster | 2002 | Springer | |
3575 | From Celluloid to Cyberspace: The Media Arts and the Changing Arts World | Kevin F. McCarthy, Elizabeth Heneghan Ondaatje | 2002 | RAND Corporation | |
3576 | Cybering democracy : public space and the Internet | Saco, Diana | 2002 | University of Minnesota Press | |
3577 | Ruling the Root: Internet Governance and the Taming of Cyberspace | Milton Mueller | 2002 | MIT Press | |
3578 | Cyber Spaces/Social Spaces: Culture Clash in Computerized Classrooms | Ivor Goodson, Michele Knobel, Colin Lankshear, J. Marshall Mangan (auth.) | 2002 | Palgrave Macmillan US | |
3579 | The Complete Internet and World Wide Web Cyber Classroom | Deitel, Harvey M.; Nieto, Tem R.; Deitel, Paul J | 2002 | Prentice Hall | |
3580 | Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes | Albert Marcella Jr., Robert S. Greenfield | 2002 | Auerbach Publications | |
3581 | Understanding Understanding: Essays on Cybernetics and Cognition | Heinz Von Foerster | 2002 | Springer | |
3582 | From Celluloid to Cyberspace: The Media Arts and the Changing Arts World | Kevin F. McCarthy, Elizabeth Heneghan Ondaatje | 2002 | RAND Corporation | |
3583 | Cybering democracy : public space and the Internet | Saco, Diana | 2002 | University of Minnesota Press | |
3584 | Ruling the Root: Internet Governance and the Taming of Cyberspace | Milton Mueller | 2002 | MIT Press | |
3585 | Cyber Spaces/Social Spaces: Culture Clash in Computerized Classrooms | Ivor Goodson, Michele Knobel, Colin Lankshear, J. Marshall Mangan (auth.) | 2002 | Palgrave Macmillan US | |
3586 | The Complete Internet and World Wide Web Cyber Classroom | Deitel, Harvey M.; Nieto, Tem R.; Deitel, Paul J | 2002 | Prentice Hall | |
3587 | Cyber-Diplomacy : Managing Foreign Policy in the Twenty-First Century | Evan H. Potter | 2002 | MQUP | |
3588 | Cybertypes: Race, Ethnicity, and Identity on the Internet | Lisa Nakamura | 2002 | Routledge | |
3589 | Scene of the Cybercrime: Computer Forensics Handbook | Debra Littlejohn Shinder, Ed Tittel (editor) | 2002 | Syngress Media Inc | |
3590 | The Rules for Online Dating: Capturing the Heart of Mr. Right in Cyberspace | Ellen Fein; Sherrie Schneider | 2002 | Gallery Books | |
3591 | Reload: Rethinking Women + Cyberculture | Mary Flanagan; Austin Booth | 2002 | MIT Press | |
3592 | Living with Cyberspace: Technology and Society in the 21st Century | John Armitage; Joanne Roberts (editors) | 2002 | Continuum | |
3593 | Cyberkids : Youth Identities and Communities in an on-Line World | Sarah Holloway; Gill Valentine | 2002 | Taylor & Francis Group | |
3594 | Developing Media Literacy in Cyberspace : Pedagogy and Critical Learning for the Twenty-First Century Classroom | Julie D. Frechette | 2002 | Greenwood Publishing Group, Incorporated | |
3595 | Cyber-Diplomacy: Managing Foreign Policy in the Twenty-First Century | Evan H. Potter | 2002 | McGill-Queen's University Press | |
3596 | Crime and the Internet [cybercrime] | Wall | 2001 | Routledge | |
3597 | Cyber Crime Investigator's Field Guide | Bruce Middleton | 2001 | Auerbach Publications | |
3598 | Hacking Cyberspace | David J. Gunkel | 2001 | Westview Press | |
3599 | Trust in Cyber-societies: Integrating the Human and Artificial Perspectives | Rino Falcone, Munindar Singh, Yao-Hua Tan (auth.), Rino Falcone, Munindar Singh, Yao-Hua T | 2001 | Springer-Verlag Berlin Heidelberg | |
3600 | Cyberpunk and Cyberculture: Science Fiction and the Work of William Gibson | Dani Cavallaro | 2001 | | |
3601 | Cyberbranding: Brand Building in the Digital Economy | Deirdre Breakenridge | 2001 | | |
3602 | Cybereducation: The Future of Long-Distance Learning | Larry R., Ph.D. Vandervert, Larisa V. Shavinina, Richard A. Cornell | 2001 | | |
3603 | Cybernation (Tom Clancy's Net Force, No. 6) | Steve Perry, Tom Clancy, Steve Pieczenik | 2001 | | |
3604 | Beyond Our Control? Confronting the Limits of Our Legal System in the Age of Cyberspace | Stuart Biegel | 2001 | | |
3605 | The Ethics of Cyberspace | Professor Cees J Hamelink | 2001 | Sage Publications Ltd | |
3606 | Vision: The Approach of Biophysics and Neurosciences : Proceedings of the International School of Biophysics Casamicciola, Napoli, Italy, 11-16 October ... on Biophysics and Biocybernetics) (v. 11) | Carlo Musio | 2001 | | |
3607 | An introduction to cybercultures | David Bell | 2001 | Routledge | |
3608 | Information Warfare: How to Survive Cyber Attacks | Michael Erbschloe, John Vacca | 2001 | | |
3609 | Cyberpl@y: Communicating Online (New Technologies New Cultures Series) | Brenda Danet | 2001 | | |
3610 | Sociocybernetics: Complexity, Autopoiesis, and Observation of Social Systems (Controversies in Science) | Rudolf F. Geyer, Johannes van der Zouwen | 2001 | Praeger | |
3611 | Crypto Anarchy, Cyberstates, and Pirate Utopias | Peter Ludlow | 2001 | The MIT Press | |
3612 | Hacking Cyberspace | David J. Gunkel | 2001 | | |
3613 | Lessons from the Cyberspace Classroom: The Realities of Online Teaching (Jossey Bass Higher and Adult Education Series) | Rena M. Palloff, Keith Pratt | 2001 | | |
3614 | Emotions, Qualia, and Consciousness: Proceedings of the International School of Biocybernetics Casamicciola, Napoli, Italy, 19-24 October 1998 (Biophysics and Biocybernetics) | International School of Biocybernetics, Alfred W. Kaszniak | 2001 | World Scientific Pub Co Inc | |
3615 | The Cybernetic Hypothesis | Tiqqun | 2001 | | |
3616 | Obscene Profits: The Entrepreneurs of Pornography in the Cyber Age | Frederick S. Lane III | 2001 | Routledge | |
3617 | The Transnational Dimension of Cyber Crime and Terrorism | Abraham D. Sofaer; Seymour E. Goodman | 2001 | Hoover Institution Press | |
3618 | Cyber-Threats, Information Warfare, and Critical Infrastructure Protection : Defending the U.S. Homeland | Anthony H. Cordesman; Justin G. Cordesman | 2001 | Greenwood Publishing Group, Incorporated | |
3619 | Cyberpunk | Andrew M. Butler | 2001 | Pocket Essentials | |
3620 | Trust in Cyber-societies: Integrating the Human and Artificial Perspectives (Lecture Notes in Computer Science, 2246) | Rino Falcone (editor), Munindar Singh (editor), Yao-Hua Tan (editor) | 2001 | Springer | |
3621 | TANGLED WEB: Tales of Digital Crime from the Shadows of Cyberspace | Richard Power | 2000 | Que Corporation | |
3622 | Cooperative Information Agents IV - The Future of Information Agents in Cyberspace: 4th In | Elisabeth André, Thomas Rist (auth.), Matthias Klusch, Larry Kerschberg (eds.) | 2000 | Springer-Verlag Berlin Heidelberg | |
3623 | Mapping cyberspace | Martin Dodge, Rob Kitchin | 2000 | Routledge | |
3624 | Democracy in the Digital Age: Challenges to Political Life in Cyberspace | Anthony Wilhelm | 2000 | | |
3625 | Race in cyberspace | Beth E. Kolko, Lisa Nakamura, Gilbert B. Rodman (editors) | 2000 | Routledge | |
3626 | Race in cyberspace | Beth E. Kolko, Lisa Nakamura, Gilbert B. Rodman (editors) | 2000 | Routledge | |
3627 | Quantum Cybernetics: Toward a Unification of Relativity and Quantum Theory via Circularly Causal Modeling | Gerhard Grössing (auth.) | 2000 | Springer-Verlag New York | |
3628 | Information, Place, and Cyberspace: Issues in Accessibility | Donald G. Janelle, David C. Hodge (auth.), Prof. Dr. Donald G. Janelle, Prof. Dr. David C. Hodge (eds.) | 2000 | Springer-Verlag Berlin Heidelberg | |
3629 | Cybermarketing. How to use the Internet to market your goods and services | Pauline Bickerton, Matthew Bickerton and Upkar Pardesi (Eds.) | 2000 | Butterworth-Heinemann | |
3630 | Race in Cyberspace | Beth Kolko, Lisa Nakamura, Gilbert Rodman | 2000 | Routledge | |
3631 | Cybermarketing. How to use the Internet to market your goods and services | Pauline Bickerton, Matthew Bickerton and Upkar Pardesi (Eds.) | 2000 | Butterworth-Heinemann | |
3632 | Race in Cyberspace | Beth Kolko, Lisa Nakamura, Gilbert Rodman | 2000 | Routledge | |
3633 | Politics as Usual: The Cyberspace `Revolution' | Michael Margolis; David Resnick | 2000 | Sage Publications, Inc | |
3634 | The Cybercultures Reader | David Bell | 2000 | Routledge | |
3635 | Cyberpunk and Cyberculture: Science Fiction and the Work of William Gibson | Dani Cavallaro | 2000 | The Athlone Press | |
3636 | 59.Systems, Man, and Cybernetics | John G. Webster (Editor) | 1999 | Wiley | |
3637 | Cyberpower: an introduction to the politics of cyberspace | Tim Jordan | 1999 | Routledge | |
3638 | Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism | Nick Dyer-Witheford | 1999 | University of Illinois Press | |
3639 | Communities in Cyberspace | Marc A. Smith | 1999 | | |
3640 | Cyborgs@Cyberspace?: An Ethnographer Looks to the Future | David Hakken | 1999 | | |
3641 | Libraries, the First Amendment, and Cyberspace: What You Need to Know | Robert S. Peck | 1999 | | |
3642 | Trust in Cyberspace | Fred B. Schneider | 1999 | National Academy Press | |
3643 | Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace and the Clipper Chip | Professor Laura J. Gurak | 1999 | Yale University Press | |
3644 | Cyberspace Textuality: Computer Technology and Literary Theory | Marie-Laure Ryan | 1999 | Indiana University Press | |
3645 | CyberAssistant: How to Use the Internet to Get More Done in Less Time | Ph.D., D.A. Smith-Hemphill | 1999 | AMACOM | |
3646 | Cyberidentities: Canadian and European Presence in Cyberspace (International Canadian Studies Series) | Leen D'Haenens | 1999 | University of Ottawa Press | |
3647 | How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics | N. Katherine Hayles | 1999 | University Of Chicago Press | |
3648 | Civic Space/Cyberspace: The American Public Library in the Information Age | Redmond Kathleen Molz, Phyllis Dain, Kathleen Molz | 1999 | The MIT Press | |
3649 | How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics | N. Katherine Hayles | 1999 | University of Chicago Press | |
3650 | How we became posthuman : virtual bodies in cybernetics, literature, and informatics | N. Katherine Hayles | 1999 | University Of Chicago Press | |
3651 | Cyberpsychology | Ángel J. Gordo-López, Ian Parker (eds.) | 1999 | Macmillan Education UK | |
3652 | White Noise: An A–Z of the Contradictions in Cyberculture | Andrew Calcutt (auth.) | 1999 | Palgrave Macmillan UK | |
3653 | How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics | N. Katherine Hayles | 1999 | University of Chicago Press | |
3654 | How we became posthuman : virtual bodies in cybernetics, literature, and informatics | N. Katherine Hayles | 1999 | University Of Chicago Press | |
3655 | Cyberpsychology | Ángel J. Gordo-López, Ian Parker (eds.) | 1999 | Macmillan Education UK | |
3656 | White Noise: An A–Z of the Contradictions in Cyberculture | Andrew Calcutt (auth.) | 1999 | Palgrave Macmillan UK | |
3657 | Cybersexualities: A Reader in Feminist Theory, Cyborgs and Cyberspace | Jenny Wolmark | 1999 | Edinburgh University Press | |
3658 | The Pearly Gates of Cyberspace | Margaret Wertheim | 1999 | W.W. Norton | |
3659 | Identity Theft: The Cybercrime of the Millennium | John Q. Newman | 1999 | Loompanics Unlimited | |
3660 | How we became posthuman: virtual bodies in cybernetics, literature, and informatics | N. Katherine Hayles | 1999 | The University of Chicago Press | |
3661 | 1998 IEEE International Conference on Systems, Man, and Cybernetics (1998: San Diego, Cali | Man, and Cybernetics (1998 : San Diego, Calif.) IEEE International Conference on Systems | 1998 | Institute of Electrical & Electronics Enginee | |
3662 | Virtual Futures: Cyberotics, Technology and Posthuman Pragmatism | Joan Broadhurst Dixon, Eric Cassidy | 1998 | Routledge | |
3663 | Cyberpirates: A Shadowrun Sourcebook | Jennifer Brandes, Chris Hepler, Michael Mulvihill, FASA Corporation, | 1998 | | |
3664 | Cyberghetto or cybertopia? : race, class, and gender on the Internet | Bosah L. Ebo (editor) | 1998 | Praeger Publishers | |
3665 | Cyberspace Divide: Equality, Agency and Policy in the Information Society | Brian Loader | 1998 | | |
3666 | Touch-sensitive: Cybernetic Images and Replicant Bodies in the Post-Industrial Age | Suzanne Livingston | 1998 | University of Warwick | |
3667 | The Domain Name Handbook; High Stakes and Strategies in Cyberspace | Ellen Rony, Peter R. Rony | 1998 | Publishers Group West | |
3668 | GURPS Vehicles: From Chariots to Cybertanks...and Beyond! (GURPS: Generic Universal Role Playing System) | David Pulver | 1998 | Steve Jackson Games | |
3669 | Cybertalk that sells | Herschell Gordon Lewis, Jamie Murphy | 1998 | McGraw-Hill Professional | |
3670 | Careers for cybersurfers and other online types | Marjorie Eberts, Rachel Kelsey | 1998 | McGraw-Hill Professional | |
3671 | Cybermarketing: your interactive marketing consultant | Regina Brady, Edward Forrest, Richard Mizerski | 1998 | NTC Business Books | |
3672 | Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators | James R. Richards | 1998 | CRC Press | |
3673 | Cyberworlds | Tosiyasu L. Kunii (auth.), Tosiyasu L. Kunii, Annie Luciani (eds.) | 1998 | Springer Tokyo | |
3674 | Post-Work: The Wages of Cybernation | Stanley Aronowitz (Ed.), Jonathan Cutler (Ed.) | 1998 | Routledge | |
3675 | Post-Work: The Wages of Cybernation | Stanley Aronowitz (Ed.), Jonathan Cutler (Ed.) | 1998 | Routledge | |
3676 | Cybersociety 2.0: Revisiting Computer-Mediated Community and Technology | Steven Jones | 1998 | SAGE Publications, Inc | |
3677 | Aliens in America: Conspiracy Cultures from Outerspace to Cyberspace | Jodi Dean | 1998 | Cornell University Press | |
3678 | Global Obscenities: Patriarchy, Capitalism, and the Lure of Cyberfantasy | Zillah Eisenstein | 1998 | NYU Press | |
3679 | Aliens in America: Conspiracy Cultures from Outerspace to Cyberspace | Jodi Dean | 1998 | Cornell University Press | |
3680 | Virtualities: Television, Media Art, and Cyberculture | Margaret Morse | 1998 | Indiana University Press | |
3681 | Avatars of the word: from papyrus to cyberspace | James Joseph O'Donnell | 1998 | Harvard University Press | |
3682 | Cybertext: Perspectives on Ergodic Literature | Espen J. Aarseth | 1997 | Johns Hopkins University Press | |
3683 | Cybernetic Trading Strategies | Murray A. Ruggiero | 1997 | Wiley | |
3684 | Cybernetic Trading Strategies: Developing a Profitable Trading System with State-of-the-Ar | Murray A. Ruggiero | 1997 | Wiley | |
3685 | Cybernetic Trading Strategies: Developing a Profitable Trading System with State-of-the-Ar | Murray A. Ruggiero | 1997 | Wiley | |
3686 | The Governance Of Cyberspace: Politics, Technology and Global Restructuring | Brian Loader | 1997 | | |
3687 | Virtual Culture: Identity and Communication in Cybersociety | Steve Jones | 1997 | | |
3688 | Virtual culture: identity and communication in cybersociety | Steven Jones | 1997 | SAGE | |
3689 | CyberMeeting: How to Link People and Technology in Your Organization | James L. Creighton, James W. R. Adams | 1997 | AMACOM | |
3690 | Technobrat: Culture in a cybernetic classroom | Rukmini Bhaya Nair | 1997 | HarperCollins | |
3691 | Forcing the Factory of the Future: Cybernation and Societal Institutions | Bryn Jones | 1997 | Cambridge University Press | |
3692 | Dave Barry in Cyberspace | Dave Barry | 1997 | Ballantine Books | |
3693 | Elements of Hypermedia Design: Techniques for Navigation & Visualization in Cyberspace | Peter Gloor (auth.) | 1997 | Birkhäuser Basel | |
3694 | Defending Cyberspace, and Other Metaphors | Martin C. Libicki | 1997 | National Defense University Press | |
3695 | Elements of Hypermedia Design: Techniques for Navigation & Visualization in Cyberspace | Peter Gloor (auth.) | 1997 | Birkhäuser Basel | |
3696 | Defending Cyberspace, and Other Metaphors | Martin C. Libicki | 1997 | National Defense University Press | |
3697 | Hamlet on the holodeck : the future of narrative in cyberspace | Murray, Janet Horowitz | 1997 | Free Press | |
3698 | Chaos & Cyber-Kultur | Leary, Timothy; Martin, Heinz | 1997 | Nachtschatten-Verl. | |
3699 | First Cyberfeminist International | First Cyberfeminist International | 1997 | | |
3700 | Cybertext: Perspectives On Ergodic Literature | Espen J. Aarseth | 1997 | Johns Hopkins University Press | |
3701 | Virtual Politics: Identity and Community in Cyberspace | David Holmes (editor) | 1997 | SAGE Publications Ltd | |
3702 | Liber Cyber | Frater Choronzon | 1997 | | |
3703 | Borders in Cyberspace: Information Policy and the Global Information Infrastructure | Brian Kahin, Charles R. Nesson | 1997 | MIT Press | |
3704 | 1996 IEEE International Conference on Systems, Man and Cybernetics | IEEE | 1996 | Institute of Electrical & Electronics Enginee | |
3705 | Cyber Cities | M. Christine Boyer | 1996 | Princeton Architectural Press | |
3706 | Cyber Cities | M. Christine Boyer | 1996 | Princeton Architectural Press | |
3707 | Cybersong (Star Trek Voyager, No 8) | S.N. Lewitt | 1996 | | |
3708 | Psycho Cybernetics 2000 | Maxwell Maltz Foundation, Bobbe Sommer | 1996 | Prentice Hall Press | |
3709 | Cyber Cities: Visual Perception in the Age of Electronic Communication | M.Christine Boyer | 1996 | Princeton Architectural Press | |
3710 | Borders in Cyberspace: Information Policy and the Global Information Infrastructure | Brian Kahin, Charles Nesson | 1996 | The MIT Press | |
3711 | CyberLaw: The Law of the Internet | Jonathan Rosenoer (auth.) | 1996 | Springer-Verlag New York | |
3712 | Beyond Humanity: CyberEvolution and Future Minds | Gregory S. Paul, Earl D. Cox | 1996 | Delmar Thomson Learning | |
3713 | A Sexual Odyssey: From Forbidden Fruit to Cybersex | Kenneth Maxwell (auth.) | 1996 | Springer US | |
3714 | Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment | Mike Featherstone, Roger Burrows | 1996 | SAGE Publications Ltd | |
3715 | Beyond Humanity: CyberEvolution and Future Minds | Gregory S. Paul, Earl D. Cox | 1996 | Delmar Thomson Learning | |
3716 | A Sexual Odyssey: From Forbidden Fruit to Cybersex | Kenneth Maxwell (auth.) | 1996 | Springer US | |
3717 | Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment | Mike Featherstone, Roger Burrows | 1996 | SAGE Publications Ltd | |
3718 | The cyber future: 92 ways our lives will change by the year 2025 | Cornish, Edward | 1996 | World Future Society | |
3719 | High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace | Peter Ludlow, Loyd Blankenship | 1996 | MIT Press | |
3720 | Nattering on the Net: Women, Power, and Cybersapce | Dale Spender | 1996 | University of Toronto Press | |
3721 | Masters of Deception: The Gang That Ruled Cyberspace | Michelle Slatalla, Joshua Quittner | 1995 | Harpercollins | |
3722 | Decision and Control: The Meaning of Operational Research and Management Cybernetics (Classic Beer Series) | Stafford Beer | 1995 | Wiley | |
3723 | Bloodlust (Cyberpunk Horror Encyclopedia) | Stephane Brochu | 1995 | Ianus Games | |
3724 | GURPS Cyberpunk: High-Tech Low-Life Roleplaying (GURPS: Generic Universal Role Playing System) | Loyd Blankenship | 1995 | Steve Jackson Games | |
3725 | The Media Pavilion / Der Pavillon der Medien: Art and Architecture in the Age of Cyberspace / Eine neue Gleichung zwischen Kunst und Architektur | Helmut Swiczinsky, Wolf D. Prix (auth.), Prof. Peter Weibel (eds.) | 1995 | Springer Vienna | |
3726 | Technoscience and Cyberculture | Stanley Aronowitz (Ed.), Barbara Martinsons (Ed.), Michael Menser (Ed.), Jennifer Rich (Ed.) | 1995 | Routledge | |
3727 | Technoscience and Cyberculture | Stanley Aronowitz (Ed.), Barbara Martinsons (Ed.), Michael Menser (Ed.), Jennifer Rich (Ed.) | 1995 | Routledge | |
3728 | Postmodern Sublime: Technology and American Writing from Mailer to Cyberpunk | Joseph Tabbi | 1995 | Cornell University Press | |
3729 | Neural Network Modeling: Statistical Mechanics and Cybernetic Perspectives | P. S. Neelakanta, Dolores DeGroff | 1994 | CRC Press | |
3730 | Chaos & Cyber Culture | Timothy Leary, Michael Horowitz, Vicki Marshall | 1994 | Ronin Pub | |
3731 | Remember Me (Cyberpunk) | Justin Schmid | 1994 | Janus Punlications Inc | |
3732 | Cyberia: Life in the Trenches of Cyberspace | Douglas Rushkoff | 1994 | HarperOne | |
3733 | Cybernetics of Prejudices in the Practice of Psychotherapy | Gianfranco Cecchin | 1994 | Karnac Books | |
3734 | Flame Wars: The Discourse of Cyberculture | Mark Dery | 1994 | Duke University Press | |
3735 | Cyberia: Life in the Trenches of Cyberspace | Douglas Rushkoff | 1994 | HarperOne | |
3736 | Cybernetics of Prejudices in the Practice of Psychotherapy | Gianfranco Cecchin | 1994 | Karnac Books | |
3737 | Flame Wars: The Discourse of Cyberculture | Mark Dery | 1994 | Duke University Press | |
3738 | Decision and Control: The meaning of Operational Research and Management Cybernetics | Stafford Beer | 1994 | John Wiley & Sons, Ltd. | |
3739 | Neural network modeling : statistical mechanics and cybernetic perspectives | De Groff, Dolores F.; Neelakanta, Perambur S. | 1994 | CRC Press | |
3740 | Chaos & Cyber Culture | Timothy Leary; Michael Horowitz | 1994 | Ronin Publishing (CA) | |
3741 | Flame Wars: The Discourse of Cyberculture | Mark Dery (editor) | 1994 | Duke University Press | |
3742 | Deep Space: The Interplanetary Supplement for Cyberpunk 2020 | Chris Young, Scott Hedrick | 1993 | R. Talsorian Games | |
3743 | Necrology: Immortality (Cyberpunk) | Justin Schmid | 1993 | Ianus | |
3744 | Cyberpunk 2020 - Alternate Reality - Grimm's Cybertales Sourcebook | Justin Schmid | 1993 | Ianus Publications Inc. | |
3745 | Cyberpunk 2020 - Alternate Reality - Grimm's Cybertales Sourcebook | Justin Schmid | 1993 | Ianus Publications Inc. | |
3746 | Constructing a Social Science for Postwar America: The Cybernetics Group, 1946-1953 | Steve Joshua Heims | 1993 | The MIT Press | |
3747 | Night City Stories: Atlas Games 1992 : Charting New Realms of Imagination (Cyberpunk) | Scott MacKay | 1992 | Atlas Games | |
3748 | New Perspectives on Cybernetics: Self-Organization, Autonomy and Connectionism | Gordon Pask (auth.), Gertrudis van de Vijver (eds.) | 1992 | Springer Netherlands | |
3749 | Cyberpunk 2020 - The Chrome Berets | Thomas R. Kane | 1992 | Atlas Games | |
3750 | Cyberpunk 2020 - The Chrome Berets | Thomas R. Kane | 1992 | Atlas Games | |
3751 | Cyberpunk: Outlaws and Hackers on the Computer Frontier | Katie Hafner, John Markoff | 1991 | Simon & Schuster | |
3752 | The Night City Guide (Cyberpunk 2020) | Colin Fisk | 1991 | R Talsorian Games | |
3753 | Eurosource: The Euro Theatre Sourcebook for Cyberpunk | Mark Galeotti | 1991 | R. Talsorian | |
3754 | Chromebook (Cyberpunk RPG) | Colin Fisk | 1991 | R Talsorian Games | |
3755 | Cyberpunk. Outlaws and Hackers on the Computer Frontier | Katie Hafner, John Markoff | 1991 | Simon & Schuster | |
3756 | Cyberspace: First Steps | Michael Benedikt | 1991 | Mit Pr | |
3757 | Cyberspace: First Steps | Michael Benedikt | 1991 | Mit Pr | |
3758 | The Cybernetics Group | Steve Joshua Heims | 1991 | The MIT Press | |
3759 | Storming the Reality Studio: Casebook of Cyberpunk and Postmodern Science Fiction | Larry McCaffery, Lawrence F. McCaffery (editor) | 1991 | Duke University Press | |
3760 | Cyberbooks | Ben Bova | 1990 | Tor Books | |
3761 | Cyber Way | Alan Dean Foster | 1990 | | |
3762 | The Human Use of Human Beings: Cybernetics and Society | Norbert Wiener | 1990 | | |
3763 | Near Orbit (Cyberpunk RPG) | Mike Pondsmith | 1989 | | |
3764 | Cyberpunk Hardwired The Sourcebook | Walter Jon Williams | 1989 | R. Talsorian Games Inc. | |
3765 | Cyberpunk Hardwired The Sourcebook | Walter Jon Williams | 1989 | R. Talsorian Games Inc. | |
3766 | The Human Use of Human Beings: Cybernetics and Society | Wiener Norbert | 1989 | Free Association Books | |
3767 | Cybernetics of Living Matter: Nature, Man, Information | Igor' Mikhailovich Makarov | 1987 | Mir Publishers | |
3768 | Cybernetics of Living Matter: Nature, Man, Information | I. M. Makarov (ed.) | 1987 | Mir Publishers | |
3769 | Cybernetics and Systems ’86: Proceedings of the Eighth European Meeting on Cybernetics and Systems Research, organized by the Austrian Society for Cybernetic Studies, held at the University of Vienna, Austria, 1–4 April 1986 | Anna Lewicka-Strzalecka (auth.), Robert Trappl (eds.) | 1986 | Springer Netherlands | |
3770 | Subjectivity, Information, Systems: An Introduction to a Theory of Relativistic Cybernetics | Guy M. Jumarie | 1986 | Gordon and Breach | |
3771 | The social impact of cybernetics. | Dechert, Charles R. | 1986 | Simon and Schuster | |
3772 | Computers and the Cybernetic Society | Michael A. Arbib (Auth.) | 1984 | Elsevier Inc, Harcourt College Pub | |
3773 | Computers and the Cybernetic Society | Michael A. Arbib (Auth.) | 1984 | Elsevier Inc, Harcourt College Pub | |
3774 | Cybernetics Today: Achievements, Challenges, Prospects | I. M. Makarov | 1984 | Mir Publishers | |
3775 | The Cybernetic Foundation of Mathematics | Turchin | 1983 | | |
3776 | The Cybernetic Foundation of Mathematics | Turchin | 1983 | | |
3777 | The Cybernetic Foundation of Mathematics | Turchin | 1983 | | |
3778 | Control and Ability: Towards a Biocybernetics of Language | Waltraud Brennenstuhl | 1982 | John Benjamins Publishing Company | |
3779 | Biological Foundations of Linguistic Communication: Towards a Biocybernetics of Language | Thomas T. Ballmer | 1982 | John Benjamins Publishing Company | |
3780 | Control and Ability: Towards a Biocybernetics of Language | Waltraud Brennenstuhl | 1982 | John Benjamins Publishing Company | |
3781 | Biological Foundations of Linguistic Communication: Towards a Biocybernetics of Language | Thomas T. Ballmer | 1982 | John Benjamins Publishing Company | |
3782 | Systems Research in Health Care, Biocybernetics and Ecology. Proceedings of the International Congress on Applied Systems Research and Cybernetics | G.E. Lasker (Eds.) | 1981 | Elsevier | |
3783 | The Quality of Life: Systems Approaches. Proceedings of the International Congress on Applied Systems Research and Cybernetics | George E. Lasker | 1981 | Elsevier Inc | |
3784 | Systems Approaches in Computer Science and Mathematics. Proceedings of the International Congress on Applied Systems Research and Cybernetics | Mexico) International Congress on Applied Systems Research and Cybernetics (1980 : Acapulco | 1981 | Elsevier Inc, Pergamon Press | |
3785 | Systems Research in Health Care, Biocybernetics and Ecology. Proceedings of the International Congress on Applied Systems Research and Cybernetics | G.E. Lasker (Eds.) | 1981 | Elsevier | |
3786 | The Quality of Life: Systems Approaches. Proceedings of the International Congress on Applied Systems Research and Cybernetics | George E. Lasker | 1981 | Elsevier Inc | |
3787 | Systems Approaches in Computer Science and Mathematics. Proceedings of the International Congress on Applied Systems Research and Cybernetics | Mexico) International Congress on Applied Systems Research and Cybernetics (1980 : Acapulco | 1981 | Elsevier Inc, Pergamon Press | |
3788 | Brain of the Firm: The Managerial Cybernetics of Organization | Stafford Beer | 1981 | John Wiley & Sons Ltd. | |
3789 | Current Topics in Cybernetics and Systems: Proceedings of the Fourth International Congress of Cybernetics & Systems 21–25 August, 1978 Amsterdam, The Netherlands | B. D. Josephson (auth.), J. Rose (eds.) | 1978 | Springer-Verlag Berlin Heidelberg | |
3790 | Sociocybernetics: An actor-oriented social systems approach Vol. 2 | R. Felix Geyer, Johannes van der Zouwen (auth.), R. Felix Geyer, Johannes van der Zouwen (eds.) | 1978 | Springer US | |
3791 | Sociocybernetics: An actor-oriented social systems approach | R. Felix Geyer, Johannes van der Zouwen (eds.) | 1978 | Springer US | |
3792 | Sociocybernetics: An actor-oriented social systems approach Vol. 2 | R. Felix Geyer, Johannes van der Zouwen (auth.), R. Felix Geyer, Johannes van der Zouwen (eds.) | 1978 | Springer US | |
3793 | Sociocybernetics: An actor-oriented social systems approach | R. Felix Geyer, Johannes van der Zouwen (eds.) | 1978 | Springer US | |
3794 | On the Texture of Brains: An Introduction to Neuroanatomy for the Cybernetically Minded | Professor Dr. Valentino Braitenberg (auth.) | 1977 | Springer-Verlag Berlin Heidelberg | |
3795 | On the Texture of Brains: An Introduction to Neuroanatomy for the Cybernetically Minded | Professor Dr. Valentino Braitenberg (auth.) | 1977 | Springer-Verlag Berlin Heidelberg | |
3796 | Psycho-Cybernetics | Maxwell Maltz | 1977 | Pocket Books | |
3797 | Psycho-Cybernetics: A New Way to Get More Living out of Life | Maxwell Maltz | 1976 | Pocket | |
3798 | Psycho-Cybernetics: A New Way to Get More Living out of Life | Maxwell Maltz | 1976 | Pocket | |
3799 | Overlapping Tendencies in Operations Research Systems Theory and Cybernetics: Proceedings of an International Symposium, University of Fribourg, Switzerland, October 14–15, 1976 | Hartmut Bossel, K. F. Müller-Reißmann, Francois Rechenmann (auth.), Ernst Billeter, Michel Cuénod, Salomon Klaczko (eds.) | 1976 | Birkhäuser Basel | |
3800 | Overlapping Tendencies in Operations Research Systems Theory and Cybernetics: Proceedings of an International Symposium, University of Fribourg, Switzerland, October 14–15, 1976 | Hartmut Bossel, K. F. Müller-Reißmann, Francois Rechenmann (auth.), Ernst Billeter, Michel Cuénod, Salomon Klaczko (eds.) | 1976 | Birkhäuser Basel | |
3801 | The cybernetics of human learning and performance: A guide to theory and research | Gordon Pask | 1975 | Hutchinson Educational | |
3802 | Conversation, Cognition and Learning: Cybernetic Theory and Methodology | Gordon Pask | 1975 | Elsevier Science Ltd | |
3803 | The Cyberiad: Fables for the Cybernetic Age | Stanislaw Lem | 1974 | The Seabury Press | |
3804 | Cybernetics: A to Z | V. Pekelis | 1974 | Mir Publishers | |
3805 | The Cybernetic Theory of Development: Mathematical Models for A Re-Evaluation of the Is-Ought Problem | Yrjö Ahmavaara | 1974 | Kustannusosakeyhtio Tammi | |
3806 | Fundamentals of Cybernetics | A. Ya. Lerner (auth.) | 1972 | Springer US | |
3807 | The Cybernetic Society | Ralph Parkman, Thomas F. Irvine, James P. Hartnett and William F. Hughes (Auth.) | 1972 | Pergamon Press | |
3808 | Fundamentals of Cybernetics | A. Ya. Lerner (auth.) | 1972 | Springer US | |
3809 | The Cybernetic Society | Ralph Parkman, Thomas F. Irvine, James P. Hartnett and William F. Hughes (Auth.) | 1972 | Pergamon Press | |
3810 | Probability Theory, Mathematical Statistics, and Theoretical Cybernetics | M. A. Gavrilov, V. H. Ostianu, A. I. Potekhin (auth.), R. V. Gamkrelidze (eds.) | 1972 | Springer US | |
3811 | Progress in Mathematics: Probability Theory, Mathematical Statistics, and Theoretical Cybernetics | V. V. Kolbin (auth.), R. V. Gamkrelidze (eds.) | 1971 | Springer US | |
3812 | The Application of Cybernetic Analysis to the Study of International Politics | Stephen David Bryen (auth.) | 1971 | Springer Netherlands | |
3813 | Mathematical Structure of Finite Random Cybernetic Systems: Lectures Held at the Department for Automation and Information July 1971 | Silviu Guiasu (auth.) | 1971 | Springer-Verlag Wien | |
3814 | The Application of Cybernetic Analysis to the Study of International Politics | Stephen David Bryen (auth.) | 1971 | Springer Netherlands | |
3815 | Mathematical Structure of Finite Random Cybernetic Systems: Lectures Held at the Department for Automation and Information July 1971 | Silviu Guiasu (auth.) | 1971 | Springer-Verlag Wien | |
3816 | Cybernetics, Art, and Ideas | Jasia Reichardt | 1971 | Studio Vista | |
3817 | Information and Reflection: On some Problems of Cybernetics and how Contemporary Dialectical Materialism Copes with Them | Peter Paul Kirschenmann (auth.) | 1970 | Springer Netherlands | |
3818 | Introduction to Economic Cybernetics | Oskar Lange (Auth.) | 1970 | Elsevier Ltd, Pergamon Press Reprint | |
3819 | Introduction to Economic Cybernetics | Oskar Lange (Auth.) | 1970 | Elsevier Ltd, Pergamon Press Reprint | |
3820 | cdc :: cyber :: lang :: fortran :: 60280400A 7600 FORTRAN Dec70 | Control Data Corporation | 1970 | | |
3821 | Research and Development in USSR Cybernetics | CCM Information Corporation | 1969 | Research & Microfilm Publications | |
3822 | An Approach to Cybernetics | Gordon Pask | 1968 | Hutchinson and Co. | |
3823 | Psycho-Cybernetics | Maxwell Maltz | 1967 | Wilshire Book Co | |
3824 | Psycho-Cybernetics | Maxwell Maltz | 1967 | Wilshire Book Co | |
3825 | Introduction to cybernetics | W Ross Ashby | 1966 | Science Editions - John Wiley & Sons Inc | |
3826 | An introduction to cybernetics | W Ross Ashby | 1966 | Science Editions - John Wiley & Sons Inc | |
3827 | Cybernetics and Development | Michael J. Apter, and G. A. Kerkut (Auth.) | 1966 | Pergamon Press | |
3828 | Decision and Control: The Meaning of Operational Research and Management Cybernetics | Stafford Beer | 1966 | John Wiley & Sons Inc | |
3829 | Cybernetics and Development | Michael J. Apter, and G. A. Kerkut (Auth.) | 1966 | Pergamon Press | |
3830 | Decision and Control: The Meaning of Operational Research and Management Cybernetics | Stafford Beer | 1966 | John Wiley & Sons Inc | |
3831 | Russian-English Dictionary and Reader in the Cybernetical Sciences | Samuel Kotz | 1966 | Academic Press by University of Toronto | |
3832 | Decision and Control: The meaning of Operational Research and Management Cybernetics | Stafford Beer | 1966 | John Wiley & Sons | |
3833 | Cybernetics Within Us | Yelena Saparina; Vladimir Talmy | 1966 | Mir (Peace) Publishers | |
3834 | Cybernetics Within Us | Yelena Saparina | 1966 | Mir Publishers | |
3835 | Cybernetics of the Nervous System | Norbert Wiener and J.P. Schadé (Eds.) | 1965 | Elsevier Science | |
3836 | Cybernetics: or the Control and Communication in the Animal and the Machine | Norbert Wiener | 1965 | The MIT Press | |
3837 | Cybernetics, Second Edition: or the Control and Communication in the Animal and the Machine | Norbert Wiener | 1965 | MIT | |
3838 | God and Golem: A Comment on Certain Points where Cybernetics Impinges on Religion | Norbert Wiener | 1964 | The M.I.T. Press | |
3839 | God and Golem: A Comment on Certain Points where Cybernetics Impinges on Religion | Norbert Wiener | 1964 | The M.I.T. Press | |
3840 | God and Golem, Inc: A Comment on Certain Points where Cybernetics Impinges on Religion | Norbert Wiener | 1964 | The M.I.T. Press | |
3841 | Cybernetics: or the Control and Communication in the Animal and the Machine: Or Control and Communication in the Animal and the Machine | Wiener | 1961 | MIT Press | |
3842 | Psycho-Cybernetics | Maltz, Maxwell | 1960 | Prentice-Hall | |
3843 | Psycho-Cybernetics | Maltz, Maxwell | 1960 | Prentice-Hall | |
3844 | Cybernetics and Management | Stafford Beer | 1959 | The English Universities Press | |
3845 | What is Cybernetics? | Georges Théodule Guilbaud | 1959 | Criterion Books | |
3846 | Introduction to cybernetics | Ashby W.R. | 1957 | | |
3847 | Thinking by Machine: A Study of Cybernetics | Pierre de Latil | 1957 | Houghton Mifflin Company | |
3848 | An Introduction to Cybernetics | W. ROSS ASHBY | 1956 | Chapman & Hall | |
3849 | The next step in management ... : an appraisal of cybernetics. | | 1955 | GE | |
3850 | Engineering cybernetics | H. S. Tsien | 1954 | Royal Society of Chemistry | |
3851 | The Human use of human beings, cybernetics and society. Norbert Wiener ... | Norbert Wiener | 1950 | Houghton Mifflin Co. | |
3852 | The Human Use of Human Beings - Cybernetics and Society | Norbert Wiener | 1950 | The Riverside Press | |
3853 | Psycho-Cybernetics | Maxwell Maltz | 0 | Perigee | |
3854 | Cyber dragon : inside China’s information warfare and cyber operations | Dean Cheng | 0 | Praeger | |
3855 | Linguistic and Cultural Diversity in Cyberspace. Proceedings of the International Conference (Yakutsk, Russian Federation, 2-4 July, 2008) | E. Kuzmin, E. Plys (eds.) | 0 | | |
3856 | complete-cyber-cecurity-course V1 | nathan house | 0 | | |
3857 | The Complete Cyber Security Course - Volume 1 | Nathan House | 0 | | |
3858 | Hands-On Cybersecurity for Finance Identify vulnerabilities and secure your financial services from security breaches | Erdal Ozkaya, Milad Aslaner | 0 | | |
3859 | The Cyber Plumber’s Handbook | Brennon Thomas | 0 | Opdisk LLC | |
3860 | Cyber Attacks | Edward Amoroso | 0 | | |
3861 | Summary of Discussions At a Planning Meeting On Cyber-security and the Insider Threat to Classified Information | National Research Council (U.S.) | 0 | National Academy Press | |
3862 | Logical Foundations of Cyber-Physical Systems | Andr?© Platzer | 0 | | |
3863 | The Cyberspace Handbook | | | Routledge | |
3864 | Scene of the CyberCrime - Computer Forensics Handbook | | | Syngress | |
3865 | Cyberpunk 2020 Sub | | | | |
3866 | Kybernetes The International Journal of Systems, Cybernetics and Management Science Volume | Guest Editors: Monika Silvia Broecker and Georg Ivanovas | | | |
3867 | The International Journal of Systems & Cybernetics, Volume 32, Number 5 6, 2003 | Editor Yi Lin | | | |
3868 | The Economist - CyberWar | The Economist | | | |
3869 | The Unseen Cyber War | Austin Wright | | | |
3870 | Cyberspace Job Search Kit 2001-2002: The Complete Guide to Online Job Seeking and Career Information (Cyberspace Job Search Kit) | Mary B. Nemnich, Fred Edmund Jandt | | | |
3871 | Contemporary cybernetic and systemic researches | Brian H. Rudall | | | |
3872 | The International Journal of Systems & Cybernetics, Volume 31, Number 9 10, 2002 | Yi Lin | | | |
3873 | Cyberpunk 2.0 Fiction and Contemporary | Herlander Elias | | | |
3874 | Semiotic Bodies, Aesthetic Embodiments, and Cyberbodies | Winfried Nöth | | | |
3875 | THE VIRTUAL BATTLEFIELD PERSPECTIVES ON CYBER WARFARE-2009 | Raphael C.-W. Phan and Jianying Zhou | | | |
3876 | First Person Shooter: The Subjective Cyberspace | Herlander Elias | | | |
3877 | Rise and Fall of Cybergold. COM | John E. Peltier, Michael J. Gallivan | | | |
3878 | An Introduction to Video Editing with Cyberlink PowerDirector 10 Ultra | Cyberlink | | | |
3879 | Cyberabad Days | Ian McDonald | | | |
3880 | Inside Cyber Warfare | Jeffrey Carr | | | |
3881 | Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners | Jason Andress, Steve Winterfeld | | | |
3882 | The digital cast of being : metaphysics, mathematics, cartesianism, cybernetics, capitalism, communication | Michael Eldred | | | |
3883 | The digital cast of being : metaphysics, mathematics, cartesianism, cybernetics, capitalism, communication | Michael Eldred | | | |
3884 | Cybersecurity For Dummies. Palo Alto Networks Edition | Miller L.C. | | | |
3885 | High-Performance Embedded Computing: Applications in Cyber-Physical Systems and Mobile Computing | Wolf M. | | | |
3886 | The Decision to Attack: Military and Intelligence Cyber Decision-Making | Brantly Aaron Franklin, Keller William. | | | |
3887 | The Decision to Attack: Military and Intelligence Cyber Decision-Making | Brantly Aaron Franklin, Keller William. | | | |
3888 | Cyber Security | Carter Michael. | | | |
3889 | Cyber Security | Carter Michael. | | | |
3890 | The Complete Guide to Cybersecurity Risks and Controls | Kohnke Anne, Shoemaker Dan, Sigler Ken. | | | |
3891 | Constructing Soviet Cultural Policy: Cybernetics and Governance in Lithuania after World War II | Rindzeviciute E. | | | |
3892 | Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide | Ayala Luis. | | | |
3893 | Applied Cryptography for Cyber Security and Defense. Information Encryption and Cyphering | Nemati H.R., Yang L. | | | |
3894 | The Politics of Scientific Governance in an Authoritarian Regime: Purification and Hybridisation of Soviet Cybernetics | Rindzeviciute E. | | | |
3895 | Cybersecurity for Beginners | Meeuwisse Rauf. | | | |
3896 | Cybersecurity for Beginners | Meeuwisse Rauf. | | | |
3897 | etc. Insider Attack and Cyber Security. Beyond the Hacker | Stolfo S.J. | | | |
3898 | Strategic Cyber Security | Geers K. | | | |
3899 | Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks | Cornish Paul. | | | |
3900 | Global Cyber Security - Thinking About The Niche for NATO | Tikk Eneken. | | | |
3901 | The Tallinn Manual on the International Law Applicable to Cyber Warfare | ????? ?. (???.) | | | |
3902 | Are Protection and Control Engineers Provisioned with the Tools They Need to Combat Cyber-initiated Intrusions? | Holstein Dennis K., Newton W. | | | |
3903 | SERA as a complex approach to provide architecture of cyber-security based on international security standards into critical energy systems | Kukanov Aleksey. | | | |
3904 | Beyond Cyberpunk: New Critical Perspectives | Murphy Graham J., Vint Sherryl (eds.) | | | |
3905 | Tom and Co's Adventures in Cyberspace | Ierace Gaia. | | | |
3906 | Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense | Elias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos (eds.) | | Springer International Publishing | |
3907 | Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking World | Rogers, Vanessa | | Jessica Kingsley Publishers | |
3908 | Biologically Inspired Cognitive Architectures (BICA) for Young Scientists : Proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity (FIERCES 2017) | Klimov, Valentin V.; Samsonovich, Alexei V | | | |
3909 | Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics | Nik Alleyne | | | |
3910 | Cyber Survival Manual | Nick Selby | | Weldon Owen | |
3911 | Cybersecurity Field Manual | Matthew Twells, Cember Friend (editor) | | | |
3912 | How to Draw Fantasy Females: Create Sexy Cyberpunks, Seductive Supergirls, and Raunchy All-Action Heroines | Chris Patmore | | | |
3913 | Cyber Security Education: Principles and Policies | Greg Austin | | | |
3914 | Psycho-Cybernetics: Updated and Expanded Paperback – November 3, 2015 | Maxwell Maltz | | | |
3915 | Handbook of Research on Multimedia Cyber Security | Gupta Brij | | Information Science Reference | |
3916 | Cyber Security: ESORMA Quickstart Guide: Enterprise Security Operations Risk Management Architecture for Cyber Security Practitioners | David White | | | |
3917 | Cyber-Humans | Woodrow Barfield | | Springer International Publishing | |
3918 | Biometric-Based Physical and Cybersecurity Systems | Mohammad S. Obaidat;Issa Traore;Isaac Woungang | | Springer International Publishing | |
3919 | Visual Communication for Cybersecurity: Beyond Awareness to Advocacy | Nicole van Deursen | | | |
3920 | Flatline Constructs: Gothic Materialism and Cybernetic Theory-Fiction | Mark Fisher | | | |
3921 | Cyber Operations | OLeary, Mike | | Apress | |
3922 | Cyberstrong | Ajay Singh | | | |
3923 | APT-28 At the Center of the Russian Cyber Storm | FireEye, Inc. | | | |
3924 | Constructing cybersecurity | Unknown | | | |
3925 | Blockchain for Cyberphysical Systems | Ali Dorri | | | |
3926 | Thinking about Cybersecurity | The Great Courses | | | |
3927 | Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics - Theories and Applications | | | | |
3928 | Adversarial Tradecraft in Cybersecurity(2021)[Borges][9781801076203] | Borges | | | |
3929 | The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets) | Jeremy Martin, Richard Medlin, Nitin Sharma, LaShanda Edwards, Justin Casey, Mossaraf Khan, Ambadi M.P, Vishal Belbase | | | |
3930 | Informatics and Cybernetics in Intelligent Systems: Proceedings of 10th Computer Science On-line Conference 2021, Vol. 3 | Radek Silhavy | | Springer Nature | |
3931 | Muslim Parents and Cyberculture | Saheeh International | | | |
3932 | Backdoor: Bypassing the Gatekeepers in Cybersecurity | | | | |
3933 | cybernetics or control and communications in the animal and the behaviour | norbert wiener | | mit press | |
3934 | The Prophets in Cyberia | J W | | | |
3935 | Zero To Mastery In Information Security And Cyber Laws: No.1 Book To Become Zero To Hero In Information Security And Cyber Laws, This Amazing Book Covers ... Edition (Zero To Mastery Computer Series) | Rajiv Jain, Vei Publishing | | | |
3936 | Security of Biochip Cyberphysical Systems | Shayan Mohammed; Sukanta Bhattacharjee; Yong-Ak Song; Krishnendu Chakrabarty; Ramesh Karri | | Springer International Publishing | |
3937 | Improving Social Maturity of Cybersecurity Incident Response Teams | GMU | | | |
3938 | Cybersecurity Ops with bash: attack, defend and analyze from the command line | Paul Troncone, Carl Albing | | | |
3939 | Cybersecurity and third-party risk: third party threat hunting | Gregory C. Rasner | | | |
3940 | Connected Places: cyber security principles. | National Cyber Security Centre | | | |
3941 | Reinventing Cybersecurity | Jasmine Henry; Alison Gianotto; Coleen Shane; Tracy Bannon; Dr. Meg Layton; Breanne Boland; Angela Marafino; Latha Maripuri; Carlota Sage; Carla Sun | | | |
3942 | Network Forensics: Tracking Hackers Through Cyberspace | Sherri Davidoff; Jonathan Ham | | Prentice Hall | |
3943 | Computer Forensics and Cyber Crime: An Introduction | Marjie Britz | | Prentice Hall | |
3944 | Cyberbullying | Lucy R. Betts | | Palgrave Macmillan UK, London | |
3945 | International Perspectives on Cyberbullying : Prevalence, Risk Factors and Interventions | Anna Costanza Baldry; Catherine Blaya; David P. Farrington | | Springer International Publishing | |
3946 | Cybersecurity and Digital Forensics: Challenges and Future Paradigms | Abdulrahman Yarali, Randall Joyce, Faris Sahawneh | | | |
3947 | Cybersecurity and Digital Forensics: Challenges and Future Paradigms | Abdulrahman Yarali, Randall Joyce, Faris Sahawneh | | | |
3948 | How to get a job in cyber security earning six figures | Lina Lau | | | |
3949 | Cybersecurity for Small Networks : A No-Nonsense Guide for the Reasonably Paranoid | Seth Enoka | | No Starch Press | |
3950 | A British Hacker in America: The story of PMF & 'Operation Cybersnare' - The U.S. Secret Service's first online sting | Pmf | | | |
3951 | Cybercrime in the Pandemic Digital Age and Beyond (Palgrave Studies in Cybercrime and Cybersecurity) | Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), Laurie Yiu-Chung Lau (editor) | | Palgrave Macmillan | |
3952 | Black Falcons: A cyberpunk novel | Ginny Young | | | |
3953 | The Complete Cyber Seed Compendium: Books 1-5 | Craig A. Falconer | | | |
3954 | AI Models for Blockchain-Based Intelligent Networks in IoT Systems: Concepts, Methodologies, Tools, and Applications (Engineering Cyber-Physical Systems and Critical Infrastructures, 6) | Bharat Bhushan (editor), Arun Kumar Sangaiah (editor), Tu N. Nguyen (editor) | | Springer | |
3955 | Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime | Nearchos Nearchou | | Packt Publishing | |
3956 | Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program | Jason Brown | | Packt Publishing | |
3957 | Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program | Jason Brown | | Packt Publishing | |
3958 | The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks | Jeremy Wittkop | | Packt Publishing | |
3959 | The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks | Jeremy Wittkop | | Packt Publishing | |
3960 | Big Breaches: Cybersecurity Lessons for Everyone | Neil Daswani, Moudy Elbayadi | | | |
3961 | Machine Learning for Cyber Agents: Attack and Defence (Advanced Sciences and Technologies for Security Applications) | Stanislav Abaimov; Maurizio Martellini | | | |
3962 | Cyber Security and Laws: by Ques10 | Ques10 Team | | | |
3963 | Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition | Yuri Diogenes, Dr. Erdal Ozkaya | | Packt Publishing | |
3964 | Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World | Eric Cole | | BenBella Books | |
3965 | IWC HACKING LAB USING KALI: Build a portable Cyber Live Fire Range (CLFR) - Second Edition (IWC-Lab: Kali Book 3) | Jeremy Martin | | | |
3966 | Managing Cybersecurity Risk: Book 3 | Jonathan Reuvid | | | |
3967 | Web App Hacking: Carnage & Pwnage (Cyber Secrets) | Jeremy Martin; Carlyle Carlyle; Vishal Belbase; Frederico Ferreira; Nitin Sharma; Shoriful Islam; Yang Sze Jue; Daniel Traci | | Independently Published | |
3968 | Fundamentals of Cyber Security | Mayank Bhushan | | | |
3969 | Bitskrieg: The New Challenge of Cyberwarfare | John Arquilla | | Polity | |
3970 | Cybersecurity in the 21-st Century: Cybersecure microcircuits as the hardware base of cybersecure APCS. | Anatoly Belous, Vitaly Saladukha | | | |
3971 | Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework | Cynthia Brumfield | | | |
3972 | Effective Cybersecurity: A Guide to Using Best Practices and Standards | William Stallings | | Addison-Wesley Professional | |
3973 | Maritime Cybersecurity: A Guide for Leaders and Managers | Gary Kessler, Steven Shepard | | | |
3974 | Cyber Security: Python for Penetration Testing | Travis Czech | | | |
3975 | Listening In: Cybersecurity in an Insecure Age | Susan Landau | | Yale University Press | |
3976 | Cybersecurity Management: An Organizational and Strategic Approach | Nir Kshetri | | | |
3977 | From CIA to APT: An Introduction to Cyber Security | Amoroso and Amoroso, Matthew Amoroso | | | |
3978 | Cybersecurity: A Self-Teaching Introduction | C. P. Gupta, K. K. Goyal | | Mercury Learning and Information | |
3979 | Introduction To Cybersecurity (Zoohra Non Fiction series Book 32) | Hicham and Mohamed Ibnalkadi | | | |
3980 | Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us | Eugene Spafford, Leigh Metcalf, Josiah Dykstra | | Addison-Wesley Professional | |
3981 | Cyber Curiosity: A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World | Lakeidra Smith | | | |
3982 | PYTHON: THE NO-NONSENSE GUIDE: Learn Python Programming Within 12 Hours! (Including a FREE Python Cheatsheet & 50+ Exercises With Original Python Files ) (Cyberpunk Programming Series Book 1) | Cyberpunk University | | | |
3983 | Practical Cyber Security for Extremely Busy People: Protect yourself, your family, and your career from online exploitation | Daniel Farber Huang | | | |
3984 | Cybercrime | Todd Wade | | BCS, The Chartered Institute for IT | |
3985 | Computer Engineering:2 books in 1: Linux for Beginners+Cyber Security, How to Win with Cyberattacks and How to Use Linux Like a Pro | John Snowden | | | |
3986 | CyberSecurity Demystified: A compact reference guide to cybersecurity | Peter Theobald | | | |
3987 | CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT IT | Waleed Umar | | | |
3988 | CYBER SECURITY:EVERYTHING YOU SHOULD KNOW ABOUT IT | Waleed Umar | | | |
3989 | Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners | Alexander J. Roxon | | | |
3990 | Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents | Dr. Erdal Ozkaya | | Packt Publishing | |
3991 | Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics – 2018 (Lecture Notes in Networks and Systems Book 48) | Gheorghe I. Gheorghe | | | |
3992 | Proceedings of the International Conference of Mechatronics and Cyber-MixMechatronics – 2018 (Lecture Notes in Networks and Systems, 48) | Gheorghe I. Gheorghe (editor) | | | |
3993 | Breached!: A Cautionary Tale of Cybersecurity and Intrigue | Dave Millier | | | |
3994 | Cybersecurity essentials - Beginners guide: Step-by-step manual with ten methods to protect your privacy online | David Costa, Gianluca Amadio | | | |
3995 | Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense | Jean Nestor M. Dahj | | Packt Publishing | |
3996 | Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker Attacks | Alan Grid | | | |
3997 | Easy Steps to Managing Cybersecurity | Jonathan Reuvid (editor) | | Legend Press | |
3998 | Understanding Cyber Threats and Attacks | Ph.d. Mishra, Bimal Kumar (editor), Ph.d. Piqueira, Jose R. C. (editor) | | Nova Science Pub Inc | |
3999 | Cybercrime and Preventive Measures: A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition) | Priyanka Tomar, Sanjay Gautam | | | |
4000 | Philosophical Foundations of Cybernetics | Frank Honywill George | | CRC Press | |
4001 | Dark Hero of the Information Age: In Search Of Norbert Wiener--Father of Cybernetics | Flo Conway, Jim Siegelman | | Basic Books | |
4002 | Dark Hero of the Information Age: In Search Of Norbert Wiener--Father of Cybernetics | Flo Conway, Jim Siegelman | | Basic Books | |
4003 | Dark Hero of the Information Age: In Search Of Norbert Wiener--Father of Cybernetics | Flo Conway, Jim Siegelman | | Basic Books | |
4004 | Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape | Sounil Yu; Dan Geer; Wendy Nather | | | |
4005 | Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications | Alan Calder | | | |
4006 | Cybernetics Within Us | Yelena Saparina | | Mir Publishers | |
4007 | Hybrid Threats, Cyberterrorism and Cyberwarfare | Mohamed Amine Ferrag (editor), Ioanna Kantzavelou (editor), Leandros Maglaras (editor), Helge Janicke (editor) | | CRC Press; 1 edition | |
4008 | Hybrid Threats, Cyberterrorism and Cyberwarfare | Mohamed Amine Ferrag (editor), Ioanna Kantzavelou (editor), Leandros Maglaras (editor), Helge Janicke (editor) | | CRC Press; 1 edition | |
4009 | Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem | Soma Halder, Sinan Ozdemir | | Packt Publishing | |
4010 | Data Analytics: Systems Engineering - Cybersecurity - Project Management | Christopher Greco | | Mercury Learning and Information | |
4011 | Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed | Yuri Diogenes | | Addison-Wesley | |
4012 | Escalation Dynamics in Cyberspace (BRIDGING THE GAP SERIES) | Erica D. Lonergan, Shawn W. Lonergan | | Oxford University Press | |
4013 | Cyber Security Intelligence and Analytics | Zheng Xu | | Springer Nature | |
4014 | Cyber Security Intelligence and Analytics | Zheng Xu | | Springer Nature | |
4015 | Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Engineering Cyber-Physical Systems and Critical Infrastructures, 4) | Ahmed A. Abd El-Latif (editor), Yassine Maleh (editor), Wojciech Mazurczyk (editor), Mohammed ELAffendi (editor), Mohamed I. Alkanhal (editor) | | Springer | |
4016 | Advance Cyber Security | Manmohan Singh, Priyanka Sharma, Rahul Sharma | | Arcler Press | |
4017 | Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC)) | William Easttom II | | Pearson IT Certification | |
4018 | Practical Guide to Digital Forensics Investigations, A (Pearson IT Cybersecurity Curriculum) | Darren Hayes | | Pearson IT Certification | |
4019 | Transactions on Computational Science XXXII: Special Issue on Cybersecurity and Biometrics (Lecture Notes in Computer Science Book 10830) | Marina L. Gavrilova; C.J. Kenneth Tan; Alexei Sourin | | | |
4020 | Cyberhate: The Far Right in the Digital Age | | | Lexington Books | |
4021 | Building a Cyber Risk Management Program: Evolving Security for the Digital Age | Brian Allen, Brandon Bapst, Terry Hicks | | O'Reilly Media | |
4022 | Pathology of Learning in Cyber Space: Concepts, Structures and Processes (Studies in Systems, Decision and Control Book 156) | Sayed Hadi Sadeghi | | | |
4023 | Artificial Intelligence in Cyber-Physical Systems (Wireless Communications and Networking Technologies) | Anil Kumar Sagar (editor), Parma Nand (editor), Neetesh Kumar (editor), Sanjoy Das (editor) | | CRC Press | |
4024 | Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies | Dwayne Natwick | | Packt Publishing | |
4025 | Cyber-Laundering: International Policies and Practices | Nathalie Rébé | | World Scientific | |
4026 | Regulating Cyber Technologies: Privacy vs Security | Nathalie Rébé | | World Scientific | |
4027 | Cybersecurity Essentials: The Beginner's Guide | Cybersecurity Textbook | Cybersecurity for Beginners | Cybersecurity Books for Beginners for Certification | Cybersecurity for Libraries and Archives | Ojula Technology Innovations | | | |
4028 | Cybersecurity Essentials: The Beginner's Guide | cybersecurity Textbook | cybersecurity for Beginners | Cybersecurity Books for Beginners for Certification | Cybersecurity for Libraries and Archives | Ojula Technology Innovations | | | |
4029 | Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices (Fat-Free Technology Guides) | Nicholas Marsh | | | |
4030 | Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices (Fat-Free Technology Guides) | Nicholas Marsh | | | |
4031 | OSINT Investigations: We know what you did that summer (Cyber Secrets) | Jeremy Martin; Carolina Christofoletti; Diana Prušová; Mirjana Ivanic; Luna Winchester; Bonnie Betz; Khadija Naz; Prabhu Rajasekar; Zack Jones; LaShanda Edwards | | | |
4032 | CHINA IN THE CYBER DOMAIN | Major General PK Mallick | | PRINTS PUBLICATIONS PVT LTD | |
4033 | Smart Applications with Advanced Machine Learning and Human-Centred Problem Design (Engineering Cyber-Physical Systems and Critical Infrastructures Book 1) | D. Jude Hemanth | | | |
4034 | Digital Earth: Cyber Threats, Privacy and Ethics in an Age of Paranoia | Sarah Katz | | | |
4035 | Parallel Population and Parallel Human: A Cyber-Physical Social Approach (IEEE Press Series on Systems Science and Engineering) | Peijun Ye, Fei-Yue Wang | | Wiley-IEEE Press | |
4036 | Good Digital Hygiene: A Guide to Staying Secure in Cyberspace | Eduardo Gelbstein | | | |
4037 | Cyberphysical Infrastructures in Power Systems: Architectures and Vulnerabilities | Magdi S Mahmoud; Haris M. Khalid; Mutaz M. Hamdan | | | |
4038 | From Parchment to Cyberspace: Medieval Literature in the Digital Age | Stephen G. Nichols | | Peter Lang Incorporated, International Academic Publishers | |
4039 | From Parchment to Cyberspace: Medieval Literature in the Digital Age (Medieval Interventions) | Stephen G. Nichols | | Peter Lang Inc., International Academic Publishers | |
4040 | Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques | Vinny Troia | | Wiley | |
4041 | Computation-Aware Algorithmic Design for Cyber-Physical Systems | Maria Prandini; Ricardo G. Sanfelice | | Springer International Publishing | |
4042 | Project: Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed Vol 2 | Robert Duncan | | | |
4043 | Blockchain for Cybersecurity in Cyber-Physical Systems | | | | |
4044 | Cyber security. The complete guide to cyber threats and protection | David Sutton | | | |
4045 | CYBERSECURITY FOR SMALL NETWORKS | Seth Enoka | | | |
4046 | Cybersecurity Threats, Malware Trends, and Strategies | Tim Rains | | | |
4047 | Python for Cybersecurity | Howard E. Poston lll | | | |
4048 | Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2020 (Technologien für die intelligente Automation) | Jürgen Beyerer; Alexander Maier; Oliver Niggemann | | | |
4049 | Digital Transformation, Cyber Security and Resilience of Modern Societies (Studies in Big Data, 84) | Todor Tagarev; Krassimir T. Atanassov; Vyacheslav Kharchenko; Janusz Kacprzyk | | | |
4050 | Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage | Bob Chaput | | | |
4051 | Lego instructions: Tesla cybertruck (alternative bricks) | | | | |
4052 | Cybertorture and Cyberharassment | Tolga Yalur | | | |
4053 | Cyber Threat Hunting | Nadhem AlFardan | | | |
4054 | CIS Minimum Cybersecurity controls | | | | |