Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1, Author: Dan Farmer
Title: Quantum Information Theory / Edition 2, Author: Mark M. Wilde
Title: Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, Author: Hamid Nemati
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework / Edition 1, Author: Anne Kohnke
Title: Reactor Core Monitoring: Background, Theory and Practical Applications, Author: Mihïly Makai
Title: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1, Author: Eric Peeters
Title: Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition / Edition 2, Author: Jason Sachowski
Title: The Limits of Trust: Cryptography, Governments, and Electronic Commerce, Author: David Stewart
Title: Blockchain Technology and Applications / Edition 1, Author: Pethuru Raj
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Blockchain and Clinical Trial: Securing Patient Data, Author: Hamid Jahankhani
Title: Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks, Author: Nedeljko Cvejic
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop / Edition 1, Author: Peng Cheng
Title: Encyclopedia of Cryptology, Author: David E. Newton
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Power and Security in the Information Age: Investigating the Role of the State in Cyberspace / Edition 1, Author: Myriam Dunn Cavelty
Title: Cyber Security Practitioner's Guide, Author: Hamid Jahankhani

Pagination Links