Generative AI Cybersecurity and Ethics

Read more

E-banking, Fintech, _ Financial Crimes The Current Economic and Regulatory Landscape 2024th Edition

Read more

Information Security Incident and Data Breach Management A Step-by-Step Approach First Edition

Read more

Resilient Cybersecurity Reconstruct your defense strategy in an evolving cyber world

Read more

A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 Strategies, Implementation, and Best Practice

Read more

Preparing for Hybrid Threats to Security Collaborative Preparedness and Response

Read more

Cyber SecurityIntelligence and Analytics (CSIA 2022), Volume 1

Read more

Secrets of a Cyber Security Architect

Read more

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture Volume II

Read more

Hands-on cybersecurity for architects plan and design robust security architectures

Read more

OWASP_Code_Review_Guide_v2

Read more

Secure and Smart Cyber-Physical Systems

Read more

Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics)

Read more

Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects

Read more

Maritime Cybersecurity: A Guide for Leaders and Managers Paperback – February 4, 2022

Read more

Cybersecurity and High-Performance Computing Environments

Read more

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Read more

Cybersecurity Capability Maturity Model (C2M2) v2.1

Read more

Cognitive Computing and Cyber Physical Systems 4th EAI International Conference, IC4S 2023

Read more

Executive’s Cybersecurity Program Handbook A comprehensive guide to building and operationalizing a complete cybersecur

Read more

Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems)

Read more

Cybernetical Intelligence Engineering Cybernetics with Machine Intelligence

Read more

Responsive Security

Read more

Phishing for Dummies eBook 2023

Read more

Fighting Phishing Everything You Can Do to Fight Social Engineering and Phishing

Read more

Cyber-Assurance for the Internet of Things

Read more

Artificial Intelligence and Cybersecurity Theory and Applications

Read more

See Yourself in Cyber Security Careers Beyond Hacking

Read more

Human-Computer Interaction and Cybersecurity Handbook

Read more

Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives

Read more

Confident Cyber Security The Essential Insights and How to Protect from Threats 2nd Edition

Read more

Cyber Guardians Empowering Board Members for Effective Cybersecurity

Read more

Cyber Persistence Theory Redefining National Security in Cyberspace

Read more

Cyber Crime Investigator’s Field Guide 3rd.Edition

Read more

Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols Volume 1

Read more

Battlefield Cyber How China and Russia are Undermining Our Democracy and National Security

Read more

Security Risk Management – The Driving Force for Operational Resilience The Firefighting Paradox

Read more

Israel and the Cyber Threat How the Startup Nation Became a Global Cyber Power

Read more

Mastering Kali Linux for Advanced Penetration Testing – Beggs, Robert

Read more

Cybercrime Prevention Theory and Applications

Read more

Cyber Threat Intelligence

Read more

OWASP CODE REVIEW GUIDE 2008 V1.1

Read more

NIST Special Publication 800-30 Guide for Conducting Risk Assessments I N F O R M A T I O N S E C U R I T Y

Read more

Understand, Manage, and Measure Cyber Risk

Read more

How to Measure Anything in Cybersecurity Risk

Read more

CYBER RESILIENCE STRATEGY: A KEY GUIDE TO ENTERPRISE OPERATIONS IN DIGITAL AGE – กลยุทธ์การคืนสภาพได้ทางไซเบอร์: แนวทางในการดำเนินงานขององค์กรในยุคดิจิทัล

Read more

เอกสารประกอบการบรรยาย งานสัมมนาให้ความรู้เกี่ยวกับ Zero Trust ในงานชื่อ Beyond Security: Zero Trust for Business Enablement

เอกสารประกอบการบรรยาย งานสัมมน… Read more

Practical Malware Analysis

Read more

Cyber Strategy_ Risk-Driven Security and Resiliency

Read more

Building a Cyber Resilient Business_ A cyber handbook for executives and boards

Read more