| S/N |
BOOKS |
LINKS |
| 1. |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security |
https://directory.doabooks.org/handle/20.500.12854/67950 |
| 2. |
Security of Cyber-Physical Systems |
https://directory.doabooks.org/handle/20.500.12854/84465 |
| 3. |
Cyber Security and Critical Infrastructures |
https://directory.doabooks.org/handle/20.500.12854/97421 |
| 4. |
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation |
https://directory.doabooks.org/handle/20.500.12854/95748 |
| 5. |
Machine Learning and Data Analytics for Cyber Security |
https://directory.doabooks.org/handle/20.500.12854/165228 |
| 6. |
Cyber Security of Critical Infrastructures |
https://directory.doabooks.org/handle/20.500.12854/77132 |
| 7. |
Cybersecurity Threats with New Perspectives |
https://directory.doabooks.org/handle/20.500.12854/130922 |
| 8. |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security |
https://directory.doabooks.org/handle/20.500.12854/78062 |
| 9. |
Cyber Security Politics |
https://directory.doabooks.org/handle/20.500.12854/78025 |
| 10. |
Confronting an “Axis of Cyber”? |
https://directory.doabooks.org/handle/20.500.12854/43820 |
| 11. |
Cyber Security |
https://directory.doabooks.org/handle/20.500.12854/28236 |
| 12. |
Digital Privacy and Security |
https://directory.doabooks.org/handle/20.500.12854/152950 |
| 13. |
Advances in Cybersecurity: Challenges and Solutions |
https://directory.doabooks.org/handle/20.500.12854/143740 |
| 14. |
Economic and cyber security |
https://directory.doabooks.org/handle/20.500.12854/134888.2 |
| 15. |
Maritime Cybersecurity
|
https://directory.doabooks.org/handle/20.500.12854/162856 |
| 16. |
Humans in the Cyber Loop
|
https://directory.doabooks.org/handle/20.500.12854/164872 |
| 17. |
Cyber Security
|
https://directory.doabooks.org/handle/20.500.12854/63624 |
| 18. |
Cyber Security
|
https://directory.doabooks.org/handle/20.500.12854/78251 |
| 19. |
Confronting an “axis of cyber”? |
https://directory.doabooks.org/handle/20.500.12854/33747 |
| 20. |
Computational Methods for Medical and Cyber Security |
https://directory.doabooks.org/handle/20.500.12854/97472 |
| 21. |
Rational Cybersecurity for Business |
https://directory.doabooks.org/handle/20.500.12854/30469 |
| 22. |
Australia and Cyberwarfare |
https://directory.doabooks.org/handle/20.500.12854/37188 |
| 23. |
Paradigms on Technology Development for Security Practitioners |
https://directory.doabooks.org/handle/20.500.12854/146384 |
| 24. |
Security Risk Management for the Internet of Things |
https://directory.doabooks.org/handle/20.500.12854/67930 |
| 25. |
Cyber Security and Critical Infrastructures 2nd Volume |
https://directory.doabooks.org/handle/20.500.12854/94519 |
| 26. |
Cryptography and Its Applications in Information Security |
https://directory.doabooks.org/handle/20.500.12854/81008 |
| 27. |
Cyber Peace
|
https://directory.doabooks.org/handle/20.500.12854/90962 |
| 28. |
Cyber Security
|
https://directory.doabooks.org/handle/20.500.12854/94987 |
| 29. |
Chapter 30 The role of the UN Security Council in cybersecurity |
https://directory.doabooks.org/handle/20.500.12854/26323 |
| 30. |
Challenges in Cybersecurity and Privacy – the European Research Landscape |
https://directory.doabooks.org/handle/20.500.12854/94279 |
| 31. |
Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy |
https://directory.doabooks.org/handle/20.500.12854/115215 |
| 32. |
The Other Quiet Professionals |
https://directory.doabooks.org/handle/20.500.12854/115366 |
| 33. |
Australia and Cyber-warfare |
https://directory.doabooks.org/handle/20.500.12854/116270 |
| 34. |
Key Issues in Network Protocols and Security |
https://directory.doabooks.org/handle/20.500.12854/161554 |
| 35. |
Cyberinsurance Policy
|
https://directory.doabooks.org/handle/20.500.12854/93165 |
| 36. |
Emerging Security Technologies and EU Governance |
https://directory.doabooks.org/handle/20.500.12854/29540 |
| 37. |
Cybersecurity Issues in Smart Grids and Future Power Systems |
https://directory.doabooks.org/handle/20.500.12854/128784 |
| 38. |
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings |
https://directory.doabooks.org/handle/20.500.12854/59096 |
| 39. |
Routledge Handbook of International Cybersecurity |
https://directory.doabooks.org/handle/20.500.12854/36810 |
| 40. |
Malware
|
https://directory.doabooks.org/handle/20.500.12854/113227 |
| 41. |
National Security in the Digital and Information Age |
https://directory.doabooks.org/handle/20.500.12854/146518 |
| 42. |
Preparing for Digital Disruption |
https://directory.doabooks.org/handle/20.500.12854/72286 |
| 43. |
Routledge Handbook of Maritime Security |
https://directory.doabooks.org/handle/20.500.12854/134301 |
| 44. |
Shifting Security and Power Constellations in Central Asia and the Caucasus |
https://directory.doabooks.org/handle/20.500.12854/136663 |
| 45. |
Trustworthiness in Mobile Cyber Physical Systems |
https://directory.doabooks.org/handle/20.500.12854/76545 |
| 46. |
The Challenges of Nuclear Security |
https://directory.doabooks.org/handle/20.500.12854/142852 |
| 47. |
Security Infrastructure Technology for Integrated Utilization of Big Data |
https://directory.doabooks.org/handle/20.500.12854/33048 |
| 48. |
Advanced Topics in Systems Safety and Security |
https://directory.doabooks.org/handle/20.500.12854/76519 |
| 49. |
Security of Ubiquitous Computing Systems |
https://directory.doabooks.org/handle/20.500.12854/63653 |
| 50. |
INTELLIGENT CYBER DEFENCE SYSTEMS: DETECTION OF RANSOMWARE AND PROTECTION OF WIRELESS NETWORKS BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGIES |
https://directory.doabooks.org/handle/20.500.12854/162805.2 |
| 51. |
Security and Privacy in Networks and Multimedia |
https://directory.doabooks.org/handle/20.500.12854/143668 |
| 52. |
Research Notes on Digital Business Transformation and Artificial Intelligence |
https://directory.doabooks.org/handle/20.500.12854/161862 |
| 53. |
Digital Transformations in Public International Law |
https://directory.doabooks.org/handle/20.500.12854/92193 |
| 54. |
Models of socio-cyber-physical systems security |
https://directory.doabooks.org/handle/20.500.12854/134824.2 |
| 55. |
Cybersecurity of Digital Service Chains |
https://directory.doabooks.org/handle/20.500.12854/81287 |
| 56. |
Large Language Models in Cybersecurity |
https://directory.doabooks.org/handle/20.500.12854/138848 |
| 57. |
Chapter 13 Human Rights and Law Enforcement at Sea |
https://directory.doabooks.org/handle/20.500.12854/134283 |
| 58. |
eHealth Innovative Approaches and Applications |
https://directory.doabooks.org/handle/20.500.12854/139248 |
| 59. |
The Global Race for Technological Superiority |
https://directory.doabooks.org/handle/20.500.12854/48691 |
| 60. |
The Huawei and Snowden Questions |
https://directory.doabooks.org/handle/20.500.12854/29326 |
| 61. |
Advances and Technologies in High Voltage Power Systems Operation, Control, Protection and Security |
https://directory.doabooks.org/handle/20.500.12854/76764 |
| 62. |
Understanding and mitigating cyberfraud in Africa |
https://directory.doabooks.org/handle/20.500.12854/139127 |
| 63. |
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings |
https://directory.doabooks.org/handle/20.500.12854/34980 |
| 64. |
The Public Core of the Internet: An international Agenda for Internet Governance |
https://directory.doabooks.org/handle/20.500.12854/39675 |
| 65. |
Security. Cooperation. Governance. |
https://directory.doabooks.org/handle/20.500.12854/132865 |
| 66. |
Machine Learning for Cybersecurity |
https://directory.doabooks.org/handle/20.500.12854/153071 |
| 67. |
Modeling of security systems for critical infrastructure facilities |
https://directory.doabooks.org/handle/20.500.12854/134866.2 |
| 68. |
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? |
https://directory.doabooks.org/handle/20.500.12854/26719 |
| 69. |
Chapter 10 Sustainability, Public Security, and Privacy Concerns Regarding Central Bank Digital Currency (CBDC) |
https://directory.doabooks.org/handle/20.500.12854/114194 |
| 70. |
Cybersecurity and Data Science |
https://directory.doabooks.org/handle/20.500.12854/98972 |
| 71. |
Co-governed Sovereignty Network |
https://directory.doabooks.org/handle/20.500.12854/71642 |
| 72. |
Modern Cryptography |
https://directory.doabooks.org/handle/20.500.12854/67117 |
| 73. |
Smart Urban Water Networks |
https://directory.doabooks.org/handle/20.500.12854/76580 |
| 74. |
Sicherheit als Grundsatz |
https://directory.doabooks.org/handle/20.500.12854/31583 |
| 75. |
Data Hiding and Its Applications |
https://directory.doabooks.org/handle/20.500.12854/78774 |
| 76. |
Cybersecurity als Unternehmensleitungsaufgabe (Volume 2) |
https://directory.doabooks.org/handle/20.500.12854/81419 |
| 77. |
Cybersecurity in Latvia |
https://directory.doabooks.org/handle/20.500.12854/163217 |
| 78. |
Capabilities-Based Planning for Energy Security at Department of Defense Installations |
https://directory.doabooks.org/handle/20.500.12854/115055 |
| 79. |
AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection |
https://directory.doabooks.org/handle/20.500.12854/112521 |
| 80. |
Emergency Management |
https://directory.doabooks.org/handle/20.500.12854/65493 |
| 81. |
Integration of AC/DC Microgrids into Power Grids |
https://directory.doabooks.org/handle/20.500.12854/68743 |
| 82. |
Advanced Digital Auditing |
https://directory.doabooks.org/handle/20.500.12854/93990 |
| 83. |
The Power to Coerce |
https://directory.doabooks.org/handle/20.500.12854/115484 |
| 84. |
War 4.0 |
https://directory.doabooks.org/handle/20.500.12854/161647 |
| 85. |
Cognitive Hyperconnected Digital Transformation |
https://directory.doabooks.org/handle/20.500.12854/94329 |
| 86. |
Principle of Architecture, Protocol, and Algorithms for CoG-MIN |
https://directory.doabooks.org/handle/20.500.12854/162880 |
| 87. |
Synergy of building cybersecurity systems |
https://directory.doabooks.org/handle/20.500.12854/134893.2 |
| 88. |
Militant Jihadism |
https://directory.doabooks.org/handle/20.500.12854/71939 |
| 89. |
Militant Jihadism |
https://directory.doabooks.org/handle/20.500.12854/29502 |
| 90. |
Methods and Concepts for Designing and Validating Smart Grid Systems |
https://directory.doabooks.org/handle/20.500.12854/53320 |
| 91. |
Real-Time Sensor Networks and Systems for the Industrial IoT |
https://directory.doabooks.org/handle/20.500.12854/69302 |
| 92. |
Violences en ligne : décrypter les mécanismes du cyberharcèlement |
https://directory.doabooks.org/handle/20.500.12854/146023 |
| 93. |
Mathematics and Engineering |
https://directory.doabooks.org/handle/20.500.12854/69235 |
| 94. |
Advances on Smart Cities and Smart Buildings |
https://directory.doabooks.org/handle/20.500.12854/84519 |
| 95. |
Data ethics : building trust |
https://directory.doabooks.org/handle/20.500.12854/150265 |
| 96. |
Disruptive Trends in Automation Technology |
https://directory.doabooks.org/handle/20.500.12854/139319 |
| 97. |
Trusted Artificial Intelligence in Manufacturing; Trusted Artificial Intelligence in Manufacturing |
https://directory.doabooks.org/handle/20.500.12854/78056 |
| 98. |
Preparing for Hybrid Threats to Security |
https://directory.doabooks.org/handle/20.500.12854/143908 |
| 99. |
Nordic e-Infrastructure Tomorrow |
https://directory.doabooks.org/handle/20.500.12854/158422 |
| 100. |
Internet of Things Applications – From Research and Innovation to Market Deployment |
https://directory.doabooks.org/handle/20.500.12854/94285 |
| 101. |
Access Contested |
https://directory.doabooks.org/handle/20.500.12854/78511 |
| 102. |
Computer Aided Verification |
https://directory.doabooks.org/handle/20.500.12854/34402 |
| 103. |
Petri Nets in Science and Engineering |
https://directory.doabooks.org/handle/20.500.12854/130105 |
| 104. |
Anomaly Detection |
https://directory.doabooks.org/handle/20.500.12854/135402 |
| 105. |
Computer Aided Verificatio |
https://directory.doabooks.org/handle/20.500.12854/112854 |
| 106. |
Computer Aided Verification |
https://directory.doabooks.org/handle/20.500.12854/112765 |
| 107. |
Computer Aided Verification |
https://directory.doabooks.org/handle/20.500.12854/112810 |
| 108. |
Cybersecurity als Unternehmensleitungsaufgabe |
https://directory.doabooks.org/handle/20.500.12854/72731 |
| 109. |
Violence, Victimization and Prevention |
https://directory.doabooks.org/handle/20.500.12854/137758 |
| 110. |
Internet of Things and the Law |
https://directory.doabooks.org/handle/20.500.12854/160528 |
| 111. |
Chapter 3 The competition over norms |
https://directory.doabooks.org/handle/20.500.12854/151167 |
| 112. |
China, Russia, and the USA in the Middle East |
https://directory.doabooks.org/handle/20.500.12854/151021 |
| 113. |
Data Communications and Network Technologies |
https://directory.doabooks.org/handle/20.500.12854/93994 |
| 114. |
Database Principles and Technologies – Based on Huawei GaussDB |
https://directory.doabooks.org/handle/20.500.12854/93997 |
| 115. |
Emerging Technologies, Law and Policies |
https://directory.doabooks.org/handle/20.500.12854/165626 |
| 116. |
Advanced Modeling and Research in Hybrid Microgrid Control and Optimization |
https://directory.doabooks.org/handle/20.500.12854/76927 |
| 117. |
Internet of Things |
https://directory.doabooks.org/handle/20.500.12854/131095 |
| 118. |
Artificial Intelligence and International Conflict in Cyberspace |
https://directory.doabooks.org/handle/20.500.12854/99946 |
| 119. |
Electrification of Smart Cities |
https://directory.doabooks.org/handle/20.500.12854/100085 |
| 120. |
Autonomous Ships and the Law |
https://directory.doabooks.org/handle/20.500.12854/133019 |