CYBER SECURITY EBOOKS LINKS

Cyber Security eBooks

S/N BOOKS LINKS
1. Cyber-Physical Threat Intelligence for Critical Infrastructures Security https://directory.doabooks.org/handle/20.500.12854/67950
2. Security of Cyber-Physical Systems https://directory.doabooks.org/handle/20.500.12854/84465
3. Cyber Security and Critical Infrastructures https://directory.doabooks.org/handle/20.500.12854/97421
4. Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation https://directory.doabooks.org/handle/20.500.12854/95748
5. Machine Learning and Data Analytics for Cyber Security https://directory.doabooks.org/handle/20.500.12854/165228
6. Cyber Security of Critical Infrastructures https://directory.doabooks.org/handle/20.500.12854/77132
7. Cybersecurity Threats with New Perspectives https://directory.doabooks.org/handle/20.500.12854/130922
8. Cyber-Physical Threat Intelligence for Critical Infrastructures Security https://directory.doabooks.org/handle/20.500.12854/78062
9. Cyber Security Politics https://directory.doabooks.org/handle/20.500.12854/78025
10. Confronting an “Axis of Cyber”? https://directory.doabooks.org/handle/20.500.12854/43820
11. Cyber Security https://directory.doabooks.org/handle/20.500.12854/28236
12. Digital Privacy and Security https://directory.doabooks.org/handle/20.500.12854/152950
13. Advances in Cybersecurity: Challenges and Solutions https://directory.doabooks.org/handle/20.500.12854/143740
14. Economic and cyber security https://directory.doabooks.org/handle/20.500.12854/134888.2
15.

Maritime Cybersecurity

 

https://directory.doabooks.org/handle/20.500.12854/162856
16.

Humans in the Cyber Loop

 

https://directory.doabooks.org/handle/20.500.12854/164872
17.

Cyber Security

 

https://directory.doabooks.org/handle/20.500.12854/63624
18.

Cyber Security

 

https://directory.doabooks.org/handle/20.500.12854/78251
19. Confronting an “axis of cyber”? https://directory.doabooks.org/handle/20.500.12854/33747
20. Computational Methods for Medical and Cyber Security https://directory.doabooks.org/handle/20.500.12854/97472
21. Rational Cybersecurity for Business https://directory.doabooks.org/handle/20.500.12854/30469
22. Australia and Cyberwarfare https://directory.doabooks.org/handle/20.500.12854/37188
23. Paradigms on Technology Development for Security Practitioners https://directory.doabooks.org/handle/20.500.12854/146384
24. Security Risk Management for the Internet of Things https://directory.doabooks.org/handle/20.500.12854/67930
25. Cyber Security and Critical Infrastructures 2nd Volume https://directory.doabooks.org/handle/20.500.12854/94519
26. Cryptography and Its Applications in Information Security https://directory.doabooks.org/handle/20.500.12854/81008
27.

Cyber Peace

 

https://directory.doabooks.org/handle/20.500.12854/90962
28.

Cyber Security

 

https://directory.doabooks.org/handle/20.500.12854/94987
29. Chapter 30 The role of the UN Security Council in cybersecurity https://directory.doabooks.org/handle/20.500.12854/26323
30. Challenges in Cybersecurity and Privacy – the European Research Landscape https://directory.doabooks.org/handle/20.500.12854/94279
31. Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy https://directory.doabooks.org/handle/20.500.12854/115215
32. The Other Quiet Professionals https://directory.doabooks.org/handle/20.500.12854/115366
33. Australia and Cyber-warfare https://directory.doabooks.org/handle/20.500.12854/116270
34. Key Issues in Network Protocols and Security https://directory.doabooks.org/handle/20.500.12854/161554
35.

Cyberinsurance Policy

 

https://directory.doabooks.org/handle/20.500.12854/93165
36. Emerging Security Technologies and EU Governance https://directory.doabooks.org/handle/20.500.12854/29540
37. Cybersecurity Issues in Smart Grids and Future Power Systems https://directory.doabooks.org/handle/20.500.12854/128784
38. Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings https://directory.doabooks.org/handle/20.500.12854/59096
39. Routledge Handbook of International Cybersecurity https://directory.doabooks.org/handle/20.500.12854/36810
40.

Malware

 

https://directory.doabooks.org/handle/20.500.12854/113227
41. National Security in the Digital and Information Age https://directory.doabooks.org/handle/20.500.12854/146518
42. Preparing for Digital Disruption https://directory.doabooks.org/handle/20.500.12854/72286
43. Routledge Handbook of Maritime Security https://directory.doabooks.org/handle/20.500.12854/134301
44. Shifting Security and Power Constellations in Central Asia and the Caucasus https://directory.doabooks.org/handle/20.500.12854/136663
45. Trustworthiness in Mobile Cyber Physical Systems https://directory.doabooks.org/handle/20.500.12854/76545
46. The Challenges of Nuclear Security https://directory.doabooks.org/handle/20.500.12854/142852
47. Security Infrastructure Technology for Integrated Utilization of Big Data https://directory.doabooks.org/handle/20.500.12854/33048
48. Advanced Topics in Systems Safety and Security https://directory.doabooks.org/handle/20.500.12854/76519
49. Security of Ubiquitous Computing Systems https://directory.doabooks.org/handle/20.500.12854/63653
50. INTELLIGENT CYBER DEFENCE SYSTEMS: DETECTION OF RANSOMWARE AND PROTECTION OF WIRELESS NETWORKS BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGIES https://directory.doabooks.org/handle/20.500.12854/162805.2
51. Security and Privacy in Networks and Multimedia https://directory.doabooks.org/handle/20.500.12854/143668
52. Research Notes on Digital Business Transformation and Artificial Intelligence https://directory.doabooks.org/handle/20.500.12854/161862
53. Digital Transformations in Public International Law https://directory.doabooks.org/handle/20.500.12854/92193
54. Models of socio-cyber-physical systems security https://directory.doabooks.org/handle/20.500.12854/134824.2
55. Cybersecurity of Digital Service Chains https://directory.doabooks.org/handle/20.500.12854/81287
56. Large Language Models in Cybersecurity https://directory.doabooks.org/handle/20.500.12854/138848
57. Chapter 13 Human Rights and Law Enforcement at Sea https://directory.doabooks.org/handle/20.500.12854/134283
58. eHealth Innovative Approaches and Applications https://directory.doabooks.org/handle/20.500.12854/139248
59. The Global Race for Technological Superiority https://directory.doabooks.org/handle/20.500.12854/48691
60. The Huawei and Snowden Questions https://directory.doabooks.org/handle/20.500.12854/29326
61. Advances and Technologies in High Voltage Power Systems Operation, Control, Protection and Security https://directory.doabooks.org/handle/20.500.12854/76764
62. Understanding and mitigating cyberfraud in Africa https://directory.doabooks.org/handle/20.500.12854/139127
63. Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings https://directory.doabooks.org/handle/20.500.12854/34980
64. The Public Core of the Internet: An international Agenda for Internet Governance https://directory.doabooks.org/handle/20.500.12854/39675
65. Security. Cooperation. Governance. https://directory.doabooks.org/handle/20.500.12854/132865
66. Machine Learning for Cybersecurity https://directory.doabooks.org/handle/20.500.12854/153071
67. Modeling of security systems for critical infrastructure facilities https://directory.doabooks.org/handle/20.500.12854/134866.2
68. The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? https://directory.doabooks.org/handle/20.500.12854/26719
69. Chapter 10 Sustainability, Public Security, and Privacy Concerns Regarding Central Bank Digital Currency (CBDC) https://directory.doabooks.org/handle/20.500.12854/114194
70. Cybersecurity and Data Science https://directory.doabooks.org/handle/20.500.12854/98972
71. Co-governed Sovereignty Network https://directory.doabooks.org/handle/20.500.12854/71642
72. Modern Cryptography https://directory.doabooks.org/handle/20.500.12854/67117
73. Smart Urban Water Networks https://directory.doabooks.org/handle/20.500.12854/76580
74. Sicherheit als Grundsatz https://directory.doabooks.org/handle/20.500.12854/31583
75. Data Hiding and Its Applications https://directory.doabooks.org/handle/20.500.12854/78774
76. Cybersecurity als Unternehmensleitungsaufgabe (Volume 2) https://directory.doabooks.org/handle/20.500.12854/81419
77. Cybersecurity in Latvia https://directory.doabooks.org/handle/20.500.12854/163217
78. Capabilities-Based Planning for Energy Security at Department of Defense Installations https://directory.doabooks.org/handle/20.500.12854/115055
79. AI for Cybersecurity: Robust models for Authentication, Threat and Anomaly Detection https://directory.doabooks.org/handle/20.500.12854/112521
80. Emergency Management https://directory.doabooks.org/handle/20.500.12854/65493
81. Integration of AC/DC Microgrids into Power Grids https://directory.doabooks.org/handle/20.500.12854/68743
82. Advanced Digital Auditing https://directory.doabooks.org/handle/20.500.12854/93990
83. The Power to Coerce https://directory.doabooks.org/handle/20.500.12854/115484
84. War 4.0 https://directory.doabooks.org/handle/20.500.12854/161647
85. Cognitive Hyperconnected Digital Transformation https://directory.doabooks.org/handle/20.500.12854/94329
86. Principle of Architecture, Protocol, and Algorithms for CoG-MIN https://directory.doabooks.org/handle/20.500.12854/162880
87. Synergy of building cybersecurity systems https://directory.doabooks.org/handle/20.500.12854/134893.2
88. Militant Jihadism https://directory.doabooks.org/handle/20.500.12854/71939
89. Militant Jihadism https://directory.doabooks.org/handle/20.500.12854/29502
90. Methods and Concepts for Designing and Validating Smart Grid Systems https://directory.doabooks.org/handle/20.500.12854/53320
91. Real-Time Sensor Networks and Systems for the Industrial IoT https://directory.doabooks.org/handle/20.500.12854/69302
92. Violences en ligne : décrypter les mécanismes du cyberharcèlement https://directory.doabooks.org/handle/20.500.12854/146023
93. Mathematics and Engineering https://directory.doabooks.org/handle/20.500.12854/69235
94. Advances on Smart Cities and Smart Buildings https://directory.doabooks.org/handle/20.500.12854/84519
95. Data ethics : building trust https://directory.doabooks.org/handle/20.500.12854/150265
96. Disruptive Trends in Automation Technology https://directory.doabooks.org/handle/20.500.12854/139319
97. Trusted Artificial Intelligence in Manufacturing; Trusted Artificial Intelligence in Manufacturing https://directory.doabooks.org/handle/20.500.12854/78056
98. Preparing for Hybrid Threats to Security https://directory.doabooks.org/handle/20.500.12854/143908
99. Nordic e-Infrastructure Tomorrow https://directory.doabooks.org/handle/20.500.12854/158422
100. Internet of Things Applications – From Research and Innovation to Market Deployment https://directory.doabooks.org/handle/20.500.12854/94285
101. Access Contested https://directory.doabooks.org/handle/20.500.12854/78511
102. Computer Aided Verification https://directory.doabooks.org/handle/20.500.12854/34402
103. Petri Nets in Science and Engineering https://directory.doabooks.org/handle/20.500.12854/130105
104. Anomaly Detection https://directory.doabooks.org/handle/20.500.12854/135402
105. Computer Aided Verificatio https://directory.doabooks.org/handle/20.500.12854/112854
106. Computer Aided Verification https://directory.doabooks.org/handle/20.500.12854/112765
107. Computer Aided Verification https://directory.doabooks.org/handle/20.500.12854/112810
108. Cybersecurity als Unternehmensleitungsaufgabe https://directory.doabooks.org/handle/20.500.12854/72731
109. Violence, Victimization and Prevention https://directory.doabooks.org/handle/20.500.12854/137758
110. Internet of Things and the Law https://directory.doabooks.org/handle/20.500.12854/160528
111. Chapter 3 The competition over norms https://directory.doabooks.org/handle/20.500.12854/151167
112. China, Russia, and the USA in the Middle East https://directory.doabooks.org/handle/20.500.12854/151021
113. Data Communications and Network Technologies https://directory.doabooks.org/handle/20.500.12854/93994
114. Database Principles and Technologies – Based on Huawei GaussDB https://directory.doabooks.org/handle/20.500.12854/93997
115. Emerging Technologies, Law and Policies https://directory.doabooks.org/handle/20.500.12854/165626
116. Advanced Modeling and Research in Hybrid Microgrid Control and Optimization https://directory.doabooks.org/handle/20.500.12854/76927
117. Internet of Things https://directory.doabooks.org/handle/20.500.12854/131095
118. Artificial Intelligence and International Conflict in Cyberspace https://directory.doabooks.org/handle/20.500.12854/99946
119. Electrification of Smart Cities https://directory.doabooks.org/handle/20.500.12854/100085
120. Autonomous Ships and the Law https://directory.doabooks.org/handle/20.500.12854/133019