|
Internet of Things and Cyber Physical Systems: Security and Forensics
by
|
|
|
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory
by
it was amazing 5.00 avg rating — 1 rating
—
2 editions
|
|
|
Practical Digital Forensics: A Guide for Windows and Linux Users
by
it was amazing 5.00 avg rating — 1 rating
—
3 editions
|
|
|
A Practical Approach to Open Source Intelligence (OSINT) - Volume 1
by
0.00 avg rating — 0 ratings
|
|
|
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2)
by
0.00 avg rating — 0 ratings
|
|
|
Beyond The Invisible Nexus: Dark Web, Dark AI and Offensive Security
by
0.00 avg rating — 0 ratings
|
|
|
Beyond The Invisible Nexus: Dark Web, Dark AI and Offensive Security
by
|
|
|
Securing the Digital Frontier: Advanced frameworks for social media and IoT threats
by
0.00 avg rating — 0 ratings
|
|
|
Securing the Digital Frontier: Advanced frameworks for social media and IoT threats
by
0.00 avg rating — 0 ratings
|
|
|
Mastering Intrusion Detection for Cybersecurity
by
0.00 avg rating — 0 ratings
|
|
|
Practical Approach to Open Source Intelligence (OSINT): Volume 2
by
0.00 avg rating — 0 ratings
|
|
|
Practical Approach to Open Source Intelligence (OSINT): Volume 2
by
|
|
|
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2)
by
0.00 avg rating — 0 ratings
|
|
|
Mastering Cybersecurity
by
0.00 avg rating — 0 ratings
|
|
|
A Practical Approach to Open Source Intelligence (OSINT) - Volume 1
by
|
|
|
Security Incidents & Response Against Cyber Attacks (EAI/Springer Innovations in Communication and Computing)
by
|
|
|
Smart Home and Industrial IoT Devices: Critical Perspectives on Cyberthreats, Frameworks and Protocols
by
|
|
|
Cyber Investigations of Smart Devices
by
|
|
|
Mastering Cybersecurity
by
|
|
|
Cyber Forensics and Investigation on Smart Devices
by
|
|
|
Insecure Digital Frontiers
by
|
|
|
Beyond the Realms: Navigating the Metaverse
by
|
|
|
New Age Cyber Threat Mitigation for Cloud Computing Networks
by
|
|
|
ARCHITEKTURA DODATKOWA DO MITYGACJI
by
|
|
|
CompTIA CASP+ CAS-004 Exam Guide: A-Z of Advanced Cybersecurity Concepts, Mock Exams, Real-world Scenarios with Expert Tips
by
|
|
|
Evolving Role of AI and IoMT in the Healthcare Market
by
|
|
|
Perspectives on Ethical Hacking and Penetration Testing
by
|
|
|
Security Implementation in Internet of Medical Things
by
|
|
|
Advanced Smart Computing Technologies in Cybersecurity and Forensics
by
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.