Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
- Label
- Computer security
A sample of Items that share the Concept Computer security See All
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- .NET framework security
- 10 don'ts on our digital devices : the non-techie's survival guide to cyber security and privacy
- 125 sposobów na bezpieczeństwo sieci
- 1994 ACM SIGSAC New Security Paradigms Workshop : proceedings, August 3-5, 1994, Little Compton, Rhode Island
- 2012 4th International Conference on Cyber Conflict : proceedings
- 2016 8th International Conference on Cyber Conflict : Cyber Power : 30 May - 03 June 2016, Tallinn, Estonia
- 24 deadly sins of software security : programming flaws and how to fix them
- 24 deadly sins of software security : programming flaws and how to fix them
- 70 Tips and Tricks for Mastering the CISSP Exam
- A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities
- A bug hunter's diary : a guided tour through the wilds of software security
- A bug hunter's diary : a guided tour through the wilds of software security
- A classical introduction to cryptography : applications for communications security
- A cryptography primer : secrets and promises
- A guide to kernel exploitation : attacking the core
- A guide to kernel exploitation : attacking the core
- A guide to kernel exploitation : attacking the core
- A multidisciplinary introduction to information security
- A multidisciplinary introduction to information security
- A multidisciplinary introduction to information security
- A practical guide to TPM 2.0 : using the new Trusted Platform Module in the new age of security
- A practical guide to computer forensics investigations
- A practical guide to computer forensics investigations
- A practical guide to security assessments
- A practical guide to trusted computing
- A practical guide to trusted computing
- A process for developing a common vocabulary in the information security area
- A study of black hole attack solutions : on AODV routing protocol in MANET
- AES und Rucksackverfahren : Theorie und Praxis mit AVR- und dsPIC-Mikrocontrollern
- AI in Cybersecurity
- Absolute beginner's guide to security, spam, spyware and viruses
- Abusing the Internet of things : blackouts, freakouts, and stakeouts
- Achieving and Sustaining Secured Business Operations : An Executiveђ́ةs Guide to Planning and Management
- Adaptive security management architecture
- Adopting Biometric Technology : Challenges and Solutions
- Advanced API Security : OAuth 2.0 and Beyond
- Advanced API security : securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
- Advanced Hybrid Information Processing : First International Conference, ADHIP 2017, Harbin, China, July 17-18, 2017, Proceedings
- Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
- Advanced concepts for intelligent vision systems : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings
- Advanced host intrusion prevention with CSA
- Advanced host intrusion prevention with CSA
- Advanced information systems engineering workshops : CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings
- Advanced malware analysis
- Advanced malware analysis
- Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
- Advanced persistent threat : understanding the danger and how to protect your organization
- Advanced persistent threat hacking : the art and science of hacking any organization
- Advanced persistent threat hacking : the art and science of hacking any organization
- Advanced persistent training : take your security awareness program to the next level
- Advanced research in data privacy
- Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II
- Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I
- Advances in Cryptology -- CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I
- Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, revised selected papers
- Advances in Digital Forensics XIII : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers
- Advances in Elliptic Curve Cryptography
- Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings
- Advances in Information and Computer Security : 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings
- Advances in Neural Networks - ISNN 2017 : 14th International Symposium, ISNN 2017, Sapporo, Hakodate, and Muroran, Hokkaido, Japan, June 21–26, 2017, Proceedings, Part II
- Advances in Visual Computing : 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part I
- Advances in artificial intelligence for privacy protection and security
- Advances in cyber security : principles, techniques, and applications
- Advances in elliptic curve cryptography
- Advances in intelligence and security informatics
- Advances in intelligence and security informatics
- Advances in intelligence and security informatics
- Advances in intelligent information systems
- Adversarial machine learning
- Aggressive network self-defense
- Agile application security : enabling security in a continuous delivery pipeline
- Ajax security
- Ajax security
- An Introduction to information security and ISO27001:2013 : a pocket guide
- An introduction to cyber modeling and simulation
- An introduction to cyber modeling and simulation
- An introduction to security in a CSM 1.3 for AIX 5L environment
- An introduction to security in a CSM 1.3 for AIX 5L environment
- Analysis, design, and implementation of secure and interoperable distributed health information systems
- Analyzing computer security : a threat/vulnerability/countermeasure approach
- Analyzing computer security : a threat/vulnerability/countermeasure approach
- Android security essentials LiveLessons : (sneak peek video training)
- Anonymizing health data : case studies and methods to get you started
- Application security in the ISO 27001:2013 environment
- Application security in the ISO 27001:2013 environment
- Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, proceedings
- Applications of secure multiparty computation
- Applied Cryptography and Network Security : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
- Applied Cryptography in .NET and Azure Key Vault : A Practical Guide to Encryption in .NET and .NET Core
- Applied Oracle security : developing secure database and middleware environments
- Applied Oracle security : developing secure database and middleware environments
- Applied cryptanalysis : breaking ciphers in the real world
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied cryptography : protocols, algorithms, and source code in C
- Applied information security : a hands-on approach
- Applied network security monitoring : collection, detection, and analysis
- Applied security visualization
- Applied security visualization
- Architecting user-centric privacy-as-a-set-of-services : digital identity-related privacy framework
- Are your bits flipped? : overcoming tech misconceptions
- Artificial immune system : applications in computer security
- Artificial intelligence tools for cyber attribution
- Assessing and managing security risk in IT systems : a structured methodology
- Assessing and managing security risk in IT systems : a structured methodology
- Assessing information security : strategies, tactics, logic and framework
- Asset attack vectors : building effective vulnerability management strategies to protect organizations
- Asset attack vectors : building effective vulnerability management strategies to protect organizations
- Attribute-based access control
- Auditing IT infrastructures for compliance
- Auditing IT infrastructures for compliance
- Auditing IT infrastructures for compliance
- Auditing IT infrastructures for compliance
- Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebt
- Authentication and Access Control : Practical Cryptography Methods and Tools
- Automated security management
- Automated software diversity
- Automatic malware analysis : an emulator based approach
- Autonomous cyber deception : reasoning, adaptive planning, and evaluation of HoneyThings
- Azure Security Handbook : A Comprehensive Guide for Defending Your Enterprise Environment
- Backing up Oracle : using Tivoli Storage Management
- Basics of contemporary cryptography for IT practitioners
- Basiswissen Sichere Software : aus- und Weiterbildung zum ISSECO Certified Professionell for Secure Software Engineering
- Become ITIL Foundation Certified in 7 Days : Learning ITIL Made Simple with Real-life Examples
- Beginning Ethical Hacking with Kali Linux : Computational Techniques for Resolving Security Issues
- Beginning Ethical Hacking with Python
- Beginning Microsoft 365 Collaboration Apps : Working in the Microsoft Cloud
- Beginning cryptography with Java
- Bent functions : results and applications to cryptography
- Bent functions : results and applications to cryptography
- Beschaffung unter Berücksichtigung der IT-Sicherheit : Wichtigkeit, Herausforderungen und Maßnahmen
- Best Truth: Intelligence in the Information Age
- Best damn firewall book period
- Best practices in computer network defense : incident detection and response
- Big Data Recommender Systems - Volume 1 : Algorithms, Architectures, Big Data, Security and Trust
- Big data : storage, sharing, and security
- Big data : storage, sharing, and security
- Big digital forensic data, Volume 2, Quick analysis for evidence and intelligence
- BigNum math : implementing cryptographic multiple precision arithmetic
- Biohackers : the politics of open science
- Biometric Recognition : 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings
- Biometrics for network security
- Biometrics for network security
- Biometrics, computer security systems and artificial intelligence applications
- Black code : surveillance, privacy, and the dark side of the Internet
- Black hat Python : Python programming for hackers and pentesters
- Black hat Python : Python programming for hackers and pentesters
- Black hat Python : Python programming for hackers and pentesters
- Black hat physical device security : exploiting hardware and software
- Blockchain
- Blockchain technology and applications
- Bluetooth security
- Bootstrapping trust in modern computers
- Botnets
- Botnets : the killer web app
- Break-glass : handling exceptional situations in access control
- Buffer overflow attacks : detect, exploit, prevent
- Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmen
- Building Digital Experience Platforms : A Guide to Developing Next-Generation Enterprise Applications
- Building Python Real-Time Applications with Storm
- Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information
- Building a corporate culture of security : strategies for strengthening organizational resiliency
- Building a global information assurance program
- Building an information security awareness program
- Building an information security awareness program
- Building secure defenses against code-reuse attacks
- Building secure software : how to avoid security problems the right way
- Building secure software : how to avoid security problems the right way
- Bulletproof Android : practical advice for building secure apps
- CSA guide to cloud computing : implementing cloud privacy and security
- CSA guide to cloud computing : implementing cloud privacy and security
- Caught on the web : the ultimate cybersecurity guide
- Certification study guide, IBM Tivoli Access Manager for e-business 6.0
- Certified Ethical Hacker (CEH) Preparation Guide : Lesson-Based Review of Ethical Hacking and Penetration Testing
- Certified ethical hacker (CEH) cert guide
- Certified ethical hacker (CEH) platform penetration : learn how to ethically penetrate customer networks, systems, devices, apps, and databases
- Certified ethical hacker (CEH) version 9 cert guide
- Chained exploits : advanced hacking attacks from start to finish
- Chaos-based cryptography : theory, algorithms and applications
- Chaotic secure communication : principles and technologies
- Check Point NG : next generation security administration
- Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutions
- Chinese cybersecurity and defense
- Choose Your InfoSec Path : An Interactive Cybersecurity Adventure for Beginners
- Cisco DCUCI quick reference
- Cisco NetFlow
- Cisco security professional's guide to secure intrusion detection systems
- Citrix Access Gateway VPX 5.04 essentials : a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
- Click, click, who's there? : a family-based non-technical approach to help parents protect their children online
- Clickjacking und UI-Redressing - Vom Klick-Betrug zum Datenklau : Ein Leitfaden für Sicherheitsexperten und Webentwickler
- Cloud Defense Strategies with Azure Sentinel : Hands-on Threat Hunting in Cloud Logs and Services
- Cloud Security and Governance : Who's on your cloud?
- Cloud computing security : foundations and challenges
- Cloud computing security : foundations and challenges
- Cloud management and security
- Cloud security : a comprehensive guide to secure cloud computing
- Cloud security : a comprehensive guide to secure cloud computing
- Cloud security : overview and best practices
- Cloud storage security : a practical guide
- Codes, cryptology and curves with computer algebra
- Collaboration with cloud computing : security, social media, and unified communications
- Collaboration with cloud computing : security, social media, and unified communications
- Combating spyware in the enterprise
- Combinatorial Algorithms : 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers
- Communication in a wired world : be smart, be safe
- CompTIA Security+
- CompTIA Security+ Certification Study Guide : Network Security Essentials
- CompTIA security+ (SYO-401) : complete video course
- Compilation for secure multi-party computation
- Composition of Secure Multi-Party Protocols : A Comprehensive Study
- Computational Science -- ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018 Proceedings, Part III
- Computational Science -- ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part I
- Computational Science -- ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II
- Computational intelligence for privacy and security
- Computational network science : an algorithmic approach
- Computational social networks, Volume 2, Security and privacy
- Computer Forensics jumpstart
- Computer Networks : 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings
- Computer Safety, Reliability, and Security : 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings
- Computer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I
- Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
- Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
- Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
- Computer and Network Security Essentials
- Computer and information security handbook
- Computer and information security handbook
- Computer crime : computer security techniques
- Computer forensics : a pocket guide
- Computer forensics : incident response essentials
- Computer forensics : infoSec Pro guide
- Computer forensics : infoSec Pro guide
- Computer forensics for dummies
- Computer forensics jumpstart
- Computer incident response and forensics team management : conducting a successful incident response
- Computer privacy annoyances : how to avoid the most annoying invasions of your personal and online privacy
- Computer security
- Computer security : art and science
- Computer security : art and science
- Computer security : protecting digital resources
- Computer security : protecting digital resources
- Computer security and cryptography
- Computer security basics
- Computer security basics
- Computer security basics
- Computer security fundamentals
- Computer security fundamentals
- Computer security in the 21st century
- Computer security literacy : staying safe in a digital world
- Computer security within organizations
- Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären
- Computer-Forensik Hacks
- Computer-related risks
- Computers and privacy
- Computers at Risk: Safe Computing in the Information Age
- Computers at risk : safe computing in the information age
- Computers under attack : intruders, worms, and viruses
- Computers, ethics & social values
- Computers, privacy and data protection : an element of choice
- Concurrency, security, and puzzles : essays dedicated to Andrew William Roscoe on the occasion of his 60th birthday
- Configuring ISA server 2000 : building firewalls for windows 2000
- Configuring Symantec Antivirus, Corporate Edition
- Confronting cyber risk : an embedded endurance strategy for cybersecurity
- Constructive Side-Channel Analysis and Secure Design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers
- Constructive Side-Channel Analysis and Secure Design : 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedings
- Contemporary cryptography
- Contemporary cryptology : the science of information integrity
- Convergence : illicit networks and national security in the age of globalization
- Conversations in cyberspace
- Core security patterns : best practices and strategies for J2EE, Web services, and identity management
- Core security patterns : best practices and strategies for J2EE, Web services, and identity management
- Core software security : security at the source
- Core software security : security at the source
- Cracking codes with Python : an introduction to building and breaking ciphers
- Cracking codes with Python : an introduction to building and breaking ciphers
- Crackproof your software : the best ways to protect your software against crackers
- Crafting the InfoSec playbook
- Crafting the InfoSec playbook : security monitoring and incident response master plan
- Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools
- Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools
- Crimeware : understanding new attacks and defenses
- Crimeware : understanding new attacks and defenses
- Critical Information Infrastructures Security : 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers
- Critical infrastructure protection against hybrid warfare security related challenges
- Crypto : how the code rebels beat the government, saving privacy in the digital age
- Cryptographic Security Architecture : Design and Verification
- Cryptography and Cryptanalysis in MATLAB : Creating and Programming Advanced Algorithms
- Cryptography and coding : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings
- Cryptography and network security
- Cryptography and network security
- Cryptography and network security : principles and practice
- Cryptography and network security : principles and practice
- Cryptography and network security : principles and practice
- Cryptography and security : from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday
- Cryptography in C and C++
- Cryptography in C and C++, second edition
- Cryptography: an introduction to computer security
- Cryptology and network security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
- Cryptology and network security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
- Cultural property security : protecting museums, historic sites, archives, and libraries
- Cyber Operations : Building, Defending, and Attacking Modern Computer Networks
- Cyber Security on Azure : An IT Professionalђ́ةs Guide to Microsoft Azure Security Center
- Cyber Threat Intelligence : The No-Nonsense Guide for CISOs and Security Managers
- Cyber adversary characterization : auditing the hacker mind
- Cyber attacks : protecting national infrastructure
- Cyber blockades
- Cyber crime, security and digital intelligence
- Cyber deception : building the scientific foundation
- Cyber denial, deception and counter deception : a framework for supporting active cyber defense
- Cyber fraud : tactics, techniques, and procedures
- Cyber fraud : tactics, techniques, and procedures
- Cyber fraud tactics, techniques and procedures
- Cyber operations : building, defending, and attacking modern computer networks / Mike O'Leary
- Cyber resilience
- Cyber resilience
- Cyber resilience of systems and networks
- Cyber security : essential principles to secure your organisation
- Cyber security : power and technology
- Cyber security and IT infrastructure protection
- Cyber security and IT infrastructure protection
- Cyber security awareness for CEOs and management
- Cyber security awareness for CEOs and management
- Cyber security culture : counteracting cyber threats through organizational learning and training
- Cyber security engineering : a practical approach for systems and software assurance
- Cyber security essentials
- Cyber security for educational leaders : a guide to understanding and implementing technology policies
- Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
- Cyber security on Azure : an IT professionals guide to Microsoft Azure security center
- Cyber security, cyber crime and cyber forensics : applications and perspectives
- Cyber situational awareness : issues and research
- Cyber situational awareness in public-private-partnerships : organisationsübergreifende cyber-Sicherheitsvorfälle effektiv bewältigen
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals
- Cyber spying : tracking your family's (sometimes) secret online lives
- Cyber threat intelligence
- Cyber threat prevention
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyber threat! : how to manage the growing risk of cyber attacks
- Cyber-Physical Attack Recovery Procedures : A Step-by-Step Preparation and Response Guide
- Cyber-Physical-Social Systems and Constructs in Electric Power Engineering
- Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
- Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
- Cyber-risk management
- Cyber-security of SCADA and other industrial control systems
- Cybercrime and business : strategies for global corporate security
- Cybercrimes : a multidisciplinary analysis
- Cyberjutsu : cybersecurity for the modern ninja
- Cyberpower : crime, conflict and security in cyberspace
- Cybersecurity : a self-teaching introduction
- Cybersecurity : the beginner's guide: a comprehensive guide to getting started in cybersecurity
- Cybersecurity Best Practices : Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden
- Cybersecurity Today and Tomorrow: Pay Now or Pay Later
- Cybersecurity and human rights in the age of cyberveillance
- Cybersecurity and privacy : bridging the gap
- Cybersecurity and resilience in the arctic
- Cybersecurity attacks (Red Team activity)
- Cybersecurity blue team toolkit
- Cybersecurity for Hospitals and Healthcare Facilities : A Guide to Detection and Prevention
- Cybersecurity for SCADA systems
- Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention
- Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
- Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
- Cybersecurity for industry 4.0 : analysis for design and manufacturing
- Cybersecurity investments : decision support under economic aspects
- Cybersecurity law : protect yourself and your customers
- Cybersecurity operations handbook
- Cybersecurity systems for human cognition augmentation
- Cybersecurity today and tomorrow : pay now or pay later
- Cybersecurity today and tomorrow : pay now or pay later
- Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
- Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
- Cybersécurité des Installations Industrielles
- Cybersécurité des Installations Industrielles : Chapitre XII Panorama de l'offre Technologique Pour la Cybersécurité Industrielle
- Cybersécurité des Installations Industrielles, Chapter V, Des bus de terrain a l'Industrial Ethernet
- Cybersécurité des installations industrielles : défendre ses systèmes numériques
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre I, Mythes et réalités de la cybersécurité des systèmes numériques industriels
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre II, Typologie des installations industrielles
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre X, Sécurité des Réseaux Industriels étendus
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre XIII, État des Lieux des Référentiels en Sécurité des Systèmes Numériques Industriels
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapitre XIV, Réglementation de la Cybersécurité et Régime Juridique des Systèmes Numériques Industriels : une étude des Dispositions Réglementaires en Cybersécurité en France et Aux États-Unis
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapter IV, Malveillance numérique sur les systèmes industriels : histoire de la menace, événements emblématiques, tendances et perspectives
- Cybersécurité des installations industrielles : défendre ses systèmes numériques, Chapter VI, Analyse des risques
- Cybersécurité et RGPD : protégez votre PME : guide pratique pour sécuriser votre système informatique et vous conformer au RGPD
- Cyberwarfare : an introduction to information-age conflict
- DIGITAL RISK GOVERNANCE : security strategies for the public and private sectors