| Item name | Item Type |
| An In-Depth Guide to Mobile Device Forensics | ebook |
| Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology | ebook |
| Big Data Analytics and Computing for Digital Forensic Investigations | ebook |
| Creating an Information Security Program from Scratch | ebook |
| Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures | ebook |
| Cyber-Security Threats, Actors, and Dynamic Mitigation | ebook |
| Cybersecurity Lessons from CoVID-19 | ebook |
| CyRM: Mastering the Management of Cybersecurity | ebook |
| Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures | ebook |
| Emerging Security Algorithms and Techniques | ebook |
| Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World | ebook |
| The Insider Threat: Assessment and Mitigation of Risks | ebook |
| Internet of Things Security: Principles, Applications, Attacks, and Countermeasures | ebook |
| Internet of Things, Threats, Landscape, and Countermeasures | ebook |
| Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control | ebook |
| Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives | ebook |
| Secrets of a Cyber Security Architect | ebook |
| Security without Obscurity: Frequently Asked Questions (FAQ) | ebook |
| Social Engineering: Hacking Systems, Nations, and Societies | ebook |