IT and Cybersecurity

Updated February 10, 2026
Drag items up and down to your preferred order then select the "Save Order" button.
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
Chapple, Mike
Ebook
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by...
(ISC)2 CISSP Certified Information Systems Security Professional: Official Study Guide
Chapple, Mike
Ebook
The only Official CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This...
(ISC)2 SSCP Systems Security Certified Practitioner official practice tests
Chapple, Mike
Ebook
Smarter, faster prep for the SSCP exam The (ISC)2 SSCP Official Practice Tests, 2nd Edition is the only (ISC)2-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapters cover each of the seven domains on the SSCP exam...
8 steps to better security : a simple cyber resilience guide for business
Crawley, Kim
Ebook
Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap...
Advances in data science : symbolic, complex, and network data
Diday, Edwin
Ebook
Data science unifies statistics, data analysis and machine learning to achieve a better understanding of the masses of data which are produced today, and to improve prediction. Special kinds of data (symbolic, network, complex, compositional) are increasingly frequent in data science. These data...
The Art of attack: Attacker Mindset for Security Professionals
Reynolds, Maxie
Ebook
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the...
AWS certified solutions architect study guide with 900 practice test questions : associate (SAA-C03) exam
Clinton, David
Ebook
Master Amazon Web Services solution delivery and efficiently prepare for the AWS Certified SAA-C03 Exam with this all-in-one study guide The AWS Certified Solutions Architect Study Guide: Associate (SAA-C03) Exam, 4th Edition comprehensively and effectively prepares you for...
Blockchain for real world applications
Garg, Rishabh
Ebook
Blockchain for Real World Applications A comprehensive examination of blockchain architecture and its key characteristics Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a...
CASP+ CompTIA Advanced Security Practitioner Study Guide : Exam CAS-004
Tanner, Nadean H.
Ebook
Prepare to succeed in your new cybersecurity career with the challenging and sought-after CASP+ credential  In the newly updated Fourth Edition of CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004, risk management and compliance expert Jeff...
CISM Certified Information Security Manager Study Guide
Chapple, Mike.
Ebook
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide As cybersecurity becomes an increasingly mission-critical issue, more and more employers and professionals are turning to ISACA's trusted and recognized Certified Information...
Cloud computing for dummies
Kirsch, Daniel
Paper Book
Get your head--and your business--into the Cloud  Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it's become a real and important part of our information...
Cloud Native Security
Binnie, Chris
Ebook
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure. Throughout the work hands-on examples walk through...
Comptia cloud essentials+ study guide : exam clo-002
Docter, Quentin
Ebook
Prepare for success on the New Cloud Essentials+ Exam (CLO-002) The latest title in the popular Sybex Study Guide series, CompTIA Cloud Essentials+ Study Guide helps candidates prepare for taking the NEW CompTIA Cloud Essentials+ Exam (CLO-002). Ideal for non-technical...
CompTIA Cloud+ Study Guide: Exam CV0-003
Piper, Ben
Ebook
In the newly revised Third Edition of CompTIA Cloud+ Study Guide: Exam CVO-003, expert IT Ben Piper delivers an industry leading resource for anyone preparing for the CompTIA Cloud+ certification and a career in cloud services. The book introduces candidates to the skills and the...
CompTIA DataSys+ Study Guide : Exam DS0-001
Chapple, Mike.
Ebook
Your all-in-one guide to preparing for the CompTIA DataSys+ exam In CompTIA DataSys+ Study Guide: Exam DS0-001, a team of accomplished IT experts delivers a practical and hands-on roadmap to succeeding on the challenging DS0-001 exam and in a new or existing career as a data...
CompTIA PenTest+ Study Guide : Exam PT0-002
Seidl, David.
Ebook
Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing  In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and...
Computer science security : concepts and tools
Zaidoun, Ameur Salem
Ebook
This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools...
Conflicts, crimes and regulations in cyberspace
Laurent, Sébastien
Ebook
The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological...
Cryptography : Algorithms, Protocols, and Standards for Computer Security
Mammeri, Zoubir Z.
Ebook
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity...
Cyber security and digital forensics : challenges and future trends
Pramanik, Sabyasachi
Ebook
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of...
Cyber Security and Network Security
Pramanik, Sabyasachi.
Ebook
CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. ...
Cyber threat intelligence
Lee, Martin (Computer security expert)
Ebook
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about...
Cybersecurity and Local Government
Norris, Donald F.
Ebook
CYBERSECURITY AND LOCAL GOVERNMENT Learn to secure your local government's networks with this one-of-a-kind resource In Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local...
Cybersecurity and third-party risk : third party threat hunting
Rasner, Gregory C.
Paper Book
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile...
The cybersecurity guide to governance, risk, and compliance
Edwards, Jason (Cybersecurity expert)
Ebook
The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially...
CYBERSECURITY IN SMART HOMES architectures, solutions and technologies
KHATOUN, RIDA.
Ebook
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously...
Data lakes.
Laurent, Anne; Laurent, Dominique & Madera, Cedrine
Ebook
The concept of a data lake is less than 10 years old, but they are already hugely implemented within large companies. Their goal is to efficiently deal with ever-growing volumes of heterogeneous data, while also facing various sophisticated user needs. However, defining and building a data lake is...
Data Science Fundamentals with R, Python, and Open Data
Cremonini, Marco.
Ebook
Data Science Fundamentals with R, Python, and Open Data Introduction to essential concepts and techniques of the fundamentals of R and Python needed to start data science projects Organized with a strong focus on open data, Data Science Fundamentals with R, Python, and...
Deep learning approaches to cloud security
Rathore, Pramod Singh
Ebook
DEEP LEARNING APPROACHES TO CLOUD SECURITY Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the...
Design for Embedded Image Processing on FPGAs
Bailey, Donald G.
Ebook
Design for Embedded Image Processing on FPGAs Bridge the gap between software and hardware with this foundational design reference Field-programmable gate arrays (FPGAs) are integrated circuits designed so that configuration can take place. Circuits of this kind play an...
Designing big data platforms : How to use, deploy, and maintain big data systems
Aytas, Yusuf
Ebook
DESIGNING BIG DATA PLATFORMS Provides expert guidance and valuable insights on getting the most out of Big Data systems An array of tools are currently available for managing and processing data--some are ready-to-go solutions that can be immediately deployed, while others...
Designing data visualizations
Iliinsky, Noah.
Ebook
Data visualization is an efficient and effective medium for communicating large amounts of information, but the design process can often seem like an unexplainable creative endeavor. This concise book aims to demystify the design process by showing you how to use a linear decision-making...
Digital Finance: Security Tokens and Unlocking the Real Potential of Blockchain
Paper Book
An essential look at technology and the future of finance from Baxter Hines, cofounder of Honeycomb Digital Investments.
Effective Vulnerability Management : Managing Risk in the Vulnerable Digital Ecosystem
Hughes, Chris.
Ebook
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time...
Emerging computing paradigms : principles, advances and applications
Murugesan, San
Ebook
EMERGING COMPUTING PARADIGMS A holistic overview of major new computing paradigms of the 21st Century In Emerging Computing Paradigms: Principles, Advances and Applications, international scholars offer a compendium of essential knowledge on new promising computing...
Engineering intelligent systems : systems engineering and design with artificial intelligence, visual modeling, and systems thinking
Brown, Barclay R.
Ebook
Engineering Intelligent Systems Exploring the three key disciplines of intelligent systems As artificial intelligence (AI) and machine learning technology continue to develop and find new applications, advances in this field have generally been focused on the development of...
Google Cloud : Certified Associate Cloud Engineer study guide
Sullivan, Dan
Ebook
Quickly and efficiently prepare for the Google Associate Cloud Engineer certification with the proven Sybex method In the newly updated Second Edition of Google Cloud Certified Associate Cloud Engineer Study Guide, expert engineer and tech educator Dan Sullivan delivers an...
(ISC)2 SSCP Systems Security Certified Practitioner official practice tests
Chapple, Mike
Ebook
Smarter, faster prep for the SSCP exam The (ISC)2 SSCP Official Practice Tests, 2nd Edition is the only (ISC)2-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapters cover each of the seven domains on the SSCP exam...
Intelligent security management and control in the Iot
Chalouf, Mohamed-Aymen
Ebook
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications and...
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests
Chapple, Mike.
Ebook
Full-length practice tests covering all CISSP domains for the ultimate CISSP prep The ISC2 CISSP Official Practice Tests is a major resource for ISC2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions....
Kali Linux penetration testing bible
Khawaja, Gus
Ebook
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration...
Machine learning techniques and analytics for cloud security
Chakraborty, Rajdeep
Ebook
MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions The aim of Machine Learning Techniques and Analytics for...
Machine Learning Theory and Applications : Hands-On Use Cases with Python on Classical and Quantum Machines
Vasques, Xavier.
Ebook
Machine Learning Theory and Applications Enables readers to understand mathematical concepts behind data engineering and machine learning algorithms and apply them using open-source Python libraries Machine Learning Theory and Applications delves into the realm of...
Machine Learning with Python Cookbook, 2nd Edition
Paper Book
Mastering Microsoft Teams : Creating a Hub for Successful Teamwork in Office 365
Wheeler, Christina.
Ebook
Get the most out of Microsoft Teams with this comprehensive and insightful resource  Mastering Microsoft Teams: Creating a Hub for Successful Teamwork in Office 365 shows readers how to communicate intelligently and effectively within Microsoft's powerful...
Mastering windows server 2022 with azure cloud services : IaaS, PaaS, and SaaS
Panek, William
Ebook
Extend your on-premises Windows Server deployments to the cloud with Azure In Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS, 5-time Microsoft MVP Winner William Panek delivers a comprehensive and practical blueprint for planning, implementing,...
MCA Microsoft Certified Associate Azure Network Engineer Study Guide : Exam AZ-700
Udayakumar, Puthiyavan.
Ebook
Prepare to take the NEW Exam AZ-700 with confidence and launch your career as an Azure Network Engineer Not only does MCA Microsoft Certified Associate Azure Network Engineer Study Guide: Exam AZ-700 help you prepare for your certification exam, it takes a deep dive into the...
Meta-Heuristic Algorithms for Advanced Distributed Systems
Anand, Rohit
Ebook
META-HEURISTIC ALGORITHMS FOR ADVANCED DISTRIBUTED SYSTEMS Discover a collection of meta-heuristic algorithms for distributed systems in different application domains Meta-heuristic techniques are increasingly gaining favor as tools for optimizing distributed...
Microsoft Azure architect technologies and design complete study guide : exams AZ-303 and AZ-304
Perkins, Benjamin
Ebook
Become a proficient Microsoft Azure solutions architect Azure certifications are critical to the millions of IT professionals Microsoft has certified as MCSE and MCSA in Windows Server in the last 20 years. All of these professionals need to certify in key Azure exams to stay...
Multimedia security. Volume 1, Authentication and data hiding
Puech, William
Ebook
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and...
Net Zeros and Ones : How Data Erasure Promotes Sustainability, Privacy, and Security
Stiennon, Richard.
Ebook
Design, implement, and integrate a complete data sanitization program In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team of accomplished industry veterans delivers a comprehensive guide to managing permanent and...
Networking For Dummies
Lowe, Doug.
Ebook
This updated bestseller covers Windows 8, new storage and backup technologies, and more Both beginning network administrators and home users have made previous editions of this book a top seller. Now fully updated, this edition shows you step by step how to set up and maintain a...
The official (ISC)2 CCSP CBK reference
Fife, Leslie
Ebook
The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and...
Official Google Cloud Certified Professional Data Engineer study guide
Sullivan, Dan
Ebook
The proven Study Guide that prepares you for this new Google Cloud exam The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud...
Optimization for learning and control
Hansson, Anders
Ebook
Optimization for Learning and Control Comprehensive resource providing a masters' level introduction to optimization theory and algorithms for learning and control Optimization for Learning and Control describes how optimization is used in these domains, giving a...
Penetration testing for dummies
Shimonski, Robert
Ebook
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a...
Practical Java programming for IOT, AI, and Blockchain
Xiao, Perry
Ebook
Learn practical uses for some of the hottest tech applications trending among technology professionals  We are living in an era of digital revolution. On the horizon, many emerging digital technologies are being developed at a breathtaking speed. Whether we like it or...
Project zero trust : a story about a strategy for aligning security and the business
Finney, George
Ebook
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero...
Reinforcement learning and stochastic optimization : a unified framework for sequential decisions
Powell, Warren B.
Ebook
REINFORCEMENT LEARNING AND STOCHASTIC OPTIMIZATION Clearing the jungle of stochastic optimization Sequential decision problems, which consist of "decision, information, decision, information," are ubiquitous, spanning virtually every human activity ranging from...
Resource optimization and security for cloud services
Xiong, Kaiqi.
Ebook
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an...
Responsible Data Science : Transparency and fairness in algorithms
Fleming, Grant
Ebook
Explore the most serious prevalent ethical issues in data science with this insightful new resource The increasing popularity of data science has resulted in numerous well-publicized cases of bias, injustice, and discrimination. The widespread deployment of "Black box" algorithms...
Security issues and privacy concerns in Industry 4.0 applications
David, Shiblin
Ebook
SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONS Written and edited by a team of international experts, this is the most comprehensive and up-to-date coverage of the security and privacy issues surrounding Industry 4.0 applications, a must-have for any library. ...
Stepping Through Cybersecurity Risk Management : A Systems Thinking Approach
Bayuk, Jennifer L.
Ebook
Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional...
The uncertain digital revolution
Vitalis, Andre
Ebook
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has unexpectedly progressed beyond our...

Library staff! You can create and contribute to lists. Contact your catalog administrator or log in here.