Books on the topic 'Cybersecurity practices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cybersecurity practices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Bartsch, Michael, and Stefanie Frey, eds. Cybersecurity Best Practices. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9.
Full textMurphy, Randall J., Michael Sukkarieh, Jon Haass, and Paul Hriljac. Guidebook on Best Practices for Airport Cybersecurity. Transportation Research Board, 2015. http://dx.doi.org/10.17226/22116.
Full textChapple, Mike, and David Seidl. CompTIA Cybersecurity Analyst (CSA+) Practice Tests. John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549529.
Full textMustard, Steve. Industrial Cybersecurity Case Studies and Best Practices. ISA, 2022.
Find full textMastering Cybersecurity: Strategies, Technologies, and Best Practices. Apress L. P., 2024.
Find full textCybersecurity for Smart Cities: Practices and Challenges. Springer International Publishing AG, 2023.
Find full textPower Systems Cybersecurity: Methods, Concepts, and Best Practices. Springer International Publishing AG, 2024.
Find full textDong, Zhao Yang, Nikos Hatziargyriou, and Hassan Haes Alhelou. Power Systems Cybersecurity: Methods, Concepts, and Best Practices. Springer International Publishing AG, 2023.
Find full textPractical Cybersecurity: A Fat-Free Guide to Network Security Best Practices. Independently Published, 2023.
Find full textWaite-Bey, Shelly. Cybersecurity Hygiene: Technology Practices Vol.1 a Universal Guide to Begin Practicing Good Cybersecurity Hygiene. BookPatch LLC, The, 2021.
Find full textMongeau, Scott, and Andrzej Hajdasinski. Cybersecurity Data Science: Best Practices in an Emerging Profession. Springer International Publishing AG, 2022.
Find full textMongeau, Scott, and Andrzej Hajdasinski. Cybersecurity Data Science: Best Practices in an Emerging Profession. Springer International Publishing AG, 2021.
Find full textGovernment, U. S., and Department of Homeland Security. Best Practices for Planning a Cybersecurity Workforce and the National Initiative for Cybersecurity Education (NICE) Cybersecurity Capability Maturity Model - Benefits of Workforce Planning. Independently Published, 2018.
Find full textStallings, William. Effective Cybersecurity: A Guide to Using Best Practices and Standards. Pearson Education, Limited, 2018.
Find full textCybersecurity in the Digital Age: Tools, Techniques, and Best Practices. Wolters Kluwer Legal & Regulatory U.S., 2018.
Find full textComprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices. Ross Publishing, Incorporated, J., 2024.
Find full textCybersecurity in the Digital Age: Tools, Techniques, and Best Practices. Wolters Kluwer Legal & Regulatory U.S., 2018.
Find full textStallings, William. Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley Professional, 2018.
Find full textStallings, William. Effective Cybersecurity: A Guide to Using Best Practices and Standards. Pearson Education, Limited, 2018.
Find full textComprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices. Ross Publishing, Incorporated, J., 2024.
Find full textGaudiot, Jean-Luc, Kuan-Ching Li, Nitin Sukhija, and Elizabeth Bautista. Cybersecurity and High-Performance Computing Environments: Integrated Innovations, Practices, and Applications. Taylor & Francis Group, 2022.
Find full textGaudiot, Jean-Luc, Kuan-Ching Li, Nitin Sukhija, and Elizabeth Bautista. Cybersecurity and High-Performance Computing Environments: Integrated Innovations, Practices, and Applications. Taylor & Francis Group, 2022.
Find full textGaudiot, Jean-Luc, Kuan-Ching Li, Nitin Sukhija, and Elizabeth Bautista. Cybersecurity and High-Performance Computing Environments: Integrated Innovations, Practices, and Applications. Taylor & Francis Group, 2022.
Find full textGaudiot, Jean-Luc, Kuan-Ching Li, Nitin Sukhija, and Elizabeth Bautista. Cybersecurity and High-Performance Computing Environments: Integrated Innovations, Practices, and Applications. CRC Press LLC, 2022.
Find full textFrey, Stefanie, and Michael Bartsch. Cybersecurity Best Practices: Lösungen zur Erhöhung der Cyberresilienz für Unternehmen und Behörden. Springer Vieweg, 2018.
Find full textCybersecurity Life Skills for Teens: How to develop and use smart cybersecurity life skills, practices, and habits to keep cyber safe. Relevant Track, LLC., 2023.
Find full textGuide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices. Springer, 2024.
Find full textGuide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices. Springer, 2023.
Find full textShires, James. The Politics of Cybersecurity in the Middle East. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197619964.001.0001.
Full textCristiano, Fabio, and Bibi van den Berg, eds. Hybridity, Conflict, and the Global Politics of Cybersecurity. Rowman & Littlefield Publishing Group, 2023. https://doi.org/10.5040/9798881813529.
Full textCybersecurity Strategies and Best Practices: A Comprehensive Guide to Mastering Enterprise Cyber Defense Tactics and Techniques. Packt Publishing, Limited, 2024.
Find full textMohajer, David, Jacqueline Ferrari, Keith Gomes, Michelle Pang, and Sem Ponnambalam. Xahive Cybersecurity Best Practices Manual : Guidelines for Preventing Business Email Compromise: Be Prepared, Be Educated, Be Cybersafe. Independently Published, 2019.
Find full textOzkaya, Erdal. Incident Response in the Age of Cloud: Techniques and Best Practices to Effectively Respond to Cybersecurity Incidents. Packt Publishing, Limited, 2021.
Find full textMohajer, David, Jacqueline Ferrari, Keith Gomes, Michelle Pang, and Jessica Baran. Xahive Cybersecurity Best Practices Manual : Guidelines for Small Business to Large Enterprises: Be Prepared, Be Educated, Be Cybersafe. Independently Published, 2018.
Find full textMohajer, David, Jacqueline Ferrari, Keith Gomes, Michelle Pang, and Jessica Baran. Xahive Cybersecurity Best Practices Manual : Guidelines for Healthcare and Life Sciences Organizations: Be Prepared, Be Educated, Be Cybersafe. Independently Published, 2018.
Find full textBase, Ramon. Computer Networking Hacking: Ultimate Guide To Ethical Hacking , Wireless Network, Cybersecurity With Practical Penetration Test On Kali Linux And System Security Practices. Independently published, 2019.
Find full textDas, Ravi. Practical AI for Cybersecurity. Edited by Ravi Das. Auerbach Publications, 2020. http://dx.doi.org/10.1201/9781003005230.
Full textDas, Ravi. Practical AI for Cybersecurity. Edited by Ravi Das. Auerbach Publications, 2020. http://dx.doi.org/10.4324/9781003005230.
Full textDas, Ravi. Practical AI for Cybersecurity. Auerbach Publishers, Incorporated, 2021.
Find full textDas, Ravi. Practical AI for Cybersecurity. Auerbach Publishers, Incorporated, 2021.
Find full textDas, Ravi. Practical AI for Cybersecurity. Auerbach Publishers, Incorporated, 2021.
Find full textSantos, Henrique. Cybersecurity: A Practical Engineering Approach. CRC Press LLC, 2022.
Find full textSantos, Henrique M. D. Cybersecurity: A Practical Engineering Approach. Taylor & Francis Group, 2022.
Find full textSantos, Henrique M. D. Cybersecurity: A Practical Engineering Approach. Taylor & Francis Group, 2022.
Find full textSantos, Henrique M. D. Cybersecurity: A Practical Engineering Approach. Taylor & Francis Group, 2022.
Find full textPetronella, Craig. How HIPAA Can Crush Your Medical Practice 2nd Edition with New HIPAA Rules and Regulations For 2019: Why Most Medical Practices Don't Have a Clue about Cybersecurity or HIPAA and What to Do about It. Independently Published, 2019.
Find full text