Wiley Data and Cybersecurity Ebooks Title List 2022
Wiley Data and Cybersecurity Ebooks Title List 2022
Title
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 2nd Edition
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 2nd Edition
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd
Edition
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th
Edition
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests, 2nd Edition
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 2nd Edition
8 Steps to Better Security: A Simple Cyber Resilience Guide for BU.S.iness
A Practical Guide to SDN C
Accelerating the Adoption of IoT C
Advances in Data Science C
AI for Cloud Security
AI for Cyber Security
AI in IndU.S.try 4.0 and 5G Tech C
AI-Enabled Networks C
AI, Cybersecurity and Cyber Defence C
Algorithms and Ordering Heuristics
Alice and Bob Learn Application Security
Analytic SQL in SQL Server C
Applied Incident Response
Architecting Enterprise Blockchain Solutions
Archives in the Digital Age C
Argument Mining C
Artificial Intelligence C
Auto & Comp Intelligence C
Automated Data Collection with R
AWS Certified Security Study Guide: Specialty (SCS-C01) Exam
AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam, 3rd Edition
Beyond Artificial Intelligence C
Big Data
Big Data Analytics for IoT C
Big Data and Deep Learning C
Big Data and Differential Privacy
Blockchain Application Security C
Building Secure Cars C
CASP+ CompTIA Advanced Security Practitioner Practice Tests: Exam CAS-004, 2nd Edition
CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, 3rd Edition
CEH v11 Certified Ethical Hacker Study Guide
CEH v11 Certified Ethical Hacker Study Guide + Practice Tests Set
CEH v11: Certified Ethical Hacker Version 11 Practice Tests, 2nd Edition
Cellular V2X C
Certified Information Security Manager CISM Study Guide
Challenges of the Internet of Things C
Cloud Computing
Cloud Computing For Dummies, 2nd Edition
Cloud Native Security
Cloud Technologies C
Compression, Encryption
CompTIA Cloud Essentials+ Study Guide: Exam CLO-002, 2nd Edition
CompTIA Cloud+ Study Guide: Exam CV0-003, 3rd Edition
CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition
CompTIA CySA+ Study Guide Exam CS0-002
CompTIA PenTest+ Practice Tests: Exam PT0-001
CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition
CompTIA Security+ Practice Tests: Exam SY0-601, 2nd Edition
CompTIA Security+ Review Guide: Exam SY0-601, 5th Edition
CompTIA Security+ Study Guide: Exam SY0-601, 8th Edition
Computer Network Security C
Corporate Cybersecurity C
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's
Crypto
Cryptography, Codes 2e C
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual
Risk
Cyber Intelligence-Driven Risk: How to Build and U.S.e Cyber Intelligence for BU.S.iness Risk
Decisions
Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering
from Inevitable BU.S.iness Disruptions
Cyber Modeling and Simulation C
Cyber Operations C
Cyber Security and Digital Forensics C
Cyber Threat Intelligence C
Cyber-Vigilance and Digital TrU.S.t C
Cybercrime and Cyber Warfare
Cybercrime Investigators Handbook
Cybersecurity
Cybersecurity and Decision Makers C
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Cybersecurity Blue Team Toolkit
Cybersecurity C
Cybersecurity Essentials
Cybersecurity in Humanities C
Cybersecurity in Local Government C
Cybersecurity of IndU.S.trial Systems C
Cybersecurity Risk Management C
Data Analysis and Applications 1 C
Data Analysis and Applications 2 C
Data Analysis and Applications 3 C
Data Analytics and Big Data
Data Center Handbook
Data Center Handbook 2e C
Data Control C
Data Lakes C
Data Linkage
Data Mining Algorithms
Data Privacy and GDPR Handbook
Data Scientist's Guide C
Data-First Marketing: How To Compete and Win In the Age of Analytics
Decision Science and Risk Analysis
Design for Embedded Image Process C 2e
Designing Big Data Platforms C
Digital Finance: Security Tokens and Unlocking the Real Potential of Blockchain
Digital Information Ecosystems
Digital Transformation P
Digitalization of Society
Discover Knowledge in Data 2e
Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and
Adversarial Nation States
Ecosystems Knowledge C
Effective CRM U.S.ing Predictive Analytics
Emerging Computing Paradigms C
Engineering Smarter Systems C
ERP and Information Systems
Executive's Guide to Personal Security, 2nd Edition
Exposed: How Revealing Your Data and Eliminating Privacy Increases TrU.S.t and Liberates
Humanity
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
From Big Data to Smart Data
Hacking Connected Cars: Tactics, Techniques, and Procedures
Hacking Multifactor Authentication
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and
Techniques
Hyperconnectivity C
Hyperdocumentation C
IAPP CIPP / U.S. Certified Information Privacy Professional Study Guide
Information Evaluation
Information Quality Data Analytics
Inside the World of Computing C
Intelligent Data Analysis C
Intelligent Data for Threat Prediction
Intelligent Pervasive Computing C
Internet of Augmented Me, I.AM C
Internet of Things
Internet of Things
Investigating C
Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain
Evidence.
JavaScript and Open Data C
Kali Linux Penetration Testing Bible
Learning and Optimization C
Linux Security Fundamentals
Making Sense of Data 1 2e
Man-Machine Dialogue
MDM: Fundamentals, Security, and the Modern Desktop: U.S.ing Intune, Autopilot, and
Azure to Manage, Deploy, and Secure Windows 10
Microsoft Azure For Dummies
Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions
Microsoft Certified Azure Fundamentals Study Guide: Exam AZ-900
Monetising data C
Navigating the Cybersecurity Career Path
Network Security
Network Security 2E C
Networking For Dummies, 12th Edition
Networking Fundamentals
NoSQL Data Models C
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and
Upgrade Exam 1Z0-817
OCP Oracle Certified Professional Java SE 11 Programmer I Study Guide: Exam 1Z0-815
Official Google Cloud Certified Associate Cloud Engineer Study Guide
Official Google Cloud Certified Professional Cloud Architect Study Guide
Official Google Cloud Certified Professional Data Engineer Study Guide
Opinion Analysis in Interactions C
Optimization of Learning C
Penetration Testing For Dummies
Practical Java Programming for IoT, AI, and Blockchain
Privacy, Regulations, and Cybersecurity: The Essential Business Guide
Quantum Computing in Cybersecurity C
Ransomware Protection Playbook
Real Work of Data Science P
Real-time Systems Scheduling Vol 2
Reimagining BU.S.inesses with AI
Resource Optimization and Security
Responsible Data Science
Risk Centric Threat Modeling
SCADA Security C
Secure Connected Objects C
Securing Delay-Tolerant Networks C
Security and its Challenges C
Security and Privacy in Digital Era
Security Designs C
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition
Security Fundamentals
Security Issues for Society C
Security Issues Privacy IndU.S.try 4.0 C
Security, Privacy and Digital Forensics
Sensor Data Analysis and Management C
SEO Management C
Sharing Economy and Big Data Analytics C
Societal Responsibility of AI C
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Sys Eng in 4th Ind Rev C
Systems and Network Infrastructure C
The Art of Attack: Attacker Mindset for Security Professionals
The Art of War in the Network Age
The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of
Security
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
The Fitness of Information
The Official (ISC)2 CCSP CBK Reference, 3rd Edition
The Official (ISC)2 CISSP CBK Reference, 6th Edition
The Official (ISC)2 SSCP CBK Reference, 5th Edition
The Pentester BluePrint: Starting a Career as an Ethical Hacker
The Read Aloud Cloud: An Innocent's Guide to the Tech Inside
The Rise of Intelligent Machines C
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against
Cyberattacks
Threat Modeling: Designing for Security
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers
Can Teach U.S. About Driving Secure Behaviors
Transforming Your BU.S.iness with AWS: Getting the Most Out of U.S.ing AWS to Modernize
and Innovate Your Digital Services
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
Tribe
Tribe of
of Hackers
Hackers Red Team:
Security Tribal Knowledge
Leaders: from the
Tribal Knowledge Best
from theinBest
Offensive Cybersecurity
in Cybersecurity
Leadership
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
TrU.S.t in Computer Systems and the Cloud
Uncertain Digital Revolution PB
Understanding Cisco Networking Technologies, Volume 1: Exam 200-301
Understanding Infrastructure Edge C
We Have Root: Even More Advice from Schneier on Security
WHOIS
Wiley 5G REF Security C
You CAN Stop Stupid: Stopping Losses from Accidental and MalicioU.S. Actions
Zero Touch Enterprise C
Author Pages © Year Subject
Malisow 400 2020 Networking
Malisow 384 2020 Security General
Charles J. Brooks,
Christopher Grow, Philip
A. Craig Jr., Donald Short 784 2018 Networking/Security
Loiseau 240 2020 Computer Security & Cryptography
Norris 275 2022 Networking / Security
FlaU.S. 420 2019 Communication System Security
Brumfield 224 2021 Networking / Security
Skiadas 286 2019 Data Analysis
Skiadas 252 2019 Data Analysis
Makrides 262 2020 Data Analysis
Sedkaoui 224 2018 Computer Science - General Interest
Geng 720 2014 -
Geng 752 2021 Database & Data Warehousing Technologies
Monino 224 2020 Information Technologies
Laurent 244 2020 Computer Engineering
Harron 296 2015 Data Analysis
Cichosz 720 2015 -
Sharma 496 2020 Corporate Governance
Buttrey 312 2017 Statistical Software / R
Driscoll Miller 256 2020 Marketing
Cox 328 2015 Decision Sciences
Bailey 500 2023 Image and Video Processing
Aytas 336 2021 Data Analysis
Hines 208 2020 Investments & Securities
Augey 238 2019 Digital Culture & the Information Age
Leignel 176 2016 Information Technologies
George 244 2020 Information Technologies
Larose 336 2014 Data Mining & Knowledge Discovery
9781119564324 N/A
9781119612148 Washington, U.S.
9781119596578 Washington, U.S.
9781119770923 Washington, U.S.
9781119125136 Germany
9781119833420 U.S.
9781848217584 France
9781118939482 Massachusetts, U.S.
9781119648505 N/A
9781119650744 New Hampshire, U.S.
9781786303646 France
9781119696131 N/A
9781119584704 New York, U.S.
9781119564416 California, U.S.
9781119602446 California, U.S.
9781119618430 California, U.S.
9781786304193 France
9781119809135 N/A
9781119577485 U.S.
9781119560012 U.K.
9781119658740 New York, U.S.
9781119761853 California, U.S.
9781119849124 Florida, U.S.
9781119570707 New York, U.S. and California, U.S.
9781848217898 France
9781119709152 California, U.S.
9781848215993 Florida, U.S.
9781119741756 Washington D.C., U.S.
9780470500965 Georgia, U.S.
9781119606031 Saudi Arabia
9781786300591 N/A
9781119823476 Maryland, U.S.
9781786306210 France
9781786300782 France
9781119592266 Vietnam
9781119642787 England
9781119650669 New Hampshire, U.S.
N/A N/A
9781119775621 India
9781119053286 Georgia, U.S.
9781119682424 India
9781786304599 N/A
9781786305060 Algeria
9781786306944 France
9781119700739 U.S.
9781119513896 Europe
9781786305268 Tunisia
9781119805465 Florida, U.S.
9781848219120 France
9781119442196 Texas, U.S.
9781119617365 California, U.S.
9781118128336 Pennsylvania, U.S.
9781119603436 Utah, U.S.
9781119789994 Virginia, U.S.
9781119601944 Florida, U.S.
9781119684305 Texas, U.S.
9781119677628 California, U.S.
9781119394389 Massachusetts, U.S.
Brown: President of Go
9781119621980 Maryland, U.S. Consulting International
9781119810094 France
Author Affiliations Author Affiliations
Craig: Founder of
BlackByte Cyber Security Short: President of One World
LLC Telecommunications