Biometrics, surveillance and the law: societies of restricted access, discipline and controlby Sara M. Smyth, 2018
Cryptography: theory and practice (4th ed.)by Douglas R. Stinson & Maura B. Paterson, 2018
Exploring security in software architecture and designby Michael Felderer & Riccardo Scandariato, 2018
Guide to firewalls and VPNs (3rd ed.)by M.E Whitman, H.J Mattord & A. Green, 2011
Information assurance handbook: effective computer security and risk management strategiesby Corey Schou & Steven Hernandez, 2021
Information security: principles and practice (2nd ed.)by Mark Stamp, 2011
Introduction to machine: learning with applications in information securityby Mark Stamp, 2017
Network security, firewalls, and VPNs (3rd ed.)by J.M Steward & Denise
SCADA security: machine learning concepts for intrusion detection and preventionby Jean-Philippe Aumasson, 2007by Adbulmohsen Almalawi et al., 2021
Serious cryptography: a practical introduction to modern encryptionby Jean-Philippe Aumasson, 2017
Security techniques - extension to ISO/IEC 27001 and ISO/ IEC 27002 for privacy information management - requirements and guidelines, 2019
The infosec handbook: an introduction information securityby Umesh Rao & Umesh Nayak, 2014