Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: Vulnerability Management, Author: Park Foreman
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: The Economic Costs and Implications of High-Technology Hardware Theft, Author: James N. Dertouzos
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson
Title: Building Trustworthy Semantic Webs, Author: Bhavani Thuraisingham
Title: The Death of the Internet, Author: Markus Jakobsson
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
by Gordon Corera
Narrated by  Gildart Jackson
Audiobook (Unabridged)

$22.95

. Price is $22.95 . You save %.
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Research Advances in Database and Information Systems Security: IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA, Author: Vijay Atluri
Title: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings, Author: Huaxiong Wang
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Computer Security: 20 Things Every Employee Should Know, Author: Ben Rothke
Title: Database and Applications Security: Integrating Information Security and Data Management, Author: Bhavani Thuraisingham
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod
Title: Preventing Good People From Doing Bad Things: Implementing Least Privilege, Author: Brian Anderson

Pagination Links