Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Federated Identity Primer, Author: Derrick Rountree
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Seven Deadliest Wireless Technologies Attacks, Author: Brad Haines
Title: Perfect Password: Selection, Protection, Authentication, Author: Mark Burnett
Title: Detecting and Combating Malicious Email, Author: Julie JCH Ryan
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: PCI DSS 3.1: The Standard That Killed SSL, Author: Branden R. Williams
Title: The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online, Author: Denny Cherry
Title: Brute Force: Cracking the Data Encryption Standard / Edition 1, Author: Matt Curtin
Title: Computer Forensics JumpStart / Edition 2, Author: Michael G. Solomon
Title: Cyberdeterrence and Cyberwar, Author: Martin C. Libicki
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Zen and the Art of Information Security, Author: Ira Winkler

Pagination Links