Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: What Is Six SIGMA? / Edition 1, Author: Peter S. Pande
Title: Things a Computer Scientist Rarely Talks About, Author: Donald E. Knuth
Title: Delete: The Virtue of Forgetting in the Digital Age, Author: Viktor Mayer-Schönberger
Title: Sketching User Experiences: The Workbook, Author: Saul Greenberg
Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: User Interface Inspection Methods: A User-Centered Design Method, Author: Chauncey Wilson
Title: Postcolonial Politics, The Internet and Everyday Life: Pacific Traversals Online / Edition 1, Author: M.I. Franklin
Title: The Language of ICT: Information and Communication Technology / Edition 1, Author: Tim Shortis
Title: Appreciative Sharing of Knowledge: Leveraging Knowledge Management for Strategic Change, Author: Tojo Joseph Thatchenkery
Title: Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems, Author: Eoghan Casey BS
Title: The Illustrated Guide to Assistive Technology & Devices: Tools And Gadgets For Living Independently / Edition 1, Author: Suzanne Robitaille
Title: The Evolution of Wired Life: From the Alphabet to the Soul-Catcher Chip -- How Information Technologies Change Our World / Edition 1, Author: Charles Jonscher
Title: Credible Checklists and Quality Questionnaires: A User-Centered Design Method, Author: Chauncey Wilson
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Human Resource Management in the Knowledge Economy: New Challenges, New Roles, New Capabilities, Author: Mark L. Lengnick-Hall
Title: Federated Identity Primer, Author: Derrick Rountree

Pagination Links