Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0), Author: Dan Shoemaker
Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0), Author: Dan Shoemaker
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Android Forensics: Investigation, Analysis and Mobile Security for Google Android, Author: Andrew Hoog
Title: Anti-Hacker Tool Kit, Third Edition, Author: Mike Shema
Title: Avoiding Cyber Fraud in Small Businesses: What Auditors and Owners Need to Know, Author: G. Jack Bologna
Title: Bombs and Bandwidth: The Emerging Relationship between IT and Security, Author: Robert Latham
Title: Business Law Monographs (38 Volume Set), Author: Stephen F. Black
Title: Business Theft and Fraud: Detection and Prevention, Author: James R. Youngblood
Title: Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity, Author: Dale Liu
Title: Computer Crime, Author: Indira Carr
Explore Series
Title: Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers, Author: Michael Sheetz
Title: Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers, Author: Michael Sheetz
Title: Computer Forensics: Evidence Collection and Management, Author: Robert C. Newman
Title: Computer Forensics: Evidence Collection and Management, Author: Robert C. Newman
Title: Computer Fraud Casebook: The Bytes that Bite, Author: Joseph T. Wells
Title: Computer Fraud Casebook: The Bytes that Bite, Author: Joseph T. Wells
Title: Concepts, Models, and Tools for Information Fusion, Author: Eloi Bosse
Title: Conquest in Cyberspace: National Security and Information Warfare, Author: Martin C. Libicki

Pagination Links