Title: How to Measure Anything in Cybersecurity Risk, Author: Douglas W. Hubbard
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions, Author: Clint Bodungen
Title: The Hacking of America: Who's Doing It, Why, and How, Author: Bernadette H. Schell
Title: Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Author: Derek S. Reveron
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Cyber Dragon: Inside China's Information Warfare and Cyber Operations, Author: Dean Cheng
Title: People-Centric Security: Transforming Your Enterprise Security Culture, Author: Lance Hayden
Title: Information Warfare, Author: William Hutchinson
Title: Digital Forensics, Author: André Årnes
Title: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions, Author: David Cowen
Title: Economic Espionage and Industrial Spying, Author: Hedieh Nasheri
Title: Cybercrime: Law enforcement, security and surveillance in the information age, Author: Brian D. Loader
Title: Investigating Computer-Related Crime, Author: Peter Stephenson
Title: Trusted Recovery and Defensive Information Warfare, Author: Peng Liu
Title: Virtually Criminal: Crime, Deviance and Regulation Online, Author: Matthew Williams
Title: Cyber Fraud: Tactics, Techniques and Procedures, Author: Rick Howard
Title: National Cyber Emergencies: The Return to Civil Defence, Author: Greg Austin
Title: The Nature of War in the Information Age: Clausewitzian Future, Author: David J. Lonsdale
Title: Cybercrimes: A Multidisciplinary Analysis, Author: Sumit Ghosh

Pagination Links