Title: Zero to Hero: Your Guide to a Career in Cybersecurity, Author: Felix Kyei Asare
Title: Wirtschaftsspionage: Ph�nomenologie - Erkl�rungsans�tze - Handlungsoptionen, Author: Dirk Fleischer
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Waging Cyber War: Technical Challenges and Operational Constraints, Author: Jacob G. Oakley
Title: Vulnerability Assessment and Penetration Testing (VAPT): Detailed guide with highlighted threats, risk exposure, and remediations (English Edition), Author: Rishabh Bhardwaj
Title: Video Encryption Technology and Application, Author: Zhengquan Xu
Title: Unmasking the Social Engineer: The Human Element of Security, Author: Christopher Hadnagy
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: Trustworthy Global Computing: 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers, Author: Matteo Maffei
Title: Trustworthy Global Computing: 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers, Author: Catuscia Palamidessi
Title: Trust, Privacy and Security in Digital Business: 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012, Proceedings, Author: Simone Fischer-Hübner
Title: Trust, Privacy and Security in Digital Business: 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings, Author: Sokratis Katsikas
Title: Trust in Social Media, Author: Jiliang Tang
Title: Trust in Social Media, Author: Jiliang Tang
Title: Trust and Trustworthy Computing: 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings, Author: Michael Huth
Title: Trends in Data Protection and Encryption Technologies, Author: Valentin Mulder
Title: Transactions on Data Hiding and Multimedia Security X, Author: Yun Q. Shi
Title: Training Law Enforcement Officers, Author: Rick D. Giovengo
Title: Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop, Author: National Research Council
Title: Tokenomics, Author: Sean Au

Pagination Links