Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Future Crimes: Inside the Digital Underground and the Battle for Our Connected World, Author: Marc Goodman
Title: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, Author: Elissa Lerner
Title: Steganography in Digital Media: Principles, Algorithms, and Applications, Author: Jessica Fridrich
Title: Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management, Author: Thomas R. Peltier
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Vulnerability Management, Author: Park Foreman
Title: Data Selves: More-than-Human Perspectives, Author: Deborah Lupton
Title: The Economic Costs and Implications of High-Technology Hardware Theft, Author: James N. Dertouzos
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
by Gordon Corera
Narrated by  Gildart Jackson
Audiobook (Unabridged)

$22.95

. Price is $22.95 . You save %.
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology, Author: John McCumber
Title: Data Reimagined: Building Trust One Byte at a Time, Author: Jodi Daniels
Title: Techniques and Applications of Digital Watermarking and Content Protection, Author: Michael Arnold
Title: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings, Author: Josep Domingo-Ferrer
Title: Error Control, Cryptology, and Speech Compression: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers, Author: Andrew Chmora
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, Author: Kim Sehun
Title: SAP HANA 2.0 Security Guide, Author: Jonathan Haun
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings, Author: Ross Anderson

Pagination Links