Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Security in a Web 2.0+ World: A Standards-Based Approach, Author: Carlos Curtis Solari
Title: The Mobile Application Hacker's Handbook, Author: Dominic Chell
Title: Cybersecurity in Morocco, Author: Yassine Maleh
Title: Cybercrime in Asia: Policing, Technological Environment, and Cyber-Governance in China and Vietnam, Author: Laurie Yiu-Chung Lau
Title: Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within, Author: Julie Mehan
Title: Still Searching for Satoshi: Unveiling the Blockchain Revolution, Author: Anders Lisdorf
Title: Safety and Security of Cyber-Physical Systems: Engineering dependable Software using Principle-based Development, Author: Frank J. Furrer
Title: The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team, Author: Michael Butler
Title: Training Law Enforcement Officers, Author: Rick D. Giovengo
Title: Pers�nlichkeitsschutz in Social Networks: Technische Unterst�tzung eines grundrechtskonformen Angebots von Social Networks, Author: Maxi Nebel
Title: Cyber-Security Threats and Response Models in Nuclear Power Plants, Author: Carol Smidts
Title: Cybersecurity Essentials: Practical Tools for Today's Digital Defenders, Author: Kodi A. Cochran
Title: Identity Management: A Primer, Author: Ilan Sharoni
Title: Cryptocoding Based on Quasigroups, Author: Daniela Mechkaroska
Title: Mobile Security: Schwachstellen verstehen und Angriffsszenarien nachvollziehen, Author: Dirk Westhoff
Title: Understanding Network Hacks: Attack and Defense with Python, Author: Bastian Ballmann
Title: Machine Learning Techniques for Cybersecurity, Author: Elisa Bertino
Title: Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures, Author: Seshagirirao Lekkala
Title: Practical Hadoop Security, Author: Bhushan Lakhe

Pagination Links