Title: From Police to Security Professional: A Guide to a Successful Career Transition, Author: Michael S. D'Angelo
Title: Practical Core Software Security: A Reference Framework, Author: James F. Ransome
Title: Dynamic Police Training, Author: Ann R. Bumbak
Title: Defensive Tactics for Today's Law Enforcement, Author: Stephen K. Hayes
Title: What They Didn't Teach at the Academy: Topics, Stories, and Reality beyond the Classroom, Author: Dale L. June
Title: International e-Conference on Computer Science (IeCCS 2005), Author: Theodore Simos
Title: Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition, Author: Frederick S. Calhoun
Title: Psychosocial Dynamics of Cyber Security, Author: Stephen J Zaccaro
Title: Public-Key Cryptography - PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I, Author: Alexandra Boldyreva
Title: Cyber-security of SCADA and Other Industrial Control Systems, Author: Edward J. M. Colbert
Title: Cyber-security of SCADA and Other Industrial Control Systems, Author: Edward J. M. Colbert
Title: Advances in Cryptology - EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I, Author: Marc Joye
Title: Secure Smart Embedded Devices, Platforms and Applications, Author: Konstantinos Markantonakis
Title: Handbook of Trustworthy Federated Learning, Author: My T. Thai
Title: Elliptic Curves and Their Applications to Cryptography: An Introduction, Author: Andreas Enge
Title: Secure Smart Embedded Devices, Platforms and Applications, Author: Konstantinos Markantonakis
Title: Cloud Security: Concepts, Applications and Perspectives, Author: Brij B. Gupta
Title: Information Warfare in Business: Strategies of Control and Resistance in the Network Society, Author: Iain Munro
Title: Protecting Critical Infrastructures Against Cyber-Attack, Author: Stephen Lukasik
Title: Honeypots: A New Paradigm to Information Security, Author: R. C. Joshi

Pagination Links