Title: Hack Proofing Your Network, Author: Syngress
Title: Stealing the Network: How to Own an Identity, Author: Ryan Russell
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson
Title: Understanding Online Piracy: The Truth about Illegal File Sharing, Author: Nathan W. Fisk
Title: Cyber Kids, Cyber Bullying, Cyber Balance, Author: Barbara C. Trolley
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, Author: Brian Baskin
Title: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Author: Johnny Long
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Cyber Forensics: From Data to Digital Evidence, Author: Albert J. Marcella Jr.
Title: Mastering Windows Network Forensics and Investigation, Author: Steve Anson
Title: Hacking Web Apps: Detecting and Preventing Web Application Security Problems, Author: Mike Shema
Title: Cybercrime and the Law: Challenges, Issues, and Outcomes, Author: Susan W. Brenner
Title: Child Identity Theft: What Every Parent Needs to Know, Author: Robert P. Chappell Jr.
Title: Network Centric Warfare: Coalition Operations in the Age of US Military Primacy, Author: Paul T. Mitchell
Title: Peace, War and Computers, Author: Chris Hables Gray
Title: Hate Crimes in Cyberspace, Author: Danielle Keats Citron
Title: How to Define and Build an Effective Cyber Threat Intelligence Capability, Author: Henry Dalziel
Title: Cyber War versus Cyber Realities: Cyber Conflict in the International System, Author: Brandon Valeriano
Title: Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan, Author: Jeff Bollinger

Pagination Links