Title: Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers, Author: Eric O'Neill
Title: Hacked, Now What? Protect Your Business From Cybercriminals, Author: Nathalie Claes
Title: The Cybernetic Society: How Humans and Machines Will Shape the Future Together, Author: Amir Husain
Title: Microsoft Security Copilot: Master strategies for AI-driven cyber defense, Author: Bi Yue Xu
Title: Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II, Author: Sanjay Goel
Title: Cyber Security, Forensics and National Security, Author: Vinay Aseri
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos
Title: Seguridad en equipos informáticos. MF0486., Author: Beatriz Coronado García
Title: Hacking For Dummies, Author: Kevin Beaver
Title: Foundations of Computer Science and Frontiers in Education: Computer Science and Computer Engineering: 20th International Conference, FCS 2024, and 20th International Conference, FECS 2024, Held as Part of the World Congress in Computer Science, Computer, Author: Hamid R. Arabnia
Title: Computational Intelligence, Cyber Security and Computational Models. Emerging Trends in Computational Models, Intelligence and Security Systems: 6th International Conference, ICC3 2023, Coimbatore, India, December 14-16, 2023, Revised Selected Papers, Author: Shina Sheen
Title: Gestión de incidentes de seguridad informática. MF0488., Author: Beatriz Coronado García
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I, Author: Marc Fischlin
Title: Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität, Author: Thomas H. Lenhard
Title: Gestión de incidentes de seguridad informática. IFCT0109, Author: Ester Chicano Tejada
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: 2600: The Hacker Digest - Volume 41, Author: 2600 Magazine
Title: The Confluence of Cryptography, Blockchain and Artificial Intelligence, Author: Ankita Sharma
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Mastering Deepfake Technology: Strategies for Ethical Management and Security, Author: Sanjay Taneja

Pagination Links