Title: Managing Cybersecurity Risk: Cases Studies and Solutions, Author: Jonathan Reuvid
Title: Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings, Author: Marc Dacier
Title: How to Achieve 27001 Certification: An Example of Applied Compliance Management, Author: Sigurjon Thor Arnason
Title: Cell Phone Location Evidence for Legal Professionals: Understanding Cell Phone Location Evidence from the Warrant to the Courtroom, Author: Larry Daniel
Title: How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!, Author: John J. Trinckes
Title: The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity, Author: Tine Munk
Explore Series
Title: Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers, Author: Ian Goldberg
Title: Secure and Trustworthy Transportation Cyber-Physical Systems, Author: Yunchuan Sun
Title: Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks, Author: Kenneth Brancik
Title: Policing Transnational Organized Crime and Corruption: Exploring the Role of Communication Interception Technology, Author: M. Congram
Title: Security in Vehicular Networks: Focus on Location and Identity Privacy, Author: Leila Benarous
Title: Smart Card Research and Advanced Applications: 19th International Conference, CARDIS 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers, Author: Pierre-Yvan Liardet
Title: Cyber Security: Deterrence and IT Protection for Critical Infrastructures, Author: Maurizio Martellini
Title: Group Theoretic Cryptography, Author: Maria Isabel Gonzalez Vasco
Title: Cybercrimes: A Multidisciplinary Analysis, Author: Sumit Ghosh
Title: Wireless Network Security: Second Edition, Author: Wolfgang Osterhage
Title: Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II, Author: Mauro Conti
Title: Penetration Tester's Open Source Toolkit, Author: Jeremy Faircloth
Title: AAA Identity Management Security, Author: Vivek Santuka
Title: Vehicular Ad Hoc Network Security and Privacy, Author: Xiaodong Lin

Pagination Links