Title: Hate Crimes in Cyberspace, Author: Danielle Keats Citron
Title: How to Define and Build an Effective Cyber Threat Intelligence Capability, Author: Henry Dalziel
Title: Mastering Windows Network Forensics and Investigation, Author: Steve Anson
Title: Network Attacks and Exploitation: A Framework, Author: Matthew Monte
Title: Protecting Critical Infrastructures Against Cyber-Attack, Author: Stephen Lukasik
Explore Series
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Hacking Web Apps: Detecting and Preventing Web Application Security Problems, Author: Mike Shema
Title: Cybercrime and the Law: Challenges, Issues, and Outcomes, Author: Susan W. Brenner
Title: Peace, War and Computers, Author: Chris Hables Gray
Title: China's Cyber Power, Author: Nigel Inkster
Explore Series
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Cyber Security Awareness for Accountants and CPAs, Author: Henry Dalziel
Title: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts, Author: Nitesh Dhanjani
Title: Cybersecurity for Small Businesses: Comprehensive Guide to Protecting a Small Business from Various Types of Cyber Threats, Author: Business Success Shop
Title: Stealing the Network: How to Own an Identity, Author: Ryan Russell
Title: China's Cyber Warfare: The Evolution of Strategic Doctrine, Author: Jason R. Fritz
Title: Network Centric Warfare: Coalition Operations in the Age of US Military Primacy, Author: Paul T. Mitchell
Title: Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century, Author: Joshua B. Hill
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Cybersecurity, Author: Melissa Higgins
Explore Series

Pagination Links