Title: Stealing The Network: How to Own the Box, Author: Syngress
Title: Phishing Exposed, Author: Lance James
Title: Handbook of Digital Forensics and Investigation, Author: MA Casey BS
Title: Security Operations Center: Building, Operating, and Maintaining your SOC, Author: Joseph Muniz
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Anti-Hacker Tool Kit, Third Edition, Author: Mike Shema
Title: Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Author: Lee Reiber
Title: People-Centric Security: Transforming Your Enterprise Security Culture, Author: Lance Hayden
Title: Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response, Author: Joe Fichera
Title: Fake Meds Online: The Internet and the Transnational Market in Illicit Pharmaceuticals, Author: Alexandra  Hall
Title: Sharing our Lives Online: Risks and Exposure in Social Media, Author: David R. Brake
Title: Cybercrime Risks and Responses: Eastern and Western Perspectives, Author: Russell G. Smith
Title: Crime Online, Author: Yvonne Jewkes
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Information Operations - Doctrine and Practice: A Reference Handbook, Author: Christopher Paul
Title: Islamophobia in Cyberspace: Hate Crimes Go Viral, Author: Imran Awan
Title: Dot.cons, Author: Yvonne Jewkes
Title: National Cyber Emergencies: The Return to Civil Defence, Author: Greg Austin
Title: Cyber Dragon: Inside China's Information Warfare and Cyber Operations, Author: Dean Cheng
Title: Hacking Exposed Web Applications, Third Edition, Author: Joel Scambray

Pagination Links