Title: Seven Deadliest Wireless Technologies Attacks, Author: Brad Haines
Title: Lightweight Cryptography for Security and Privacy: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, Author: Thomas Eisenbarth
Title: Infosec Management Fundamentals, Author: Henry Dalziel
Title: Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives, Author: Eric Cole
Title: Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five / Edition 1, Author: Bruce F. Baker
Title: Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures / Edition 1, Author: Alessandro Aldini
Title: Cyberdeterrence and Cyberwar, Author: Martin C. Libicki
Title: Cryptography InfoSec Pro Guide / Edition 1, Author: Sean-Philip Oriyano
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Cyber Guerilla, Author: Jelle Van Haaster
Title: Codes: An Introduction to Information Communication and Cryptography / Edition 1, Author: Norman L. Biggs
Title: Securing SQL Server: Protecting Your Database from Attackers / Edition 3, Author: Denny Cherry
Title: Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense, Author: Nihad Ahmad Hassan
Title: Computer Forensics JumpStart / Edition 2, Author: Michael G. Solomon
Title: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking, Author: Jennifer Kurtz
Title: Trends in Legal Advocacy: Interviews with Prosecutors and Criminal Defense Lawyers Across the Globe, Volume One / Edition 1, Author: Jane Goodman-Delahunty
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring
Title: Elements of Computer Security / Edition 1, Author: David Salomon
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Cyber Security Awareness for CEOs and Management, Author: David Willson

Pagination Links