Title: Cyber-Physical Attacks: A Growing Invisible Threat, Author: George Loukas PhD
Title: Digital Forensics Trial Graphics: Teaching the Jury through Effective Use of Visuals, Author: John Sammons
Title: Invitation to Cryptology / Edition 1, Author: Thomas Barr
Title: Software Security: Building Security In / Edition 1, Author: Gary McGraw
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: The Mobile Application Hacker's Handbook / Edition 1, Author: Dominic Chell
Title: CISA Certified Information Systems Auditor Study Guide / Edition 4, Author: David L. Cannon
Title: Gangs and Organized Crime / Edition 1, Author: Gregg W. Etter
Title: Managing an Information Security and Privacy Awareness and Training Program / Edition 2, Author: Rebecca Herold
Title: Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition / Edition 2, Author: Dennis G. Fitzgerald
Title: The Complete Guide to Cybersecurity Risks and Controls / Edition 1, Author: Anne Kohnke
Title: Practical Security Properties on Commodity Computing Platforms: The uber eXtensible Micro-Hypervisor Framework, Author: Amit Vasudevan
Title: Abstract Algebra: Applications to Galois Theory, Algebraic Geometry, Representation Theory and Cryptography / Edition 2, Author: Celine Carstensen-Opitz
Title: The Browser Hacker's Handbook / Edition 1, Author: Wade Alcorn
Title: Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, Author: Eric D. Knapp
Title: Elliptic Curves: Number Theory and Cryptography, Second Edition / Edition 2, Author: Lawrence C. Washington
Title: Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity, Author: Chet Hosmer
Title: Network Attacks and Exploitation: A Framework / Edition 1, Author: Matthew Monte
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet / Edition 1, Author: R. F. Churchhouse
Title: Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat, Author: Paul Piccard

Pagination Links