Title: Federal Cloud Computing: The Definitive Guide for Cloud Service Providers / Edition 2, Author: Matthew Metheny
Title: Computer Forensics JumpStart / Edition 2, Author: Michael G. Solomon
Title: CPTED and Traditional Security Countermeasures: 150 Things You Should Know / Edition 1, Author: Lawrence Fennelly
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans / Edition 1, Author: Yusufali F. Musaji
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: Practical Cryptography / Edition 1, Author: Niels Ferguson
Title: Hacking Exposed 7 Network Security Secrets & Solutions: Network Security Secrets and Solutions, Seventh Edition / Edition 7, Author: Joel Scambray
Title: Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 / Edition 4, Author: Harlan Carvey
Title: Information Hiding: First International Workshop, Cambridge, U.K., May 30 - June 1, 1996. Proceedings / Edition 1, Author: Ross Anderson
Title: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, Author: Ehab Al-Shaer
Title: Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers / Edition 1, Author: Bart Preneel
Title: Security and Trust Management: 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Author: Giovanni Livraga
Title: Cisco Security Professional's Guide to Secure Intrusion Detection Systems, Author: Syngress
Title: Netspionage: The Global Threat to Information / Edition 1, Author: William C. Boni CISA
Title: Privacy-Enhancing Fog Computing and Its Applications, Author: Xiaodong Lin
Title: A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET, Author: Iraj Sadegh Amiri
Title: Stealing the Network: How to Own a Shadow, Author: Johnny Long
Title: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting / Edition 1, Author: Peter H. Cole

Pagination Links