Title: Understanding Commanders' Information Needs for Influence Operations / Edition 1, Author: Eric V. Larson
Title: Information Operations: Warfare and the Hard Reality of Soft Power, Author: E. Leigh Armistead
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Peace, War and Computers / Edition 1, Author: Chris Hables Gray
Title: Cybercrime: The Transformation of Crime in the Information Age / Edition 1, Author: David S. Wall
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails / Edition 1, Author: Christopher Hadnagy
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: Who Are You?: Identification, Deception, and Surveillance in Early Modern Europe, Author: Valentin Groebner
Title: Cybercrime: Digital Cops in a Networked Environment, Author: Jack M. Balkin
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Dissecting the Hack: The V3rb0t3n Network, Author: Jayson E Street
Title: Cyber Security Awareness for Accountants and CPAs, Author: David Willson
Title: Cyber Security, Author: Edward Amoroso
Title: Cyber Kids, Cyber Bullying, Cyber Balance / Edition 1, Author: Barbara C. Trolley
Title: The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations, Author: Ben Buchanan
Title: Piracy: The Intellectual Property Wars from Gutenberg to Gates / Edition 2, Author: Adrian Johns
Title: Conquest in Cyberspace: National Security and Information Warfare / Edition 1, Author: Martin C. Libicki
Title: Software Piracy Exposed / Edition 1, Author: Ron Honick
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick

Pagination Links