Title: How to Measure Anything in Cybersecurity Risk, Author: Douglas W. Hubbard
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Cyber Frauds, Scams and their Victims, Author: Mark Button
Title: Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions, Author: Clint Bodungen
Title: Cybercrime and Cybersecurity, Author: Paul A. Watters
Title: The Hacking of America: Who's Doing It, Why, and How, Author: Bernadette H. Schell
Title: Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions, Author: Tony Bradley
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Cybercrime and Cybersecurity, Author: Paul A. Watters
Title: Hybrid Threats, Cyberterrorism and Cyberwarfare, Author: Mohamed Amine Ferrag
Title: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions, Author: David Cowen
Title: Economic Espionage and Industrial Spying, Author: Hedieh Nasheri
Title: Digital Forensics with Open Source Tools, Author: Cory Altheide
Title: Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Author: National Research Council
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Economic Espionage and Industrial Spying, Author: Hedieh Nasheri
Title: Social Media Warfare: Equal Weapons for All, Author: Michael Erbschloe
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Hacker's Guide to Project Management, Author: Andrew Johnston

Pagination Links