Title: How to Measure Anything in Cybersecurity Risk, Author: Douglas W. Hubbard
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Cyber Frauds, Scams and their Victims, Author: Mark Button
Title: Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions, Author: Clint Bodungen
Title: Cybercrime and Cybersecurity, Author: Paul A. Watters
Title: Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions, Author: Tony Bradley
Title: The Hacking of America: Who's Doing It, Why, and How, Author: Bernadette H. Schell
Title: Cybersecurity: Geopolitics, Law, and Policy, Author: Amos N. Guiora
Title: Analyzing and Securing Social Networks, Author: Bhavani Thuraisingham
Title: Cybercrime and Cybersecurity, Author: Paul A. Watters
Title: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions, Author: David Cowen
Title: Digital Forensics with Open Source Tools, Author: Cory Altheide
Title: Hacker's Guide to Project Management, Author: Andrew Johnston
Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0), Author: Dan Shoemaker
Title: Traceback and Anonymity, Author: Xinyuan Wang
Title: Policing Cyber Hate, Cyber Threats and Cyber Terrorism, Author: Brian Blakemore
Title: Data Thieves in Action: Examining the International Market for Stolen Personal Information, Author: Thomas J. Holt
Title: Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas, Author: James J.F. Forest
Title: Cyber Criminals on Trial, Author: Russell G. Smith

Pagination Links