Forensic Perspectives on Cybercrime : Human Behaviour and Cybersecurity
John McAlaney
Download - Immediately Available
Format: eBook (PDF)
Forensic Perspectives on Cybercrime : Human Behaviour and Cybersecurity
John McAlaney
Download - Immediately Available
Format: eBook (EPUB)
How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code
David (New York, New York, USA) Kahn
Download - Immediately Available
Format: eBook (PDF)
Critical Infrastructure System Security and Resiliency
Betty (Sandia National Laboratories, Albuquerque, New Mexico Biringer
Download - Immediately Available
Format: eBook (PDF)
Against Cybercrime : Toward a Realist Criminology of Computer Crime
Kevin F. Steinmetz
Download - Immediately Available
Format: eBook (PDF)
Against Cybercrime : Toward a Realist Criminology of Computer Crime
Kevin F. Steinmetz
Download - Immediately Available
Format: eBook (EPUB)
Cybersecurity in the European Union : Resilience and Adaptability in Governance Policy
George Christou
Download - Immediately Available
Format: eBook (PDF)
Privacy and Identity in a Networked Society : Refining Privacy Impact Assessment
Stefan Strau
Download - Immediately Available
Format: eBook (EPUB)
Privacy and Identity in a Networked Society : Refining Privacy Impact Assessment
Stefan Strau
Download - Immediately Available
Format: eBook (PDF)
UNIX Administration : A Comprehensive Sourcebook for Effective Systems & Network Management
Bozidar (Linkshare Corporation, New York, New York, USA) Levi
Download - Immediately Available
Format: eBook (PDF)
Networked Life : 20 Questions and Answers
Mung (Princeton University, New Jersey) Chiang
Download - Immediately Available
Format: eBook (PDF)
Information Security Management Systems : A Novel Framework and Software as a Tool for Compliance with Information Security Standard
Heru (Point Pleasant, New Jersey, USA) Susanto
Download - Immediately Available
Format: eBook (EPUB)
Information Security Management Systems : A Novel Framework and Software as a Tool for Compliance with Information Security Standard
Heru (Point Pleasant, New Jersey, USA) Susanto
Download - Immediately Available
Format: eBook (PDF)
The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks
Susan Young
Download - Immediately Available
Format: eBook (PDF)
The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks
Susan Young
Download - Immediately Available
Format: eBook (EPUB)
A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols
Kutub (New Jersey City University, New Jersey, USA) Thakur
Download - Immediately Available
Format: eBook (PDF)
A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols
Kutub (New Jersey City University, New Jersey, USA) Thakur
Download - Immediately Available
Format: eBook (EPUB)
Protocols for Secure Electronic Commerce
Mostafa Hashem (AT&T, Middletown, New Jersey, USA) Sherif
Download - Immediately Available
Format: eBook (EPUB)
Security in an IPv6 Environment
Daniel (SES Engineering, Princeton, New Jersey, USA) Minoli
Download - Immediately Available
Format: eBook (PDF)