Facial Recognition Technology : Current Capabilities, Future Prospects, and Governance
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Hacking the Hacker : Learn From the Experts Who Take Down Hackers
Roger A. Grimes
Download - Immediately Available
Format: eBook (EPUB)
Cybercrime : Key Issues and Debates
Alisdair A. Gillespie
Download - Immediately Available
Format: eBook (PDF)
Foundational Cybersecurity Research : Improving Science, Engineering, and Institutions
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
The Age of AI : "THE BOOK WE ALL NEED"
Henry A Kissinger
Download - Immediately Available
Format: eBook (EPUB)
At the Nexus of Cybersecurity and Public Policy : Some Basic Concepts and Issues
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Cyber Strategy : Risk-Driven Security and Resiliency
Carol A. Siegel
Download - Immediately Available
Format: eBook (PDF)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Information Technology Control and Audit, Fifth Edition
Angel R. (Florida Institute of Technology, Melbourne, USA) Otero
Download - Immediately Available
Format: eBook (PDF)
Cyber-Physical Systems : Integrated Computing and Engineering Design
Fei (University of Alabama, Tuscaloosa, USA) Hu
Download - Immediately Available
Format: eBook (PDF)
Information Technology Control and Audit, Fifth Edition
Angel R. (Florida Institute of Technology, Melbourne, USA) Otero
Download - Immediately Available
Format: eBook (EPUB)
Handbook of Applied Cryptography
Alfred J. Menezes
Download - Immediately Available
Format: eBook (PDF)
Cryptography : Theory and Practice
Douglas Robert (University of Waterloo, Ontario, Canada) Stinson
Download - Immediately Available
Format: eBook (PDF)
Online Social Networks Security : Principles, Algorithm, Applications, and Perspectives
Brij B. (National Institute of Technology Kurukshetra, India) Gupta
Download - Immediately Available
Format: eBook (PDF)
IDs -- Not That Easy : Questions About Nationwide Identity Systems
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Stealing the Network: How to Own an Identity
Ryan Russell
Download - Immediately Available
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
Leading the Internal Audit Function
Lynn (Consulting, Business Advisory and Training, Overland P Fountain
Download - Immediately Available
Format: eBook (PDF)
Behavioral Cybersecurity : Fundamental Principles and Applications of Personality Psychology
Wayne (Wayne Patterson, Patterson and Associates) Patterson
Download - Immediately Available
Format: eBook (PDF)