Understanding Victimology : An Active-Learning Approach
Shelly Clevenger
Download - Immediately Available
Format: eBook (PDF)
Understanding Victimology : An Active-Learning Approach
Shelly Clevenger
Download - Immediately Available
Format: eBook (EPUB)
Forensic Perspectives on Cybercrime : Human Behaviour and Cybersecurity
John McAlaney
Download - Immediately Available
Format: eBook (PDF)
Forensic Perspectives on Cybercrime : Human Behaviour and Cybersecurity
John McAlaney
Download - Immediately Available
Format: eBook (EPUB)
Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response planning
Richard Bingley
Download - Immediately Available
Format: eBook (PDF)
Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response planning
Richard Bingley
Download - Immediately Available
Format: eBook (EPUB)
Database and Application Security : A Practitioner's Guide
R. Sarma Danturthi
Download - Immediately Available
Format: eBook (EPUB)
The Definitive Guide to KQL : Using Kusto Query Language for operations, defending, and threat hunting
Mark Morowczynski
Download - Immediately Available
Format: eBook (PDF)
Facial Recognition Technology : Current Capabilities, Future Prospects, and Governance
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Cybercrime and Digital Deviance
Roderick S. Graham
Download - Immediately Available
Format: eBook (PDF)
Cybercrime and Digital Deviance
Roderick S. Graham
Download - Immediately Available
Format: eBook (EPUB)
Advances in Networks, Intelligence and Computing : Proceedings of the International Conference On Networks, Intelligence and Computing (ICONIC 2023)
Ashok Kumar
Download - Immediately Available
Format: eBook (PDF)
Advances in Networks, Intelligence and Computing : Proceedings of the International Conference On Networks, Intelligence and Computing (ICONIC 2023)
Ashok Kumar
Download - Immediately Available
Format: eBook (EPUB)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download - Immediately Available
Format: eBook (PDF)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download - Immediately Available
Format: eBook (EPUB)
Information Technology Security and Risk Management : Inductive Cases for Information Security
Stephen C. Wingreen
Download - Immediately Available
Format: eBook (PDF)
Information Technology Security and Risk Management : Inductive Cases for Information Security
Stephen C. Wingreen
Download - Immediately Available
Format: eBook (EPUB)
Information Security Management Principles
David Alexander
Download - Immediately Available
Format: eBook (PDF)