Database and Application Security : A Practitioner's Guide
R. Sarma Danturthi
Download - Immediately Available
Format: eBook (EPUB)
The Definitive Guide to KQL : Using Kusto Query Language for operations, defending, and threat hunting
Mark Morowczynski
Download - Immediately Available
Format: eBook (PDF)
Facial Recognition Technology : Current Capabilities, Future Prospects, and Governance
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Understanding Victimology : An Active-Learning Approach
Shelly Clevenger
Download - Immediately Available
Format: eBook (PDF)
Understanding Victimology : An Active-Learning Approach
Shelly Clevenger
Download - Immediately Available
Format: eBook (EPUB)
Forensic Perspectives on Cybercrime : Human Behaviour and Cybersecurity
John McAlaney
Download - Immediately Available
Format: eBook (PDF)
Forensic Perspectives on Cybercrime : Human Behaviour and Cybersecurity
John McAlaney
Download - Immediately Available
Format: eBook (EPUB)
Cybercrime and Digital Deviance
Roderick S. Graham
Download - Immediately Available
Format: eBook (PDF)
Cybercrime and Digital Deviance
Roderick S. Graham
Download - Immediately Available
Format: eBook (EPUB)
Advances in Networks, Intelligence and Computing : Proceedings of the International Conference On Networks, Intelligence and Computing (ICONIC 2023)
Ashok Kumar
Download - Immediately Available
Format: eBook (PDF)
Advances in Networks, Intelligence and Computing : Proceedings of the International Conference On Networks, Intelligence and Computing (ICONIC 2023)
Ashok Kumar
Download - Immediately Available
Format: eBook (EPUB)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download - Immediately Available
Format: eBook (PDF)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download - Immediately Available
Format: eBook (EPUB)
Information Technology Security and Risk Management : Inductive Cases for Information Security
Stephen C. Wingreen
Download - Immediately Available
Format: eBook (PDF)
Information Technology Security and Risk Management : Inductive Cases for Information Security
Stephen C. Wingreen
Download - Immediately Available
Format: eBook (EPUB)
Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier
IRB Media
Download - Immediately Available
Format: eBook (EPUB)