Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory / Edition 1, Author: Michael Hale Ligh
Title: TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook, Author: Jack Wiles
Title: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Author: National Research Council
Title: Technocrime: Policing and Surveillance / Edition 1, Author: Stéphane Leman-Langlois
Title: Technocrime: Policing and Surveillance, Author: Stéphane Leman-Langlois
Title: Surveillance and Identity: Discourse, Subjectivity and the State, Author: David Barnard-Wills
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper
Title: Strategic A2/AD in Cyberspace, Author: Alison Lawlor Russell
Title: Stealing The Network: How to Own the Box, Author: Syngress
Title: Socioeconomic and Legal Implications of Electronic Intrusion, Author: Dionysios Politis
Title: Social Media Warfare: Equal Weapons for All / Edition 1, Author: Michael Erbschloe
Title: Social Media and Electronic Commerce Law / Edition 2, Author: Alan Davidson
Title: Social and Human Elements of Information Security: Emerging Trends and Countermeasures, Author: Manish Gupta
Title: Sharing our Lives Online: Risks and Exposure in Social Media, Author: David R. Brake
Title: Security Solutions for Hyperconnectivity and the Internet of Things, Author: Maurice Dawson
Title: Security Operations Center: Building, Operating, and Maintaining your SOC / Edition 1, Author: Joseph Muniz
Title: Security and Privacy in Social Networks, Author: Yaniv Altshuler
Title: Securing America's Future: National Strategy in the Information Age, Author: Daniel M. Gerstein
Title: Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops, Author: Russian Academy of Sciences
Title: Protecting Critical Infrastructures Against Cyber-Attack, Author: Stephen Lukasik

Pagination Links