Title: Understanding Commanders' Information Needs for Influence Operations / Edition 1, Author: Eric V. Larson
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Information Operations: Warfare and the Hard Reality of Soft Power, Author: E. Leigh Armistead
Title: Cybercrime: The Transformation of Crime in the Information Age / Edition 1, Author: David S. Wall
Title: Cybercrime: Digital Cops in a Networked Environment, Author: Jack M. Balkin
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front / Edition 1, Author: Steven Branigan
Title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails / Edition 1, Author: Christopher Hadnagy
Title: Who Are You?: Identification, Deception, and Surveillance in Early Modern Europe, Author: Valentin Groebner
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: Cyber Kids, Cyber Bullying, Cyber Balance / Edition 1, Author: Barbara C. Trolley
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Cyber Security Awareness for Accountants and CPAs, Author: David Willson
Title: Dissecting the Hack: The V3rb0t3n Network, Author: Jayson E Street
Title: The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations, Author: Ben Buchanan
Title: Conquest in Cyberspace: National Security and Information Warfare / Edition 1, Author: Martin C. Libicki
Title: Piracy: The Intellectual Property Wars from Gutenberg to Gates / Edition 2, Author: Adrian Johns
Title: Software Piracy Exposed / Edition 1, Author: Ron Honick
Title: Crime Online: Correlates, Causes, and Context / Edition 3, Author: Thomas Holt
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick

Pagination Links