Limit Search Results
Author
Language
Format
Switch to list view
Switch to thumbnail view
38 Results Found Subscribe to search results
00000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Computer security
2. 
Cover image for Computer security
3. 
Cover image for Computer security
5. 
Cover image for Cyberwarfare : information operations in a connected world
6. 
Cover image for Analyzing security, trust, and crime in the digital world
7. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
9. 
Cover image for Cyber crime : concepts, methodologies, tools and applications
13. 
Cover image for Cyber security, cyber crime and cyber forensics : applications and perspectives
16. 
Cover image for Profiling hackers : the science of criminal profiling as applied to the world of hacking
17. 
Cover image for Cyber fraud : tactics, techniques and procedures
21. 
Cover image for Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
23. 
Cover image for Encyclopedia of information ethics and security
24. 
Cover image for Crimeware : understanding new attacks and defenses
26. 
Cover image for Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
31. 
Cover image for How to prevent computer crime : a guide for        managers
32. 
Cover image for Geodetic computation crime : a guide for managers
33. 
Cover image for Computer fraud and counter measures
35. 
Cover image for Cybersecurity and Privacy in Cyber Physical Systems
36. 
Cover image for Behavioral Cybersecurity:  Applications of Personality Psychology and Computer Science
38. 
Cover image for Cyber fraud : tactics, techniques and procedures
Go to:Search Results
|
Top of Page
|
Search Facets