Free Delivery Over $100
735 books were found.
A three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best... Read More >>
Examining the psychology of cybercrime, this book considers many aspects of cybercrime, including research on offenders,... Read More >>
Read More >>
Klein tracks down and exploits bugs in some of the world's most popular programs. Whether by browsing source code,... Read More >>
WikiLeaks has helped redefine our idea of investigative journalism and our understanding of how information should... Read More >>
Security experts and trainers cover all exam objectives for this new IT security certification in detail and provide... Read More >>
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack... Read More >>
Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This... Read More >>
Presents a open source assessment of China's capability to conduct computer network operations (CNO) both during... Read More >>
Internet Child Abuse: Current Research and Policy provides a timely overview of international policy, legislation... Read More >>
Kevin Mitnick's long-awaited memoir of computer hacking and FBI skirting, revealed now after seven years of government-mandated... Read More >>
Examines the phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some... Read More >>
Explores the battlefields, participants and the tools and techniques used during digital conflicts. This title discusses... Read More >>
Provides knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective... Read More >>
Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues... Read More >>
The compelling true story of the computer underground and the bizarre lives and crimes of an elite group of young... Read More >>
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal... Read More >>
Imagine being able to change the languages for the applications that a computer is running and taking control over... Read More >>
Computer Audit, Control, and Security, 2nd Edition describes the types of internal controls, security, and integrity... Read More >>