Free Delivery Over $100
735 books were found.
This book looks at the technical fields of Cybersecurity progressively, building up in layers before expanding into... Read More >>
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances... Read More >>
Master CEH v11 and identify your weak spots As protecting information continues to be a growing concern for today’s... Read More >>
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference... Read More >>
Cyber Victimology provides a global socio-legal-victimological perspective on victimization online, written in clear,... Read More >>
Read More >>
This book covers technical details of mobile devices and transmissions as well as forensic methods for extracting... Read More >>
The first section of this book addresses the evolution of CISO (chief information security officer) leadership,... Read More >>
This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology.... Read More >>
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world’s first use... Read More >>
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both... Read More >>
Using convenience theory within a comparative analysis which includes case-studies, the book explores both European... Read More >>
This book documents and explains civil defence preparations for national cyber emergencies in conditions of both... Read More >>
This book is particularly suited for those that bridge the academic world and industry, allowing readers to understand... Read More >>
This book is written for the first security hire in an organization; either an individual moving into this role... Read More >>
Crime science and digital forensics: A holistic view, is a collation of articles which contribute to the discourse... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing... Read More >>
Deploying empirical studies from early Imperial China to the global security landscape after the Nine-Eleven terrorist... Read More >>