Items

Go to All Bundles

Item nameItem Type
An In-Depth Guide to Mobile Device Forensicsebook
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychologyebook
Big Data Analytics and Computing for Digital Forensic Investigationsebook
Creating an Information Security Program from Scratchebook
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasuresebook
Cyber-Security Threats, Actors, and Dynamic Mitigationebook
Cybersecurity Lessons from CoVID-19ebook
CyRM: Mastering the Management of Cybersecurityebook
Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasuresebook
Emerging Security Algorithms and Techniquesebook
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain Worldebook
The Insider Threat: Assessment and Mitigation of Risksebook
Internet of Things Security: Principles, Applications, Attacks, and Countermeasuresebook
Internet of Things, Threats, Landscape, and Countermeasuresebook
Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Controlebook
Online Social Networks Security: Principles, Algorithm, Applications, and Perspectivesebook
Secrets of a Cyber Security Architectebook
Security without Obscurity: Frequently Asked Questions (FAQ)ebook
Social Engineering: Hacking Systems, Nations, and Societiesebook