Title: Cybercrime Case Presentation: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, Author: Brett Shavers
Title: Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard, Author: Brett Shavers
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Countering the New Terrorism / Edition 1, Author: Ian O. Lesser
Title: Understanding Commanders' Information Needs for Influence Operations / Edition 1, Author: Eric V. Larson
Title: Information Operations: Warfare and the Hard Reality of Soft Power, Author: E. Leigh Armistead
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Peace, War and Computers / Edition 1, Author: Chris Hables Gray
Title: Cybercrime: The Transformation of Crime in the Information Age / Edition 1, Author: David S. Wall
Title: Cybercrime: Digital Cops in a Networked Environment, Author: Jack M. Balkin
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front / Edition 1, Author: Steven Branigan
Title: Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails / Edition 1, Author: Christopher Hadnagy
Title: Who Are You?: Identification, Deception, and Surveillance in Early Modern Europe, Author: Valentin Groebner
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: Cyber Security Awareness for Corporate Directors and Board Members, Author: David Willson
Title: Cyber Security, Author: Edward Amoroso

Pagination Links