Computer crimes - Prevention.
Overview
            | Works: | 49 works in 28 publications in 28 languages | |
|---|---|---|
Titles
          
                  
                    Internet searches for vetting, investigations, and open-source intelligence
                  
                  by: 
                  
                  (Language materials, printed)
                  
                
                  
                    Cybercrime and espionage = an analysis of subversive multivector threats /
                  
                  by: 
                  
                  (Language materials, printed)
                  
                
                  
                    Advanced persistent threat = understanding the danger and how to protect your organization /
                  
                  by: 
                  
                  (Language materials, printed)
                  
                
                  
                    Hacking web apps = detecting and preventing web application security problems /
                  
                  by: 
                  
                  (Language materials, printed)
                  
                
                  
                    Ninja hacking = unconventional penetration testing tactics and techniques /
                  
                  by: 
                  
                  (Language materials, printed)
                  
                
                  
                    Modeling and evaluating denial of service attacks for wireless and mobile applications
                  
                  by: 
                  
                  (Language materials, printed)
                  
                
                
                  
                    
                      
                        Managing the human factor in information security how to win over staff and influence business managers /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        The basics of web hacking = tools and techniques to attack the Web /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        The basics of hacking and penetration testing = ethical hacking and penetration testing made easy /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        The basics of hacking and penetration testing = ethical hacking and penetration testing made easy /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Collaboration with cloud computing = security, social media, and unified communications /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Targeted cyber attacks = multi-staged attacks driven by exploits and malware /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Cybersecurity policies and strategies for cyberwarfare prevention /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Introduction to cybercrime = computer crimes, laws, and policing in the 21st century /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Threat mitigation and detection of cyber warfare and terrorism activities
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Security solutions for hyperconnectivity and the Internet of things
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Combating security breaches and criminal activity in the digital sphere /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Threat mitigation and detection of cyber warfare and terrorism activities /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Security, privacy, and anonymization in social networks : = emerging research and opportunities /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Security, privacy, and anonymization in social networks = emerging research and opportunities /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Enterprise cybersecurity study guide = how to build a successful cyberdefense program against advanced threats /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Detection and mitigation of insider attacks in a cloud infrastructure = emerging research and opportunities /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Machine learning and cognitive science applications in cyber security
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Countering cyber attacks and preserving the integrity and availability of critical systems
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Deception in the digital age : = exploiting and defending human targets through computer-mediated communications /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Cyber security and threats = concepts, methodologies, tools, and applications /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Security solutions for hyperconnectivity and the Internet of things /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Global cyber security labor shortage and international business risk
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                      
                        Syngress force emerging threat analysis = from mischief to malicious /
                      
                      by: 
                      
                      (Language materials, printed)
                      
                    
                  
                  
                      Show more
                    
                    
                      Fewer
                    
                  Subjects