Computer crimes - Prevention.
Overview
Works: | 47 works in 25 publications in 25 languages |
---|
Titles
Ninja hacking DUP_1 = unconventional penetration testing tactics and techniques /
by:
(Electronic resources)
Collaboration with cloud computing = security, social media, and unified communications /
by:
(Electronic resources)
The global cybercrime industry = economic, institutional and strategic perspectives /
by:
(Language materials, printed)
Cybercrime and espionage = an analysis of subversive multivector threats /
by:
(Electronic resources)
Advanced persistent threat = understanding the danger and how to protect your organization /
by:
(Electronic resources)
Hacking web apps = detecting and preventing web application security problems /
by:
(Electronic resources)
Internet searches for vetting, investigations, and open-source intelligence
by:
(Electronic resources)
The basics of hacking and penetration testing = ethical hacking and penetration testing made easy /
by:
(Electronic resources)
Self- and co-regulation in cybercrime, cybersecurity and national security
by:
(Electronic resources)
Modeling and evaluating denial of service attacks for wireless and mobile applications
by:
(Electronic resources)
Introduction to cybercrime = computer crimes, laws, and policing in the 21st century /
by:
(Electronic resources)
Threat mitigation and detection of cyber warfare and terrorism activities
by:
(Electronic resources)
Enterprise cybersecurity study guide = how to build a successful cyberdefense program against advanced threats /
by:
(Electronic resources)
Security, privacy, and anonymization in social networks = emerging research and opportunities /
by:
(Electronic resources)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
by:
(Electronic resources)
Detection and mitigation of insider attacks in a cloud infrastructure = emerging research and opportunities /
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems
by:
(Electronic resources)
Building a cybersecurity culture in organizations = how to bridge the gap between people and digital technology /
by:
(Electronic resources)
Cyber crisis management = the practical handbook on crisis management and crisis communication /
by:
(Electronic resources)
Cyber security and threats = concepts, methodologies, tools, and applications /
by:
(Electronic resources)
Anti-money laundering, counter financing terrorism and cybersecurity in the banking industry = a comparative study within the G-20 /
by:
(Electronic resources)
Enterprise cyber risk management as a value creator = leverage cybersecurity for competitive advantage /
by:
(Electronic resources)
Show more
Fewer
Subjects