Computer crimes - Prevention.
Overview
Works: | 31 works in 14 publications in 14 languages |
---|
Titles
Cybercrime and espionage[electronic resource] :an analysis of subversive multivector threats /
by:
(Language materials, printed)
Advanced persistent threat[electronic resource] :understanding the danger and how to protect your organization /
by:
(Language materials, printed)
Hacking web apps[electronic resource] :detecting and preventing web application security problems /
by:
(Language materials, printed)
Ninja hacking[electronic resource] :unconventional penetration testing tactics and techniques /
by:
(Language materials, printed)
Internet searches for vetting, investigations, and open-source intelligence[electronic resource] /
by:
(Language materials, printed)
The basics of hacking and penetration testing[electronic resource] :ethical hacking and penetration testing made easy /
by:
(Language materials, printed)
The basics of web hacking[electronic resource] :tools and techniques to attack the Web /
by:
(Language materials, printed)
Cybersecurity[electronic resource] :public sector threats and responses /
by:
(Language materials, printed)
Cybersecurity policies and strategies for cyberwarfare prevention /
by:
(Language materials, printed)
Collaboration with cloud computing[electronic resource] :security, social media, and unified communications /
by:
(Language materials, printed)
Self- and co-regulation in cybercrime, cybersecurity and national security[electronic resource] /
by:
(Electronic resources)
Modeling and evaluating denial of service attacks for wireless and mobile applications[electronic resource] /
by:
(Language materials, printed)
Network security attacks and countermeasures[electronic resource] /
by:
(Language materials, printed)
Cyber threat![electronic resource] :how to manage the growing risk of cyber attacks /
by:
(Electronic resources)
Introduction to cybercrime[electronic resource] :computer crimes, laws, and policing in the 21st century /
by:
(Language materials, printed)
Threat mitigation and detection of cyber warfare and terrorism activities[electronic resource] /
by:
(Language materials, printed)
Security solutions for hyperconnectivity and the Internet of things[electronic resource] /
by:
(Language materials, printed)
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)[electronic resource] /
by:
(Electronic resources)
Security, privacy, and anonymization in social networks[electronic resource] :emerging research and opportunities /
by:
(Electronic resources)
Detection and mitigation of insider attacks in a cloud infrastructure[electronic resource] :emerging research and opportunities /
by:
(Electronic resources)
Machine learning and cognitive science applications in cyber security[electronic resource] /
by:
(Electronic resources)
Countering cyber attacks and preserving the integrity and availability of critical systems[electronic resource] /
by:
(Electronic resources)
Cyber security and threats[electronic resource] :concepts, methodologies, tools, and applications /
by:
(Electronic resources)
Subjects