1-24 of 116 Books
Implementing Digital Forensic Readiness
Implementing Digital Forensic Readiness
By Jason Sachowski

Electronically stored information
By David R. Matthews
Information security governance simplified
Information security governance simplified
By Todd Fitzgerald

Ethical Hacking and Penetration Testing Guide
By Rafay Baloch
No-Body Homicide Cases
No-Body Homicide Cases
By Thomas A. (Tad) DiBiase

The practical guide to HIPAA privacy and security compliance
By Kevin Beaver
Noiseless steganography
Noiseless steganography
By Abdelrahman Desoky

Policing global movement
By S. Caroline Taylor,Daniel Joseph Torpy,Das, Dilip K.

Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks
By Mohssen Mohammed
Security Risk Models for Cyber Insurance
Security Risk Models for Cyber Insurance
By David Rios Insua,Caroline Baylon,Jose Vila
Managing Security Services in Heterogenous Networks
Managing Security Services in Heterogenous Networks
By R. Thandeeswaran,Thinagaran Perumal,Kun Ma,N. Jeyanthi
Security without obscurity
Security without obscurity
By Jeffrey James Stapleton
Fraud Auditing Using Caatt
Fraud Auditing Using Caatt
By Shaun Aghili
Cyber Arms
Cyber Arms
By Stanislav Abaimov,Maurizio Martellini
Professional Security Management
Professional Security Management
By Charles Swanson

Blockchain Technology and Applications
By Ahmed Banafa
Casino and Gaming Resort Investigations
Casino and Gaming Resort Investigations
By Derk J. Boss,Alan W. Zajic
Enhancing Business Continuity and IT Capability
Enhancing Business Continuity and IT Capability
By Nijaz Bajgorić,Lejla Turulja,Semir Ibrahimović,Amra Alagic

Wireless Multimedia Communication Systems
By Kamisetty Ramamohan Rao,Zoran S. Bojkovic,Bojan M. Bakmaz

Introduction to Computer Networks and Cybersecurity
By Chwan-Hwa (John) Wu,J. David Irwin