Showing 1 - 20 results of 650 for search '', query time: 0.06s Refine Results
  1. 1

    Sailing safe in cyberspace : protect your identity and data by Kaushik, Anjali

    Los Angeles, [California] : SAGE, 2013
    Format: Electronic eBook
    Access E-Book
  2. 2

    Inside cyber warfare by Carr, Jeffrey

    Sebastopol, Calif. : O'Reilly Media, Inc., 2010
    1st ed.
    Format: Book


  3. 3

    Hacking web apps detecting and preventing web application security problems by Shema, Mike

    Waltham, Mass. : Syngress, 2012
    Format: Electronic eBook
    Access E-Book
    Access E-Book.
  4. 4

    Cyber crime investigator's field guide by Middleton, Bruce

    Boca Raton : Auerbach Publications, 2005
    2nd ed.
    Format: Electronic eBook
    Full text (WIT users only)
    Full text (Wentworth users only)
  5. 5
  6. 6
  7. 7

    The complete guide to defense in depth learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach by Mukherjee, Akash

    Birmingham, UK : Packt Publishing Ltd., 2024
    1st edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 8

    Managing a network vulnerability assessment by Peltier, Thomas R., Peltier, Justin, Blackley, John A.

    Boca Raton, Fla. : Auerbach Publications, 2003
    Format: Electronic eBook
    Access E-Book.
    Full text (WIT users only)
  9. 9

    Hacked, The Bangladesh Bank Heist

    [Place of publication not identified] : TVF International, 2017
    Format: Electronic Video
    Streaming video (Emerson users only)
    Cover image
  10. 10

    Rights and responsibilities of participants in networked communities

    Washington, D.C. : National Academy Press, 1994
    Format: Electronic eBook
    Access E-Book
  11. 11
  12. 12

    Cyberpredators and their prey by Shapiro, Lauren R.

    Boca Raton, FL : CRC Press, 2023
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  13. 13

    Defeating the Hackers

    New York, N.Y. : Films Media Group, 2014
    Format: Electronic Video
    Streaming video (Emerson users only)
  14. 14

    Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies

    Cham : Springer International Publishing : Imprint: Springer, 2019
    Format: Electronic eBook
    Full text (Wentworth users only)
  15. 15

    Digital Forensics and Investigations : People, Process, and Technologies to Defend the Enterprise by Sachowski, Jason

    London : Taylor and Francis, 2018
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  16. 16
  17. 17

    Security superstream : security in the cloud.

    [Place of publication not identified] : O'Reilly Media, Inc., 2022
    [First edition].
    Format: Electronic Video
    Streaming video (Wentworth users only)
  18. 18
  19. 19
  20. 20

    Computer forensics : an essential guide for accountants, lawyers, and managers by Sheetz, Michael

    Hoboken, N.J. : John Wiley & Sons, 2007
    Format: Electronic eBook
    Full text (Wentworth users only)