-
1
Sailing safe in cyberspace : protect your identity and data
Los Angeles, [California] : SAGE, 2013Format: Electronic eBookAccess E-Book
-
2
Inside cyber warfare
Sebastopol, Calif. : O'Reilly Media, Inc., 2010
1st ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
3
Hacking web apps detecting and preventing web application security problems
Waltham, Mass. : Syngress, 2012Format: Electronic eBookAccess E-Book
Access E-Book.
-
4
Cyber crime investigator's field guide
Boca Raton : Auerbach Publications, 2005
2nd ed.Format: Electronic eBookFull text (WIT users only)
Full text (Wentworth users only)
-
5
Music piracy and crime theory
New York : LFB Scholarly Pub. LLC, 2006Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
6
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London,...
Cham : Springer Nature Switzerland : Imprint: Springer, 2024
1st ed. 2024.Format: Electronic eBookFull text (Wentworth users only)
-
7
The complete guide to defense in depth learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
Birmingham, UK : Packt Publishing Ltd., 2024
1st edition.Format: Electronic eBookFull text (Wentworth users only)
-
8
Managing a network vulnerability assessment
Boca Raton, Fla. : Auerbach Publications, 2003Format: Electronic eBookAccess E-Book.
Full text (WIT users only)
-
9
Hacked, The Bangladesh Bank Heist
[Place of publication not identified] : TVF International, 2017Format: Electronic VideoStreaming video (Emerson users only)
Cover image
-
10
Rights and responsibilities of participants in networked communities
Washington, D.C. : National Academy Press, 1994Format: Electronic eBookAccess E-Book
-
11
What are the new risks in ransomware?
New York, NY : Wall Street Journal, 2020Format: Electronic VideoFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
12
Cyberpredators and their prey
Boca Raton, FL : CRC Press, 2023
First edition.Format: Electronic eBookFull text (WIT users only)
-
13
Defeating the Hackers
New York, N.Y. : Films Media Group, 2014Format: Electronic VideoStreaming video (Emerson users only)
-
14
Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies
Cham : Springer International Publishing : Imprint: Springer, 2019Format: Electronic eBookFull text (Wentworth users only)
-
15
Digital Forensics and Investigations : People, Process, and Technologies to Defend the Enterprise
London : Taylor and Francis, 2018
First edition.Format: Electronic eBookFull text (WIT users only)
-
16
A guide to the National Initiative for Cybersecurity Education (NICE) cybersecurity workforce framework (2.0)
Boca Raton : CRC Press, 2016Format: Electronic eBookFull text (WIT users only)
-
17
Security superstream : security in the cloud.
[Place of publication not identified] : O'Reilly Media, Inc., 2022
[First edition].Format: Electronic VideoStreaming video (Wentworth users only)
-
18
Risk factors in computer-crime victimization
El Paso [Tex.] : LFB Scholarly Pub., 2010Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
19
Zen and the art of information security
Rockland, MA : Syngress, 2007Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
20
Computer forensics : an essential guide for accountants, lawyers, and managers
Hoboken, N.J. : John Wiley & Sons, 2007Format: Electronic eBookFull text (Wentworth users only)