Skip to main content
Esplora
Scopri i piani
LINGUA DEL SITO
Deutsch - DE
English - EN
Español - ES
Français - FR
Italiano - IT
selected language
La selezione
non influirà sui libri.
La selezione della lingua del sito web si applica ai menu e all'interfaccia di navigazione.
globe icon
Italiano
close
Accedi
Iscriviti per iniziare a leggere
LINGUA DEL SITO
Deutsch - DE
English - EN
Español - ES
Français - FR
Italiano - IT
selected language
La selezione
non influirà sui libri.
La selezione della lingua del sito web si applica ai menu e all'interfaccia di navigazione.
globe icon
Italiano
close
Sfoglia per categoria
Architettura
Arte
Scienze biologiche
Gestione aziendale
Informatica
Design
Economia
Didattica
Storia
Lingue e linguistica
Giurisprudenza
Letteratura
Matematica
Mezzi di comunicazione e arti performative
Medicina
Crescita personale
Filosofia
Fisica
Politica e relazioni internazionali
Psychology
Scienze sociali
Manuali di studio
Tecnologia e ingegneria
Teologia e religione
Oppure cerca per
Sottocategorie
Editori
Index
Esplora le risorse didattiche
Knowledge Base
Guide allo studio
Guide per la scrittura di saggi
Home
Esplora
Informatica
Sicurezza informatica
Informatica
Sicurezza informatica
Scopri
Libri
Categorie correlate
Tutte le lingue
close
I più letti
close
Visualizzazione di 181 - 240 libri su 1,000+
Introduction to Social Media Investigation
Jennifer Golbeck
2015
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Tourism Security
Peter Tarlow
2014
The Browser Hacker's Handbook
Wade Alcorn, Christian Frichot, Michele Orru
2014
Practical Reverse Engineering
Bruce Dang, Alexandre Gazet, Elias Bachaalany
2014
The Basics of IT Audit
Stephen D. Gantz
2013
Cyber Warfare
Jason Andress, Steve Winterfeld
2013
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
Logging and Log Management
Kevin Schmidt, Chris Phillips, Anton Chuvakin
2012
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Cyber Security Policy Guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, Joseph Weiss
2012
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2011
Introduction to Network Security
Douglas Jacobson
2008
Artificial Intelligence
S. Kanimozhi Suguna, M. Dhivya, Sara Paiva
2021
Digital Forensics Explained
Greg Gogolin
2021
Cyber-Security Threats, Actors, and Dynamic Mitigation
Nicholas Kolokotronis, Stavros Shiaeles
2021
Blockchain Technology
E. Golden Julie, J. Jesu Vedha Nayahi, Noor Zaman Jhanjhi
2020
Linux Security Fundamentals
David Clinton
2020
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Cybersecurity Fundamentals
Kutub Thakur, Al-Sakib Khan Pathan
2020
Mastering Linux Security and Hardening
Donald A. Tevault
2020
Demystifying Internet of Things Security : Successful IoT Device/Edge and Platform Security Deployment
Anil Kumar, Dave Wheeler, Sunil Cheruvu, Ned Smith
2020
Secrets of a Cyber Security Architect
Brook S. E. Schoenfield
2019
Security Fundamentals
Crystal Panek
2019
Hands-On Microservices with Kubernetes
Gigi Sayfan
2019
Hands-On Network Forensics
Nipun Jaswal
2019
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Introduction to Criminal Justice Information Systems
Ralph Ioimo
2018
Hands-on Incident Response and Digital Forensics
Mike Sheward
2018
Hands-On Cryptography with Python
Samuel Bowne
2018
Wireshark 2 Quick Start Guide
Charit Mishra
2018
Digital Forensics with Kali Linux
Shiva V. N Parasram
2017
Threat Assessment and Management Strategies
Frederick S. Calhoun, Stephen W. Weston J.D.
2017
Tradecraft Primer
Paul Charles Topalian
2017
Crime and Intelligence Analysis
Glenn Grana, James Windell
2016
Physical Security: 150 Things You Should Know
Lawrence J. Fennelly, Marianna Perry
2016
Handbook of System Safety and Security
2016
Practical Windows Forensics
Ayman Shaaban
2016
Pervasive Computing
2016
Machine Learning Forensics for Law Enforcement, Security, and Intelligence
Jesus Mena
2016
The Decision to Attack
Aaron Franklin Brantly
2016
US Power and the Internet in International Relations
M. Carr
2016
Network Performance and Security
Chris Chapman
2016
Operating System Forensics
Ric Messier
2015
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
The Network Security Test Lab
Michael Gregg
2015
Counterterrorism
Benoît Gomis
2015
Introduction to Network Security
Jie Wang, Zachary A. Kissel
2015
Network Attacks and Exploitation
Matthew Monte
2015
Advanced Criminal Investigations and Intelligence Operations
Robert J Girod
2014
Information Security Management Handbook, Volume 7
Richard O'Hanley, James S. Tiller
2013
The Basics of Web Hacking
Josh Pauli
2013
Pre-Employment Background Investigations for Public Safety Professionals
Frank A. Colaprete
2012
Network Security Bible
Eric Cole
2011
Cybercrime and Espionage
Will Gragido, John Pirc
2011
Security Strategy
Bill Stackpole, Eric Oksendahl
2010
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Brian Baskin, Marcus J. Carey, Jayson E Street, Kent Nabors
2010
Computer Forensics For Dummies
Carol Pollard, Reynaldo Anzaldua
2008
The IT / Digital Legal Companion
Gene K. Landy, Amy J. Mastrobattista
2008
International Handbook of Penology and Criminal Justice
Shlomo Giora Shoham, Ori Beck, Martin Kett
2007
1
2
3
4
5