Cyber reconnaissance, surveillance, and defense
Saved in:
| Main Author: | Shimonski, Robert (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston
Elsevier/Syngress,
2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Introduction to intelligent surveillance
by: Yan, Wei Qi
Published: (2017)
by: Yan, Wei Qi
Published: (2017)
Collaborative cyber threat intelligence detecting and responding to advanced cyber attacks at the national level
Published: (2018)
Published: (2018)
Hands-on cybersecurity for finance identify vulnerabilities and secure your financial services from security breaches
by: Ozkaya, Erdal, et al.
Published: (2019)
by: Ozkaya, Erdal, et al.
Published: (2019)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019)
Published: (2019)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011)
by: Gragido, Will, et al.
Published: (2011)
Artificial Intelligence for Cyber Defense and Smart Policing /
Published: (2024)
Published: (2024)
Confronting Cyberespionage Under International Law /
by: Pehlivan, Oguz Kaan
Published: (2019)
by: Pehlivan, Oguz Kaan
Published: (2019)
Security, privacy, and forensics issues in big data
Published: (2020)
Published: (2020)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
The web application hacker's handbook discovering and exploiting security flaws
by: Stuttard, Dafydd
Published: (2008)
by: Stuttard, Dafydd
Published: (2008)
Big book of IPsec RFCs Internet security architecture
by: Loshin
Published: (2000)
by: Loshin
Published: (2000)
Modern theories and practices for cyber ethics and security compliance
Published: (2020)
Published: (2020)
China's cyber power
by: Inkster, Nigel
Published: (2016)
by: Inkster, Nigel
Published: (2016)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Spies among us how to stop the spies, terrorists, hackers, and criminals you don't even know you encounter every day
by: Winkler, Ira
Published: (2005)
by: Winkler, Ira
Published: (2005)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Protect your privacy on the Internet Privacy defense tools and techniques you can use right now
by: Pfaffenberger
Published: (1997)
by: Pfaffenberger
Published: (1997)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Securing biometrics applications
by: Shoniregun, Charles A.
Published: (2008)
by: Shoniregun, Charles A.
Published: (2008)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Running a ring of spies spycraft and black operations in the real world of espionage
by: Mack, Jefferson
Published: (1996)
by: Mack, Jefferson
Published: (1996)
Intelligence in an insecure world
by: Gill, Peter, et al.
Published: (2018)
by: Gill, Peter, et al.
Published: (2018)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Hacking exposed unified communications & VoIP security secrets & solutions
by: Collier, Mark D., et al.
Published: (2014)
by: Collier, Mark D., et al.
Published: (2014)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Similar Items
-
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018) -
Introduction to intelligent surveillance
by: Yan, Wei Qi
Published: (2017) -
Collaborative cyber threat intelligence detecting and responding to advanced cyber attacks at the national level
Published: (2018) -
Hands-on cybersecurity for finance identify vulnerabilities and secure your financial services from security breaches
by: Ozkaya, Erdal, et al.
Published: (2019) -
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)


