Explore all books in Computers / Security / Online Safety & Privacy category
Listening in
Cybersecurity in an Insecure Age
Susan Eva Landau
Computers / Security / Online Safety & Privacy
Ending Spam
Bayesian Content Filtering and the Art of Statistical Language Classification
Jonathan A. Zdziarski
Computers / Security / Online Safety & Privacy
Cyber Terrorism: Political and Economic Implications
Political and Economic Implications
Colarik, Andrew
Computers / Security / Online Safety & Privacy
No Place to Hide
Glenn Greenwald
Computers / Security / Online Safety & Privacy
New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Dawson, Maurice
Computers / Security / Online Safety & Privacy
Complex-Valued Neural Networks: Utilizing High-Dimensional Parameters
Utilizing High-Dimensional Parameters
Nitta, Tohru
Computers / Security / Online Safety & Privacy
Inside Cyber Warfare
Mapping the Cyber Underworld
Jeffrey Carr
Computers / Security / Online Safety & Privacy
Combating Security Breaches and Criminal Activity in the Digital Sphere
Geetha, S. , Phamila, Asnath Victy
Computers / Security / Online Safety & Privacy
Social Media Investigation for Law Enforcement
Joshua L. Brunty , Katherine Helenek
Computers / Security / Online Safety & Privacy
Information Hiding
Fabien Petitcolas , Stefan Katzenbeisser
Computers / Security / Online Safety & Privacy
Making Money with Alexa Skills – A Developer’s Guide
Matthias Biehl
Computers / Security / Online Safety & Privacy
Handbook of Research on User Interface Design and Evaluation for Mobile Technology
Lumsden, Joanna
Computers / Security / Online Safety & Privacy
Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods
Requirements, Models and Methods
Milanovic, Nikola
Computers / Security / Online Safety & Privacy
Handbook of Research on ICT-Enabled Transformational Government: A Global Perspective
A Global Perspective
Dwivedi, Yogesh K. , Janssen, Marijn , Weerakkody, Vishanth
Computers / Security / Online Safety & Privacy
Are You Hacker Proof?
THE INFORMAITON HACKERS, HI-TECH HUSTLERS, BULLIES AND IDENTITY THIEVES DO NOT WANT YOU TO KNOW
Gregory D. Evans
Computers / Security / Online Safety & Privacy