ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / Online Safety & Privacy category

Listening in

Cybersecurity in an Insecure Age

Susan Eva Landau

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Ending Spam

Bayesian Content Filtering and the Art of Statistical Language Classification

Jonathan A. Zdziarski

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Cyber Terrorism: Political and Economic Implications

Political and Economic Implications

Colarik, Andrew

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

No Place to Hide

Glenn Greenwald

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Dawson, Maurice

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Complex-Valued Neural Networks: Utilizing High-Dimensional Parameters

Utilizing High-Dimensional Parameters

Nitta, Tohru

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Inside Cyber Warfare

Mapping the Cyber Underworld

Jeffrey Carr

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Combating Security Breaches and Criminal Activity in the Digital Sphere

Geetha, S. , Phamila, Asnath Victy

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Social Media Investigation for Law Enforcement

Joshua L. Brunty , Katherine Helenek

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Information Hiding

Fabien Petitcolas , Stefan Katzenbeisser

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Making Money with Alexa Skills – A Developer’s Guide

Matthias Biehl

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Handbook of Research on User Interface Design and Evaluation for Mobile Technology

Lumsden, Joanna

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods

Requirements, Models and Methods

Milanovic, Nikola

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Handbook of Research on ICT-Enabled Transformational Government: A Global Perspective

A Global Perspective

Dwivedi, Yogesh K. , Janssen, Marijn , Weerakkody, Vishanth

Computers / Security / Online Safety & Privacy

🥺 Not rated yet

Are You Hacker Proof?

THE INFORMAITON HACKERS, HI-TECH HUSTLERS, BULLIES AND IDENTITY THIEVES DO NOT WANT YOU TO KNOW

Gregory D. Evans

Computers / Security / Online Safety & Privacy

🥺 Not rated yet