Cybercrime and Digital Forensics: An Introduction Submitted by jhills on Wed, 11/22/2023 - 09:05 Read more about Cybercrime and Digital Forensics: An Introduction
Handbook of Intelligence Studies Submitted by jhills on Wed, 11/22/2023 - 08:28 Read more about Handbook of Intelligence Studies
Routledge Companion to Global Cyber-Security Strategy Submitted by jhills on Wed, 11/22/2023 - 08:27 Read more about Routledge Companion to Global Cyber-Security Strategy
Computer applications for security, control and system engineering Submitted by jhills on Wed, 11/22/2023 - 08:25 Read more about Computer applications for security, control and system engineering
Intelligence and espionage: Secrets and spies Submitted by jhills on Wed, 11/22/2023 - 08:18 Read more about Intelligence and espionage: Secrets and spies
Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath Submitted by jhills on Wed, 11/22/2023 - 08:10 Read more about Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath
Cyber Security: Threats and Responses for Government and Business Submitted by jhills on Wed, 11/22/2023 - 08:06 Read more about Cyber Security: Threats and Responses for Government and Business
Developments and Advances in Defense and Security: Proceedings of MICRADS 2019 Submitted by jhills on Wed, 11/22/2023 - 08:03 Read more about Developments and Advances in Defense and Security: Proceedings of MICRADS 2019
Conflict Management in Digital Business Submitted by jhills on Wed, 11/22/2023 - 07:57 Read more about Conflict Management in Digital Business
Understanding Cyber-Warfare: Politics, Policy and Strategy Submitted by jhills on Wed, 11/22/2023 - 07:52 Read more about Understanding Cyber-Warfare: Politics, Policy and Strategy