Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Shelves

Discover (Random Books)

The Economist [Sun, 20 Dec 2020]

The Economist [Sun, 20 Dec 2020]

calibre

Land of Lisp

Land of Lisp

Conrad Barski M.D.

howtomakeyourcataninternetcelebrity

howtomakeyourcata[..]

Unknown

The Economist

The Economist

calibre

Publisher: CRC Press

Defense against the Black Arts

Defense against the Black Arts

Varsalone, Jesse; McFadden, Matthew

understandingtheneweuropeandataprotectionrules

understandingthen[..]

Unknown

cisojourney

cisojourney

Unknown

collaborativecyberthreatintelligence

collaborativecybe[..]

Unknown

intrusiondetectionandpreventionformobileecosystems

intrusiondetectio[..]

Unknown

Big Data Analytics in Cybersecurity

Big Data Analytics in Cybersecurity

Unknown

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Unknown

dataanalyticsforinternalauditors

dataanalyticsfori[..]

Unknown

bigdataanalyticswithapplicationsininsiderthreatdetection

bigdataanalyticsw[..]

Unknown

supplychainriskmanagement

supplychainriskma[..]

Unknown

socialmediawarfare

socialmediawarfare

Unknown

wallingouttheinsiders

wallingouttheinsi[..]

Unknown

Security De-Engineering

Security De-Engineering

Ian Tibble

Security Strategy

Security Strategy

Bill Stackpole & Eric Oksendahl

Unauthorized Access

Unauthorized Access

Sloan, Robert H.; Warner, Richard

Information Security Fundamentals

Information Security Fundamentals

Peltier, Thomas R.

Iris Biometric Model for Secured Network Access

Iris Biometric Model for Secured Network Access

Khoury, Franjieh El

Responsive Security

Responsive Security

Kang, Meng-Chow

Computer Security Literacy

Computer Security Literacy

Jacobson, Douglas; Idziorek, Joseph

Web Security

Web Security

Hanqing Wu, Liz Zhao

Network and Data Security for Non-Engineers

Network and Data Security for Non-Engineers

Frank M. Groom & Kevin Groom & Stephan S. Jones

Intrusion Detection Networks

Intrusion Detection Networks

Carol Fung & Raouf Boutaba

Threat Level Red: Cybersecurity Research Programs of the U.S. Government

Threat Level Red: Cybersecurity Research Programs of the U.S. ...

Michael Erbschloe

Implementing Cybersecurity

Implementing Cybersecurity

Anne Kohnke, Ken Sigler, Dan Shoemaker

Book Details

...