Electronic Books

Total Books: 1 - 10 /10
British Media Coverage of the Press Reform Debate Journalists Reporting Journalism

This book provides a detailed exploration of the British media coverage of the press reform debate that arose from the News ...

Lee mas
Brute Force

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces ...

Lee mas
Crypto Wars : Faked Deaths, Missing Billions and Industry Disruption / Erica Stanford

Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...

Lee mas
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

Lee mas
Fighting Terror Online : The Convergence of Security, Technology, and the Law

This book presents the position that the online environment is a significant and relevant theater of activity in the fight ...

Lee mas
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

Lee mas
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

Lee mas
The Ethics of Cybersecurity

This book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...

Lee mas
The Hackable City : Digital Media and Collaborative City-Making in the Network Society

This book presents a number of the latest academic insights into new collaborative modes of city making that are firmly rooted ...

Lee mas
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

Lee mas
Total Books: 1 - 10 /10