Computer crimes + Prevention
Label
Computer crimes + Prevention
Name
Computer crimes + Prevention
Sub focus
Actions
Incoming Resources
- Wang lu shi dai ren ren yao xue de zi an ji chu bi xiu ke, How cybersecurity really works, Sam Grubb zhu ; Lan Zixuan yi
- Ransomware protection playbook, Roger A. Grimes
- The ransomware hunting team, a band of misfits' improbable crusade to save the world from cybercrime, Renee Dudley and Daniel Golden
- Future crimes, everything is connected, everyone is vulnerable and what we can do about it, Marc Goodman
- Managing a network vulnerability assessment, Thomas R. Peltier, Justin Peltier, and John A. Blackley
- Analyzing and securing social networks, Bhavani Thuraisingham [and five others]
- Cyberwar, cyberterror, cybercrime, a guide to the role of standards in an environment of change and danger, Julie E. Mehan
- Case study, how Tools & Solutions survived a ransomware attack
- The ransomware threat landscape, prepare for, recognise and survive ransomware attacks, Alan Calder
- Hacking exposed industrial control systems, ICS and SCADA security secrets & solutions, Clint E. Bodungen, Bryan L. Singer, Aaron Shbeeb, Stephen Hilt, Kyle Wilhoit ; series editor, Joel Scambray
- Homeland cybersecurity, assessing cyber threats and building resilience : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Seventeenth Congress, first session, February 10, 2021
- Network attacks and exploitation, a framework, Matthew Monte
- Crimedotcom, from viruses to vote rigging, how hacking went global, Geoff White
- People-centric security, transforming your enterprise security culture, Lance Hayden
- The darkening web, the war for cyberspace, Alexander Klimburg
- Zi xun ke ji fan zui, zi an zhan zheng kai da! Cong xin li ce yan, jiao you ruan ti, guang gao xin & jia xin wen dao xuan ju cao kong, hai ke ru he ru qin ni de zhen shi sheng huo = Crime dot com : from viruses to vote rigging, how hacking went global, Jiefu Huaite (Geoff White) zhu ; Zhan Qiaoyu yi
- How cybersecurity really works, a hands-on guide for total beginners, by Sam Grubb
- Crafting the InfoSec playbook, Jeff Bollinger, Brandon Enright & Matthew Valites
- Cyber spies, the secret history of surveillance, hacking, and digital espionage, Gordon Corera
- The cyber attack survival manual, tools for surviving everything from identity theft to the digital apocalypse, Nick Selby, Heather Vescent ; illustrations by Eric Chow and Conor Buckley
Outgoing Resources
- Focus1
- Sub focus2