Incoming Resources
- Machine Learning Forensics for Law Enforcement, Security, and Intelligence, Jesus Mena
- Cybershock, by Winn Schwartau
- Cybercrime, protecting your business, your family and yourself, Todd Wade
- Cybersecurity Blue Team Strategies, Uncover the Secrets of Blue Teams to Combat Cyber Threats in Your Organization /, Kunal Sehgal, Nikolaos Thymianis
- Protecting your web applications, solutions and strategies to combat cybersecurity threats, Gary Sloper and Ken Hess
- Digital evidence and computer crime, forensic science, computers and the internet, by Eoghan Casey ; with contributions from Susan W. Brenner [and others]
- The truth about avoiding scams, Steve Weisman
- Kingdom of lies, unnerving adventures in the world of cybercrime, Kate Fazzini
- Cybercrime, wie Sie Gefahren im Internet erkennen und sich schützen, Jürgen Schuh
- Cyberspies, inside the world of hacking, online privacy, and cyberterrorism, Michael Miller
- Who are the bad guys and what do they want?, Gregory Fell and Mike Barlow
- The internet police, how crime went online -- and the cops followed, Nate Anderson
- Dissecting the hack, the V3rb0ten network, Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
- Tools and weapons, the promise and the peril of the digital age, Brad Smith and Carol Ann Browne
- Drugs unlimited, the web revolution that's changing how the world gets high, Mike Power
- Cybersecurity, attack and defense strategies, infrastructure security with Red Team and Blue Team tactics, Yuri Diogenes, Erdal Ozkaya
- Managing information security breaches, studies from real life, Michael Krausz
- Hate crimes in cyberspace, Danielle Keats Citron
- Cyberphobia, identity, trust, security and the Internet, Edward Lucas
- How personal & Internet security works, Preston Gralla
- Tracers in the dark, the global hunt for the crime lords of cryptocurrency, Andy Greenberg
- Cyber reconnaissance surveillance and defense, Robert Shimonski
- When gadgets betray us, the dark side of our infatuation with new technologies, Robert Vamosi
- The art of memory forensics, detecting malware and threats in Windows, Linux, and Mac memory, [by] Michael Hale Ligh, Andrew Case, Jamie Levy, [and] Aaron Walters
- Managing Information Security Breaches, Studies from Real Life
- Cyber security, a practitioner's guide, David Sutton
- Cyberpsychology, the study of individuals, society and digital technologies, Monica Therese Whitty, Garry Young
- This machine kills secrets, how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information, Andy Greenberg
- Click here to kill everybody, security and survival in a hyper-connected world, Bruce Schneier
- Kingdom of lies, unnerving adventures in the world of cybercrime, Kate Fazzini
- Internet predators, Harry Henderson
- Tools and weapons, the promise and the peril of the digital age, Brad Smith and Carol Ann Browne ; foreword by Bill Gates
- How personal & Internet security works, Preston Gralla
- Dot.cons, crime, deviance and identity on the internet, edited by Yvonne Jewkes