1
Published 2023
Packt Publishing

2
Published 2023
Packt Publishing

3
Published 2013
Morgan Kaufmann/Elsevier
Table of Contents: ...Part 1. Information and systems security -- part 2. Network and infrastructure security -- part 3...

4 Table of Contents: ...part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part...

5
by Lillard, Terrence
Published 2010
Syngress
Table of Contents: ...PART I INTRODUCTION -- CHAPTER 1 What Is Network Forensics? -- PART II GATHERING EVIDENCE...

6
by Troncone, Paul, Albing, Carl
Published 2019
O'Reilly Media
Table of Contents: ...Part 1. Foundations. Command-line primer ; Bash primer ; Regular expressions primer ; Principles...

7
by Volonino, Linda
Published 2008
Wiley
Table of Contents: ...Part I: Digging Out and Documenting Electronic Evidence -- pt. II: Preparing to Crack the Case...

8
by Grimes, Roger A.
Published 2022
Wiley
Table of Contents: ...Part I. Introduction. Introduction to Ransomware ; Preventing Ransomware ; Cybersecurity Insurance...

9
by Sehgal, Kunal, Thymianis, Nikolaos
Published 2023
Packt Publishing, Limited
Table of Contents: ...Part 1: Establishing the Blue -- Chapter 1: Establishing a Defense Program -- Chapter 2: Managing a...

10
by Gregory, Peter H.
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... job with the right organization -- Getting hired! -- The part of tens...

11
by Hayden, Lance
Published 2016
McGraw-Hill Education
Table of Contents: ...Machine generated contents note: Part I: Understanding Your Security Culture -- Chapter 1...

12
by Patton, Helen E.
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... the cybersecurity career path -- Introduction -- Part I: Arriving in security -- How do you become a security...

13
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ...Part A: Artificial Intelligence (AI) in Cyber Security Analytics: Fundamental and Challenges...

14
by Chaput, Bob
Published 2023
Apress
Table of Contents: ...Part I: A Case for Action -- Chapter 1: Enterprise Cyber Risk Management as a Value Creator...

15
Published 2021
Routledge
Table of Contents: ... security: a unique opportunity -- Singapore: a leading actor in ASEAN cybersecurity -- Part III: The Middle...

16
by Street, Jayson E.
Published 2010
Syngress/Elsevier
Table of Contents: ...; Acknowledgments; H0w t0 R34d Dissecting the Hack: The F0rb1dd3n Network; About the Authors; PART 1: F0RB1DD3N; PR...

17
by Sheward, Mike
Published 2018
BCS Learning & Development
Table of Contents: ...; MERGERS AND ACQUISITIONS; ESCAPE THE TECHNICAL BUBBLE; INCIDENT RESPONSE SERVICE PROVIDERS; SUMMARY; PART...

18
by Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents: ...Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands...

19
by Johansen, Gerard
Published 2022
Packt Publishing Ltd.
Table of Contents: ...Cover -- Title Page -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1...

20
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... and C -- sample questions -- Just another day part 2 -- Summary -- Chapter 11: Putting Out the Fires...