Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Subjectivity"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"364 - Criminology"
dewey-ones:"338 - Production"
Search alternatives
:
subjectivity »
subjective
Showing
1
-
20
of
21
Search:
'"Subjectivity"'
,
query time: 0.02s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
The cybersecurity guide to governance, risk, and compliance
by
Edwards, Jason
,
Weaver, Griffin
Published 2024
John Wiley & Sons, Inc.
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HD30.38
Read Now
2
Ransomware protection playbook
by
Grimes, Roger A.
Published 2022
Wiley
Subjects:
“
...Computer fraud / http://id.loc.gov/authorities/
subjects
/sh2011000733...
”
Call Number:
QA76.76.C68
Read Now
3
Cybersecurity attacks : Red Team strategies : a practical guide to building a penetration testing program having homefield advantage
by
Rehberger, Johann
Published 2020
Packt Publishing
Subjects:
“
...Computer networks / Security measures / http://id.loc.gov/authorities/
subjects
/sh94001277...
”
Call Number:
QA76.9.A25
Read Now
4
A comprehensive look at fraud identification and prevention
by
Youngblood, James
Published 2015
CRC Press
Subjects:
“
...Fraud / http://id.loc.gov/authorities/
subjects
/sh85051619...
”
Call Number:
HV6691
Read Now
5
Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business
by
Laykin, Erik
Published 2013
John Wiley
Subjects:
“
...Fraud investigation / http://id.loc.gov/authorities/
subjects
/sh85051626...
”
Call Number:
HV8079.C65
Read Now
6
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations
by
Liska, Allan
Published 2018
O'Reilly Media
Subjects:
“
...Computer networks / Security measures / http://id.loc.gov/authorities/
subjects
/sh94001277...
”
Call Number:
HV6773
Read Now
7
Cyber forensics : from data to digital evidence
by
Marcella, Albert J.
Published 2012
Wiley
Subjects:
“
...Electronic evidence / http://id.loc.gov/authorities/
subjects
/sh2008008558...
”
Call Number:
HV8073.5
Read Now
8
Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by
Datt, Samir
Published 2016
Packt Publishing
Subjects:
“
...Computer networks / Security measures / http://id.loc.gov/authorities/
subjects
/sh94001277...
”
Call Number:
TK5105.59
Read Now
9
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
by
Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HD30.38
Read Now
10
Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools
by
Jaswal, Nipun
Published 2019
Packt Publishing
Subjects:
“
...Computer networks / Security measures / http://id.loc.gov/authorities/
subjects
/sh94001277...
”
Call Number:
TK5105.59
Read Now
11
Applying artificial intelligence in cyber security analytics and cyber threat detection
Published 2024
John Wiley & Sons, Inc.
Subjects:
“
...Computer networks / Security measures / http://id.loc.gov/authorities/
subjects
/sh94001277...
”
Call Number:
QA76.9.A25
Read Now
12
Labour migration, human trafficking and multinational corporations : the commodification of illicit flows
by
Quayson, Ato
Published 2012
Routledge
Subjects:
“
...Foreign workers / http://id.loc.gov/authorities/
subjects
/sh85003502...
”
Call Number:
HD6300
Read Now
13
Cybervetting : internet searches for vetting, investigations, and open-source intelligence
by
Appel, Edward J.
Published 2015
CRC Press
Subjects:
“
...Internet searching / http://id.loc.gov/authorities/
subjects
/sh98006428...
”
Call Number:
HF5549.5.E429
Read Now
14
Building a cyber resilient business : a cyber handbook for executives and boards
by
Chelly, Magda Lilia
,
Tan, Shamane
,
Tran, Hai
Published 2022
Packt Publishing Ltd.
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HD30.37
Read Now
15
Building a cyber resilient business : a cyber handbook for executives and boards
by
Chelly, Magda Lilia
,
Tan, Shamane
,
Trần, Hải
Published 2023
Packt Publishing
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HD30.37
Read Now
16
People-centric security : transforming your enterprise security culture
by
Hayden, Lance
Published 2016
McGraw-Hill Education
Subjects:
“
...Corporate culture / http://id.loc.gov/authorities/
subjects
/sh85032896...
”
Call Number:
HD30.2
Read Now
17
Cyber threat! : how to manage the growing risk of cyber attacks
by
Ulsch, N. MacDonnell
Published 2014
Wiley
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HD30.2
Read Now
18
Enterprise cybersecurity in digital business : building a cyber resilient organization
by
Evans, Ariel
Published 2022
Routledge
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HD30.37
Read Now
19
Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence
by
Furneaux, Nick
Published 2018
Wiley
Subjects:
“
...Computer crimes / Investigation / http://id.loc.gov/authorities/
subjects
/sh85029493...
”
Call Number:
HV8079.C65
Read Now
20
Network attacks and exploitation : a framework
by
Monte, Matthew
Published 2015
Wiley
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
HF5548.37
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 364 - Criminology
Clear Filter
Classification: 338 - Production
Year of Publication
From:
To:
Classification
338 - Production
364 - Criminology
330 - Economics
17
331 - Labor economics
16
658 - General management
13
005 - Computer programming, programs & data
6
more ...
500 - Natural sciences & mathematics
6
363 - Other social problems & services
3
300 - Social sciences
2
302 - Social interaction
2
000 - Computer science, information & general works
1
001 - Knowledge
1
006 - Special computer methods
1
332 - Financial economics
1
368 - Insurance
1
381 - Commerce
1
670 - Manufacturing
1
see all ...
less ...
Language
English
21
Collection
O'Reilly
21
Author
Chelly, Magda Lilia
2
Tan, Shamane
2
Antonucci, Domenic
1
Appel, Edward J.
1
Arhin, Antonela
1
Datt, Samir
1
more ...
Edwards, Jason
1
Estrela, Vania Vieira
1
Evans, Ariel
1
Furneaux, Nick
1
Grimes, Roger A.
1
Guillossou, Frederic
1
Hayden, Lance
1
Jaswal, Nipun
1
Khurana, Mehak
1
Knottenbelt, William J.
1
Krausz, Michael
1
Laykin, Erik
1
Liska, Allan
1
Mahajan, Shilpa
1
Marcella, Albert J.
1
Monte, Matthew
1
Quayson, Ato
1
Rehberger, Johann
1
Tran, Hai
1
Trần, Hải
1
Ulsch, N. MacDonnell
1
Walker, John
1
Weaver, Griffin
1
Youngblood, James
1
see all ...
less ...
Recently Uploaded
Last Month
2
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=dewey-ones%3A%22338+-+Production%22&lookfor=%22Subjectivity%22&type=Subject
Send by Email
×
Loading...