Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: ("elocution" OR "execution")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"364 - Criminology"
product_txtF_mv:"O'Reilly"
Search alternatives
:
"elocution" »
"relocation"
"execution" »
"executive"
Showing
1
-
20
of
37
Search:
'("elocution" OR "execution")'
,
query time: 1.04s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Executive
's guide to cyber risk : securing the future today
by
Moyo, Siegfried
Published 2022
Wiley
“
..."This book offers any senior level
executive
an understanding of the core fundamentals of Cyber...
”
Call Number:
HF5548.37
Read Now
2
Executing
Windows command line investigations : while ensuring evidentiary integrity
by
Hosmer, Chet
Published 2016
Syngress is an imprint of Elsevier
Call Number:
HV8079.C65
Read Now
3
Building a cyber resilient business : a cyber handbook for executives and boards
by
Chelly, Magda Lilia
,
Tan, Shamane
,
Trần, Hải
Published 2023
Packt Publishing
“
...Audience This book is for the C-suite and
executives
who are not necessarily working...
”
Call Number:
HD30.37
Read Now
4
Building a cyber resilient business : a cyber handbook for executives and boards
by
Chelly, Magda Lilia
,
Tan, Shamane
,
Tran, Hai
Published 2022
Packt Publishing Ltd.
“
...With cyberattacks on the rise, it has become essential for C-suite
executives
and board members...
”
Call Number:
HD30.37
Read Now
5
The cybersecurity guide to governance, risk, and compliance
by
Edwards, Jason
,
Weaver, Griffin
Published 2024
John Wiley & Sons, Inc.
Table of Contents:
“
...
Executives
-- Why Business
Executives
Need to be Involved in Cybersecurity -- Roles and Responsibilities...
”
Call Number:
HD30.38
Read Now
6
Blackhatonomics : an inside look at the economics of cybercrime
by
Gragido, Will
Published 2013
Syngress/Elsevier
Table of Contents:
“
... ratio --
Execution
-- From Russia with love -- The China factor -- Pawns and mules -- Globalization...
”
Call Number:
HV6773
Read Now
7
Windows forensic analysis DVD toolkit 2E
by
Carvey, Harlan A.
Published 2009
Syngress Pub.
Table of Contents:
“
... analysis -- Registry analysis -- File analysis --
Executable
file analysis -- Rootkits and rootkit...
”
Call Number:
HV8079.C65
Read Now
8
Cyber threat! : how to manage the growing risk of cyber attacks
by
Ulsch, N. MacDonnell
Published 2014
Wiley
Table of Contents:
“
...
Executive
Management Must Take to Reduce Cyber Risk -- Managing the Brand When the Worst Occurs -- Managing...
”
Call Number:
HD30.2
Read Now
9
Cybercrime and espionage : an analysis of subversive multi-vector threats
by
Gragido, Will
Published 2011
Syngress
“
... in the
execution
of advanced attacks, their success from the perspective of exploitation and their presence within...
”
Call Number:
HV8290
Read Now
10
Penetration testing essentials
by
Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents:
“
...
Executing
an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9...
”
Call Number:
QA76.9.A25
Read Now
11
Mobile forensic investigations : a guide to evidence collection, analysis, and presentation
by
Reiber, Lee
Published 2019
McGraw-Hill Education
Table of Contents:
“
... SOP Creation and
Execution
-- Creation of a Workflow -- Specialty Mobile Forensic Units -- Forensic...
”
Call Number:
HV8079.C65
Read Now
12
Ransomware : defending against digital extortion
by
Liska, Allan
,
Gallo, Timothy
Published 2016
O'Reilly Media
Table of Contents:
“
...Don't Allow JavaScript Files to
Execute
LocallyStop the Initial Callout; Reverse-Engineering...
”
Call Number:
QA76.76.C68
Read Now
13
Mobile forensic investigations : a guide to evidence collection, analysis, and presentation
by
Reiber, Lee
Published 2016
McGraw-Hill Education
Table of Contents:
“
... SOP Creation and
Execution
-- Creation of a Workflow -- Specialty Mobile Forensic Units -- Forensic...
”
Call Number:
HV8079.C65
Read Now
14
Applying artificial intelligence in cyber security analytics and cyber threat detection
Published 2024
John Wiley & Sons, Inc.
Table of Contents:
“
.... Analysis of Malicious
executables
and detection techniques. Detection and Analysis of Botnet Attacks Using...
”
Call Number:
QA76.9.A25
Read Now
15
Targeted cyber attacks : multi-staged attacks driven by exploits and malware
by
Sood, Aditya K.
Published 2014
Syngress
Table of Contents:
“
... Scripting: Command
Execution
and Scheduling; 6.2.4 USB Spreading; References; 7 Why Targeted Cyber Attacks...
”
Call Number:
TK5105.59
Read Now
16
Cybersecurity : managing systems, conducting testing, and investigating intrusions
by
Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents:
“
...:
Executive
Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware...
”
Call Number:
TK5105.59
Read Now
17
Handbook of anti-money laundering
by
Cox, Dennis W.
Published 2014
Wiley
Table of Contents:
“
... Cards; 7.3.2 Electronic Money; 7.3.3 Wealth Management; 7.3.4 General Insurers; 7.3.5
Execution
-only...
”
Call Number:
K1089
Read Now
18
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
by
Carvey, Harlan A.
Published 2014
Syngress
Table of Contents:
“
...; Introduction; Goals; Incident triage; Case Notes; Documenting your analysis; Reporting; Format;
Executive
...
”
Call Number:
HV8079.C65
Read Now
19
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by
Cappelli, Dawn
Published 2012
Addison-Wesley
“
... culture. Most important, it offers actionable recommendations for the entire organization, from
executive
...
”
Call Number:
HV6773
Read Now
20
Dissecting the hack : the f0rb1dd3n network
by
Street, Jayson E.
Published 2010
Syngress/Elsevier
“
... is completely NEW. Read more about the tactics that you see
executed
throughout the story in the second half...
”
Call Number:
HV8079.C65
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 364 - Criminology
Clear Filter
Collection: O'Reilly
Year of Publication
From:
To:
Classification
364 - Criminology
331 - Labor economics
23
658 - General management
12
005 - Computer programming, programs & data
10
330 - Economics
9
500 - Natural sciences & mathematics
9
more ...
338 - Production
8
363 - Other social problems & services
7
000 - Computer science, information & general works
2
006 - Special computer methods
2
368 - Insurance
2
384 - Communications; telecommunication
2
001 - Knowledge
1
300 - Social sciences
1
352 - General considerations of public administration
1
381 - Commerce
1
see all ...
less ...
Language
English
37
Collection
O'Reilly
Author
Tan, Shamane
3
Carvey, Harlan A.
2
Chelly, Magda Lilia
2
Gragido, Will
2
Reiber, Lee
2
Antonucci, Domenic
1
more ...
Bartolomie, Joshua
1
Bhagavatula, Ramya Sai
1
Bingley, Richard
1
Bryce, Chapin
1
Butler, William
1
Cappelli, Dawn
1
Casey, Eoghan
1
Chaput, Bob
1
Cox, Dennis W.
1
Davidoff, Sherri
1
Dietrich, Sven
1
Dittrich, David
1
Easttom, Chuck
1
Edwards, Jason
1
Enbody, Richard J.
1
Estrela, Vania Vieira
1
Evans, Ariel
1
Gallo, Timothy
1
Guerra, Peter
1
Hosmer, Chet
1
Howard, Richard
1
James, Lance
1
Khurana, Mehak
1
Laykin, Erik
1
Liska, Allan
1
Lohrmann, Daniel J.
1
Mahajan, Shilpa
1
Miller, Preston
1
Mirkovic, Jelena
1
Moore, Andrew
1
Mowbray, Thomas J.
1
Moyo, Siegfried
1
Oriyano, Sean-Philip
1
Pelli, Rosanne
1
Phelan, Jessica
1
Pirc, John
1
Shema, Mike
1
Shimonski, Robert
1
Sood, Aditya K.
1
Street, Jayson E.
1
Suits and spooks conference (2015, New York, N.Y.)
1
Tamburello, Paul
1
Tran, Hai
1
Troia, Vinny
1
Trzeciak, Randall
1
Trần, Hải
1
Ulsch, N. MacDonnell
1
Weaver, Griffin
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=product_txtF_mv%3A%22O%27Reilly%22&lookfor=%28%22elocution%22+OR+%22execution%22%29&type=AllFields
Send by Email
×
Loading...