Warning: file_put_contents(cache/omni_d71981fb1e2180959d64ba1238df9968.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
UNMANNED AERIAL SYSTEM CYBERSECURITY RISK MANAGEMENT DECISION MATRIX FOR TACTICAL OPERATORS
The Department of Defense (DoD) does not have a defined cybersecurity operational risk management process for unmanned aerial systems (UASs). The DoD acknowledged this discrepancy and suspended all co...
View Book →Michael Daniel, Former Special Assistant to the President and Cybersecurity Coordinator for Presiden
Available on Internet Archive....
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →ERIC ED580862: Invest to Improve: The Cybersecurity Talent Deficit
"Invest to Improve: The Cybersecurity Talent Deficit" provides recommendations for cybersecurity stakeholders--employers, government agencies, and higher education institutions--to enable regional par...
View Book →
A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers
The National Cybersecurity Center of Excellence (NCCoE) (in the United States) has published on October 19, 2015, a white paper on "privacy-enhanced identity brokers." We present here a reply to their...
View Book →
IronNet Cybersecurity, Inc.
This item represents a case in PACER, the U.S. Government's website for federal case data. If you wish to see the entire case, please consult PACER directly....
View Book →
Cybersecurity Essentials
First published in 2018...
View Book →
Cybersecurity for Dummies
First published in 2019...
View Book →DQS SUCCESS True Heavy Redacted
This document serves as a case study and public record demonstrating the efficacy of the Disqualifier Sniper (DQS) framework, a proprietary, semi-automated methodology for auditing the behavioral inte...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →Matthew G. Olsen, President, IronNet Cybersecurity, Statement for the Record for the House Committee
Available on Internet Archive....
View Book →NASA Technical Reports Server (NTRS) 20150023587: Applying a Space-Based Security Recovery Scheme fo
Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communicatio...
View Book →Computer Viruses For Dummies
Explains what computer viruses and malware are. Covers how systems get infected. Teaches prevention and protection methods. Explains antivirus tools. Covers phishing and scam awareness. Focuses on saf...
View Book →Christopher Krebs, Director, Cybersecurity and Infrastructure Security Agency, Department of Homelan
Available on Internet Archive....
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →Cybersecurity a Detail Insight into Indian Small Businesses
This study examines the vital significance of cybersecurity for Indian small businesses. Small enterprises are essential to the growth of Indias economy as it embraces Industry 4.0 and develops its di...
View Book →
Counterterrorism and Cybersecurity
First published in 2013...
View Book →DTIC AD1044987: Improving Federal Cybersecurity Governance Through Data-Driven Decision Making and E
Although efforts are underway through Information Security Continuous Monitoring initiatives to improve situational awareness and risk mitigation at the operational level, the federal government must ...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →Professionalizing the nation's cybersecurity workforce? : criteria for decision-making
xiv, 51 pages ; 24 cm...
View Book →OPC-MCR - TOR Deanonymise (2011)
Digital forensics research collection...
View Book →
Cybersecurity
First published in 1900...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →Feb. 2017 House CAO 'Urgent' Cybersecurity Memo
Available on Internet Archive....
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →Of groundhogs, criminals and hackers
An article by Jim Carroll for CA Magazine (Canadain Chartered Accountants) (Now Pivot Magazine). Jim Carroll discusses the necessity of proactive defense mechanisms in both law enforcement and financi...
View Book →DETECT ANOMALIES AND STRENGTHEN CYBERSECURITY IN IOT NETWORKS USING HIGH-LEVEL DEEP LEARNING TECHNIQ
Specifically, we have worked on applying advanced deep learning techniques to improve cybersecurity in IoT networks and efficiently identify anomalies. First, we collect and prepare the data from the ...
View Book →Deepseek The Non Chinese Eight Ball That Always Supports Israel
This presentation demonstrates that DeepSeek AI is not an independent Chinese AI, but rather a dual-purpose intelligence asset deeply intertwined with Western and Israeli surveillance ecosystems. Thro...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →User Behaviors Influence On Cybersecurity Strategy Effectiveness
Most of past research in the area of information systems’ security has primarily focused on the technical dimension without paying attention to the human factors. The traditional conception of ...
View Book →Cybersecurity : the Beginner's Guide
First published in 2019...
View Book →cybersecurity act final adoption pr 10042019 cbd3
Available on Internet Archive....
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →Cybersecurity I - Master Series
First published in 2020...
View Book →