Torthaí cuardaigh - "Computer crimes Prevention"
-
21
-
22
The cybercriminal how to protect yourself against the most dangerous criminal in our perilous society
Foilsithe / Cruthaithe 2018LEABHAR -
23
Future crimes everything is connected, everyone is vulnerable, and what we can do about it
Foilsithe / Cruthaithe 2015LEABHAR -
24
-
25
The Basics of hacking and penetration testing ethical hacking and penetration testing made easy
Foilsithe / Cruthaithe 2013Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
26
Ninja hacking unconventional penetration testing tactics and techniques
Foilsithe / Cruthaithe 2011Available for University of the Philippines System via ScienceDirect. Click here to access
Also available remotely for University of the Philippines System via ScienceDirect. Click here to access thru EZproxy
Electronic Resource -
27
Cybercrime and espionage an analysis of subversive multivector threats
Foilsithe / Cruthaithe 2011LEABHAR -
28
-
29
The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime
Foilsithe / Cruthaithe 2022LEABHAR -
30
Cybercrime and espionage an analysis of subversive multivector threats
Foilsithe / Cruthaithe 2011LEABHAR


