Incoming Resources
- Online predators and privacy, Eric Minton
- Commodification of cyber capabilities, a grand cyber arms bazaar
- Smart cities of today and tomorrow, better technology, infrastructure and security, Joseph N. Pelton, Indu B. Singh
- Tracers in the dark, the global hunt for the crime lords of cryptocurrency, Andy Greenberg
- Tracers in the Dark, The Global Hunt for the Crime Lords of Cryptocurrency
- Sex, tech, and faith, ethics for a digital age
- The internet police, how crime went online, and the cops followed, Nate Anderson
- Cyberwarfare, Megan Manzano, book editor
- Music piracy and crime theory, Sameer Hinduja
- Hot seat, Lionsgate, Grindstone Entertainment Group, 5 Star Films present ; a 5 Star Films production ; in association with Bondit Media Capital, Verdi Productions, SSS Entertainment, Head Gear Films and Metrol Technology, Arcana Studio, Inc. ; produced by Randall Emmett, George Furla, Ceasar Richbow, Shaun Sanghani, Chad A. Verdi ; written by Collin Watts & Leon Langford ; directed by James Cullen Bressack
- Cyber attacks, the best defense is a good offense
- Thinking about cybersecurity, from cyber crime to cyber warfare
- ICANN generic top-level domains (gTLD), hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 4, 2011
- Terrorist capabilities for cyberattack, overview and policy issues, John Rollins, Clay Wilson
- Cyber Crisis Management, Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation, Holger Kaschner
- Inside cyber warfare, Jeffrey Carr
- Kingdom of lies, unnerving adventures in the world of cybercrime, Kate Fazzini
- Tools and weapons, the promise and the peril of the digital age, Brad Smith, Carol Ann Browne
- The truth about avoiding scams, Steve Weisman
- Darkest web, Eileen Ormsby
- Cyber crisis, protecting your business from real threats in the virtual world, Eric Cole
- Cyberphobia, identity, trust, security and the Internet, Edward Lucas
- Thinking about cybersecurity, from cyber crime to cyber warfare, Paul Rosenzweig
- Identity theft
- Anyone you want me to be, a true story of sex and death on the Internet, John Douglas and Stephen Singular
- When gadgets betray us, the dark side of our infatuation with new technologies, Robert Vamosi
- Click here to kill everybody, security and survival in a hyper-connected world, Bruce Schneier
- Misbehavior in Cyber Places, the Regulation of Online Conduct in Virtual Communities on the Internet
- Industry of anonymity, inside the business of cybercrime, Jonathan Lusthaus
- Cyber attacks and security breaches, coping with external threats
- Homeland threat assessment
- Online killers, portraits of murderers, cannibals and sex predators who stalked the web for their victims, Christopher Barry-Dee and Steven Morris
- Cyber crime and warfare, Peter Warren and Michael Streeter
- Cybercriminals, Wil Mara
- Zero day:, the threat in cyberspace
- Cyberwarfare threat, do hackers pose a danger to national security?, by Patrick Marshall
- Cyberwarfare and cyberterrorism, in brief, Catherine A. Theohary, John W. Rollins
- Preparing for a cyber incident, United States Secret Service, Cybercrime Investigations
- Délinquance et innovation, sous la direction de David Décary-Hétu et Maxime Bérubé
- Cybersecurity attacks, Red Team strategies : a practical guide to building a penetration testing program having homefield advantage, Johann Rehberger
- Cyberterrorism, Erica Grove, book editor
- This machine kills secrets, how WikiLeakers, cypherpunks, and hacktivists aim to free the world's information, Andy Greenberg
- Vapor, a true story of how I fell victim to catfishing., Debra Danielsen
- Hate crimes in cyberspace, Danielle Keats Citron
- Cybersecurity, are U.S. military and civilian computer systems safe?, [by Patrick Marshall]
- Breaking and entering, the extraordinary story of a hacker called "Alien", Jeremy N. Smith
- Cyberbullying, causes, consequences, and coping strategies, Nicole L. Weber and William V. Pelfrey, Jr
- Worm, the first digital world war, Mark Bowden
- Teen cyberbullying investigated, where do your rights end and consequences begin?, by Tom Jacobs
- Cyber terror and cyber risk, what you need to know