1

Social engineering today: psychology, strategies and tricks

Year:
2010
Language:
english
File:
PDF, 230 KB
english, 2010
2

The evolution of payment card fraud

Year:
2014
Language:
english
File:
PDF, 787 KB
english, 2014
3

Cracking passwords

Year:
2010
Language:
english
File:
PDF, 507 KB
english, 2010
4

The rebirth of phreaking

Year:
2011
Language:
english
File:
PDF, 185 KB
english, 2011
5

Black Hat Europe: mobile attack vectors in the spotlight

Year:
2013
Language:
english
File:
PDF, 412 KB
english, 2013
6

Wireless cracking: there's an app for that

Year:
2012
Language:
english
File:
PDF, 1.51 MB
english, 2012
7

Not-so-smart meters?

Year:
2009
Language:
english
File:
PDF, 99 KB
english, 2009
8

Cyberdefence moves to the top of the Council of Europe/NATO agenda

Year:
2008
Language:
english
File:
PDF, 33 KB
english, 2008
9

Causation in Toxic Torts: Burdens of Proof, Standards of Persuasion, and Statistical Evidence

Year:
1986
Language:
english
File:
PDF, 3.35 MB
english, 1986
10

Iris biometrics: a legal invasion of privacy?

Year:
2013
Language:
english
File:
PDF, 1.54 MB
english, 2013
11

Biometrics at the border

Year:
2014
Language:
english
File:
PDF, 2.69 MB
english, 2014
12

Voice biometrics: real-world issues and solutions

Year:
2010
Language:
english
File:
PDF, 133 KB
english, 2010
13

Reviews

Year:
1990
Language:
english
File:
PDF, 870 KB
english, 1990
15

Biometrics in education: integrating with the real world

Year:
2010
Language:
english
File:
PDF, 711 KB
english, 2010
16

Preventing electoral fraud using biometrics

Year:
2012
Language:
english
File:
PDF, 247 KB
english, 2012
17

Electronic countersurveillance strategies

Year:
2013
Language:
english
File:
PDF, 136 KB
english, 2013
18

Israeli immigrants in the United States: The question of community

Year:
1994
Language:
english
File:
PDF, 6.03 MB
english, 1994
19

Securing the National Health Service

Year:
2010
Language:
english
File:
PDF, 256 KB
english, 2010
20

Challenges ahead on the digital forensics and audit trails

Year:
2014
Language:
english
File:
PDF, 1.10 MB
english, 2014
23

IPv6 migration and security

Year:
2011
Language:
english
File:
PDF, 315 KB
english, 2011
24

Understanding the hacker psyche

Year:
2011
Language:
english
File:
PDF, 297 KB
english, 2011
26

Sojourners and Settlers: The Yemeni Immigrant Experienceby Jonathan Friedlander

Year:
1989
Language:
english
File:
PDF, 378 KB
english, 1989
30

Understanding the digital fingerprint

Year:
2013
Language:
english
File:
PDF, 596 KB
english, 2013
31

Border control biometrics and surveillance

Year:
2012
Language:
english
File:
PDF, 319 KB
english, 2012
32

Artificial reality

Year:
2009
Language:
english
File:
PDF, 1.37 MB
english, 2009
33

Healthcare biometrics: solving the staff and patient security governance challenge

Year:
2013
Language:
english
File:
PDF, 1.90 MB
english, 2013
35

Putting money where your mouth is

Year:
2008
Language:
english
File:
PDF, 176 KB
english, 2008
36

FIVE YEARS OLD

Year:
1957
Language:
english
File:
PDF, 181 KB
english, 1957
37

Four means to an end point

Year:
2007
Language:
english
File:
PDF, 178 KB
english, 2007
40

The black art of digital forensics

Year:
2009
Language:
english
File:
PDF, 1.52 MB
english, 2009
41

Symantec admits card data probably leaked from India

Year:
2009
Language:
english
File:
PDF, 40 KB
english, 2009
42

An Aerodynamic Study of a Micro Scale Vertical Axis Wind Turbine

Year:
2013
Language:
english
File:
PDF, 382 KB
english, 2013
45

Enterprise biometric integration under the microscope

Year:
2012
Language:
english
File:
PDF, 340 KB
english, 2012
48

Cracking GSM

Year:
2011
Language:
english
File:
PDF, 273 KB
english, 2011