Top 5 cyber crimes of 2014
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
BSIDES DETROIT 2015: Data breaches cost of doing business
2015-year-ahead-in-cyber-security-150113122914-conversion-gate02
report
The Phishing Guide--Understanding & Preventing Phishing Attacks--(IBM Internet Security Systems)
Trends in Security Intelligence Jonathan Fraleigh
Enterprise Network Security Accessing the WAN – Chapter 4.
CS5261 Information Security CS 526 Topic 1 Overview of the Course Topic 1.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risks from Information Systems Building Effective Information Security Programs Data Management.
2015 GLOBAL CYBERSECURITY STATUS REPORT. 2015 Global Cybersecurity Status Report Companies and government organizations worldwide are focusing on cybersecurity.
The Phishing Guide