Computer security fundamentals C Easttom Pearson IT certification, 2019 | 152 | 2019 |
Modern cryptography: applied mathematics for encryption and information security W Easttom Springer Nature, 2022 | 105 | 2022 |
Computer crime, investigation, and the law C Easttom, J Taylor, H Hurley Course Technology, 2011 | 62 | 2011 |
CompTIA Security+ Study Guide: Exam SY0-501 E Dulaney, C Easttom John Wiley & Sons, 2017 | 54 | 2017 |
Security policies and implementation issues R Johnson, C Easttom Jones & Bartlett Learning, 2020 | 34 | 2020 |
System forensics, investigation, and response C Easttom Jones & Bartlett Learning, 2017 | 33 | 2017 |
The NICE cyber security framework I Alsmadi, C Easttom Springer International Publishing, 2020 | 28 | 2020 |
A modified McCumber cube as a basis for a taxonomy of cyber attacks C Easttom, W Butler 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 18 | 2019 |
Quantum computing and cryptography C Easttom Modern Cryptography: Applied Mathematics for Encryption and Information …, 2022 | 17 | 2022 |
An analysis of leading lattice-based asymmetric cryptographic primitives C Easttom 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 17 | 2019 |
Virtual private networks, authentication, and wireless security C Easttom Modern Cryptography: Applied Mathematics for Encryption and Information …, 2022 | 14 | 2022 |
A functional model for unifying brain computer interface terminology C Easttom, L Bianchi, D Valeriani, CS Nam, A Hossaini, D Zapała, ... IEEE Open Journal of Engineering in Medicine and Biology 2, 91-96, 2021 | 14 | 2021 |
Mitigating implanted medical device cybersecurity risks C Easttom, N Mei 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019 | 13 | 2019 |
Network Defense and Countermeasures: Principles and Practices C Easttom Pearson Education, 2013 | 13 | 2013 |
Quantum Computing Fundamentals C Easttom | 12 | 2021 |
Method and apparatus of performing data executable integrity verification WC Easttom US Patent 8,819,827, 2014 | 12 | 2014 |
Computer Crime C Easttom, J Taylor, H Hurley Investigation and the Law, Course Technology, 2011 | 12 | 2011 |
An In-Depth Guide to Mobile Device Forensics C Easttom CRC Press, 2021 | 11 | 2021 |
Network Defense and Countermeasures C Easttom Prentice Hall, 2005 | 11 | 2005 |
Conducting investigations on the Dark Web C Easttom Journal of Information Warfare 17 (4), 26-37, 2018 | 10 | 2018 |