Information warfare
Sábháilte in:
Príomhchruthaitheoir: | Ventre, Daniel |
---|---|
Údar corparáideach: | ebrary, Inc |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla Fraincis |
Foilsithe / Cruthaithe: |
London : Hoboken, N.J. :
ISTE Ltd. ; John Wiley & Sons,
c2009.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Information warfare /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2016)
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2016)
Advances in artificial intelligence for privacy protection and security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Information security a manager's guide to thwarting data thieves and hackers /
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008)
Enterprise information security and privacy
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Information security governance simplified from the boardroom to the keyboard /
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)
Sticky fingers managing the global risk of economic espionage /
de réir: Fink, Steven
Foilsithe / Cruthaithe: (2002)
de réir: Fink, Steven
Foilsithe / Cruthaithe: (2002)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
de réir: Mehan, Julie E.
Foilsithe / Cruthaithe: (2009)
de réir: Mehan, Julie E.
Foilsithe / Cruthaithe: (2009)
Total information risk management : maximizing the value of data and information assets /
de réir: Borek, Alexander
Foilsithe / Cruthaithe: (2014)
de réir: Borek, Alexander
Foilsithe / Cruthaithe: (2014)
Introduction to cyber-warfare a multidisciplinary approach /
de réir: Shakarian, Paulo
Foilsithe / Cruthaithe: (2013)
de réir: Shakarian, Paulo
Foilsithe / Cruthaithe: (2013)
Business intelligence the savvy manager's guide, getting onboard with emerging IT /
de réir: Loshin, David, 1963-
Foilsithe / Cruthaithe: (2003)
de réir: Loshin, David, 1963-
Foilsithe / Cruthaithe: (2003)
Business intelligence the savvy manager's guide /
de réir: Loshin, David, 1963-
Foilsithe / Cruthaithe: (2012)
de réir: Loshin, David, 1963-
Foilsithe / Cruthaithe: (2012)
Big data, big analytics emerging business intelligence and analytic trends for today's businesses /
de réir: Minelli, Michael, 1974-
Foilsithe / Cruthaithe: (2013)
de réir: Minelli, Michael, 1974-
Foilsithe / Cruthaithe: (2013)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
Competitive intelligence 2.0 organization, innovation and territory /
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Norway information security.
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Business intelligence evaluation and impact on performance /
de réir: Cohen, Corine
Foilsithe / Cruthaithe: (2009)
de réir: Cohen, Corine
Foilsithe / Cruthaithe: (2009)
Security and control in information systems a guide for business and accounting /
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000)
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000)
Business continuity and disaster recovery planning for IT professionals /
de réir: Snedaker, Susan
Foilsithe / Cruthaithe: (2014)
de réir: Snedaker, Susan
Foilsithe / Cruthaithe: (2014)
Information security for management
de réir: Iyengar, Venugopal
Foilsithe / Cruthaithe: (2010)
de réir: Iyengar, Venugopal
Foilsithe / Cruthaithe: (2010)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
de réir: McIlwraith, Angus
Foilsithe / Cruthaithe: (2006)
de réir: McIlwraith, Angus
Foilsithe / Cruthaithe: (2006)
Governance and internal controls for cutting edge IT /
de réir: Worstell, Karen F.
Foilsithe / Cruthaithe: (2013)
de réir: Worstell, Karen F.
Foilsithe / Cruthaithe: (2013)
Information security management principles
de réir: Alexander, David
Foilsithe / Cruthaithe: (2013)
de réir: Alexander, David
Foilsithe / Cruthaithe: (2013)
Economic intelligence & national security
Foilsithe / Cruthaithe: (1998)
Foilsithe / Cruthaithe: (1998)
Dictionary of information security
de réir: Slade, Robert
Foilsithe / Cruthaithe: (2006)
de réir: Slade, Robert
Foilsithe / Cruthaithe: (2006)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
de réir: Canavan, Tom
Foilsithe / Cruthaithe: (2011)
de réir: Canavan, Tom
Foilsithe / Cruthaithe: (2011)
Managing the human factor in information security how to win over staff and influence business managers /
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)
A practical guide to managing information security
de réir: Purser, Steve
Foilsithe / Cruthaithe: (2004)
de réir: Purser, Steve
Foilsithe / Cruthaithe: (2004)
Cyber conflict competing national perspectives /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
The insider threat combatting the enemy within /
de réir: Blackwell, Clive
Foilsithe / Cruthaithe: (2009)
de réir: Blackwell, Clive
Foilsithe / Cruthaithe: (2009)
Information assurance for the enterprise : a roadmap to information security /
de réir: Schou, Corey
Foilsithe / Cruthaithe: (2007)
de réir: Schou, Corey
Foilsithe / Cruthaithe: (2007)
Information assurance for the entrerprise : a roadmap to information security /
de réir: Schou, Corey
Foilsithe / Cruthaithe: (2007)
de réir: Schou, Corey
Foilsithe / Cruthaithe: (2007)
Information security policy, processes, and practices /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
The death of the Internet
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Information assurance and computer security
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Data privacy in the information age
de réir: Klosek, Jacqueline, 1972-
Foilsithe / Cruthaithe: (2000)
de réir: Klosek, Jacqueline, 1972-
Foilsithe / Cruthaithe: (2000)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
de réir: Calder, Alan, 1957-
Foilsithe / Cruthaithe: (2005)
de réir: Calder, Alan, 1957-
Foilsithe / Cruthaithe: (2005)
Supply chain security international practices and innovations in moving goods safely and efficiently /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
The Future of Identity in the Information Society
de réir: Rannenberg, Kai
Foilsithe / Cruthaithe: (2009)
de réir: Rannenberg, Kai
Foilsithe / Cruthaithe: (2009)
IBM Cognos 8 planning a practical guide to developing and deploying planning models for your enterprise /
de réir: Riaz, Ned
Foilsithe / Cruthaithe: (2009)
de réir: Riaz, Ned
Foilsithe / Cruthaithe: (2009)
Míreanna comhchosúla
-
Information warfare /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2016) -
Advances in artificial intelligence for privacy protection and security
Foilsithe / Cruthaithe: (2010) -
Information security a manager's guide to thwarting data thieves and hackers /
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008) -
Enterprise information security and privacy
Foilsithe / Cruthaithe: (2009) -
Information security governance simplified from the boardroom to the keyboard /
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)