Information warfare
I tiakina i:
Kaituhi matua: | Ventre, Daniel |
---|---|
Kaituhi rangatōpū: | ebrary, Inc |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi Wīwī |
I whakaputaina: |
London : Hoboken, N.J. :
ISTE Ltd. ; John Wiley & Sons,
c2009.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
- Ngā puringa
- Whakaahuatanga
- Rārangi ihirangi
- Ngā Tākupu
- Ētahi Atu Putanga (1)
- Ngā tūemi rite
- Tirohanga kaimahi
Ngā tūemi rite
Information warfare /
mā: Ventre, Daniel
I whakaputaina: (2016)
mā: Ventre, Daniel
I whakaputaina: (2016)
Advances in artificial intelligence for privacy protection and security
I whakaputaina: (2010)
I whakaputaina: (2010)
Information security a manager's guide to thwarting data thieves and hackers /
mā: Alexander, Philip, 1963-
I whakaputaina: (2008)
mā: Alexander, Philip, 1963-
I whakaputaina: (2008)
Enterprise information security and privacy
I whakaputaina: (2009)
I whakaputaina: (2009)
Information security governance simplified from the boardroom to the keyboard /
mā: Fitzgerald, Todd
I whakaputaina: (2012)
mā: Fitzgerald, Todd
I whakaputaina: (2012)
Sticky fingers managing the global risk of economic espionage /
mā: Fink, Steven
I whakaputaina: (2002)
mā: Fink, Steven
I whakaputaina: (2002)
The definitive guide to the C&A transformation the first publication of a comprehensive view of the C&A transformation /
mā: Mehan, Julie E.
I whakaputaina: (2009)
mā: Mehan, Julie E.
I whakaputaina: (2009)
Total information risk management : maximizing the value of data and information assets /
mā: Borek, Alexander
I whakaputaina: (2014)
mā: Borek, Alexander
I whakaputaina: (2014)
Introduction to cyber-warfare a multidisciplinary approach /
mā: Shakarian, Paulo
I whakaputaina: (2013)
mā: Shakarian, Paulo
I whakaputaina: (2013)
Business intelligence the savvy manager's guide, getting onboard with emerging IT /
mā: Loshin, David, 1963-
I whakaputaina: (2003)
mā: Loshin, David, 1963-
I whakaputaina: (2003)
Business intelligence the savvy manager's guide /
mā: Loshin, David, 1963-
I whakaputaina: (2012)
mā: Loshin, David, 1963-
I whakaputaina: (2012)
Big data, big analytics emerging business intelligence and analytic trends for today's businesses /
mā: Minelli, Michael, 1974-
I whakaputaina: (2013)
mā: Minelli, Michael, 1974-
I whakaputaina: (2013)
Competitive intelligence 2.0 organization, innovation and territory /
I whakaputaina: (2011)
I whakaputaina: (2011)
Business intelligence evaluation and impact on performance /
mā: Cohen, Corine
I whakaputaina: (2009)
mā: Cohen, Corine
I whakaputaina: (2009)
Norway information security.
I whakaputaina: (2006)
I whakaputaina: (2006)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
mā: Winterfeld, Steve
I whakaputaina: (2013)
mā: Winterfeld, Steve
I whakaputaina: (2013)
Security and control in information systems a guide for business and accounting /
mā: Hawker, Andrew
I whakaputaina: (2000)
mā: Hawker, Andrew
I whakaputaina: (2000)
Business continuity and disaster recovery planning for IT professionals /
mā: Snedaker, Susan
I whakaputaina: (2014)
mā: Snedaker, Susan
I whakaputaina: (2014)
Information security for management
mā: Iyengar, Venugopal
I whakaputaina: (2010)
mā: Iyengar, Venugopal
I whakaputaina: (2010)
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
mā: McIlwraith, Angus
I whakaputaina: (2006)
mā: McIlwraith, Angus
I whakaputaina: (2006)
Governance and internal controls for cutting edge IT /
mā: Worstell, Karen F.
I whakaputaina: (2013)
mā: Worstell, Karen F.
I whakaputaina: (2013)
Information security management principles
mā: Alexander, David
I whakaputaina: (2013)
mā: Alexander, David
I whakaputaina: (2013)
Economic intelligence & national security
I whakaputaina: (1998)
I whakaputaina: (1998)
Dictionary of information security
mā: Slade, Robert
I whakaputaina: (2006)
mā: Slade, Robert
I whakaputaina: (2006)
A practical guide to managing information security
mā: Purser, Steve
I whakaputaina: (2004)
mā: Purser, Steve
I whakaputaina: (2004)
Managing the human factor in information security how to win over staff and influence business managers /
mā: Lacey, David
I whakaputaina: (2009)
mā: Lacey, David
I whakaputaina: (2009)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
mā: Canavan, Tom
I whakaputaina: (2011)
mā: Canavan, Tom
I whakaputaina: (2011)
Cyber conflict competing national perspectives /
mā: Ventre, Daniel
I whakaputaina: (2012)
mā: Ventre, Daniel
I whakaputaina: (2012)
The insider threat combatting the enemy within /
mā: Blackwell, Clive
I whakaputaina: (2009)
mā: Blackwell, Clive
I whakaputaina: (2009)
Information assurance for the entrerprise : a roadmap to information security /
mā: Schou, Corey
I whakaputaina: (2007)
mā: Schou, Corey
I whakaputaina: (2007)
Information assurance for the enterprise : a roadmap to information security /
mā: Schou, Corey
I whakaputaina: (2007)
mā: Schou, Corey
I whakaputaina: (2007)
Information security policy, processes, and practices /
I whakaputaina: (2008)
I whakaputaina: (2008)
Data privacy in the information age
mā: Klosek, Jacqueline, 1972-
I whakaputaina: (2000)
mā: Klosek, Jacqueline, 1972-
I whakaputaina: (2000)
Information assurance and computer security
I whakaputaina: (2006)
I whakaputaina: (2006)
The death of the Internet
I whakaputaina: (2012)
I whakaputaina: (2012)
Supply chain security international practices and innovations in moving goods safely and efficiently /
I whakaputaina: (2010)
I whakaputaina: (2010)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
mā: Calder, Alan, 1957-
I whakaputaina: (2005)
mā: Calder, Alan, 1957-
I whakaputaina: (2005)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
I whakaputaina: (2015)
I whakaputaina: (2015)
The Future of Identity in the Information Society
mā: Rannenberg, Kai
I whakaputaina: (2009)
mā: Rannenberg, Kai
I whakaputaina: (2009)
IBM Cognos 8 planning a practical guide to developing and deploying planning models for your enterprise /
mā: Riaz, Ned
I whakaputaina: (2009)
mā: Riaz, Ned
I whakaputaina: (2009)
Ngā tūemi rite
-
Information warfare /
mā: Ventre, Daniel
I whakaputaina: (2016) -
Advances in artificial intelligence for privacy protection and security
I whakaputaina: (2010) -
Information security a manager's guide to thwarting data thieves and hackers /
mā: Alexander, Philip, 1963-
I whakaputaina: (2008) -
Enterprise information security and privacy
I whakaputaina: (2009) -
Information security governance simplified from the boardroom to the keyboard /
mā: Fitzgerald, Todd
I whakaputaina: (2012)