Critical infrastructure protection /
I tiakina i:
Hōputu: | Tāhiko īPukapuka |
---|---|
Reo: | Ingarihi |
I whakaputaina: |
Amsterdam :
IOS Press,
[2014]
|
Rangatū: | NATO science for peace and security series. Human and societal dynamics ;
volume 116. |
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
How to measure anything in cybersecurity risk /
mā: Hubbard, Douglas W., 1962-, me ētahi atu.
I whakaputaina: (2016)
mā: Hubbard, Douglas W., 1962-, me ētahi atu.
I whakaputaina: (2016)
The defendeŕs dilemma : charting a course toward cybersecurity /
mā: Libicki, Martin C., me ētahi atu.
I whakaputaina: (2015)
mā: Libicki, Martin C., me ētahi atu.
I whakaputaina: (2015)
Cyber blockades /
mā: Russell, Alison Lawlor
I whakaputaina: (2014)
mā: Russell, Alison Lawlor
I whakaputaina: (2014)
The dark sides of the Internet : on cyber threats and information warfare /
mā: Heickerö, Roland
I whakaputaina: (2013)
mā: Heickerö, Roland
I whakaputaina: (2013)
Cyber risks for business professionals a management guide /
mā: Kendrick, Rupert
I whakaputaina: (2010)
mā: Kendrick, Rupert
I whakaputaina: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
mā: Mehan, Julie E.
I whakaputaina: (2008)
mā: Mehan, Julie E.
I whakaputaina: (2008)
Cyber security and IT infrastructure protection /
I whakaputaina: (2014)
I whakaputaina: (2014)
Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy /
I whakaputaina: (2010)
I whakaputaina: (2010)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
I whakaputaina: (2015)
I whakaputaina: (2015)
Biohackers the politics of open science /
mā: Delfanti, Alessandro
I whakaputaina: (2013)
mā: Delfanti, Alessandro
I whakaputaina: (2013)
Computational models of risks to infrastructure
I whakaputaina: (2007)
I whakaputaina: (2007)
Responses to cyber terrorism
I whakaputaina: (2008)
I whakaputaina: (2008)
Networks and netwars the future of terror, crime, and militancy /
I whakaputaina: (2001)
I whakaputaina: (2001)
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
I whakaputaina: (2014)
I whakaputaina: (2014)
Toward a safer and more secure cyberspace
I whakaputaina: (2007)
I whakaputaina: (2007)
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web /
I whakaputaina: (2010)
I whakaputaina: (2010)
Internet governance in an age of cyber insecurity
mā: Knake, Robert K.
I whakaputaina: (2010)
mā: Knake, Robert K.
I whakaputaina: (2010)
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
I whakaputaina: (2015)
I whakaputaina: (2015)
Cybercrime and cyberwarfare /
mā: Bernik, Igor
I whakaputaina: (2014)
mā: Bernik, Igor
I whakaputaina: (2014)
Use of risk analysis in computer-aided persuasion
I whakaputaina: (2011)
I whakaputaina: (2011)
Wars of disruption and resilience cybered conflict, power, and national security /
mā: Demchak, Chris C.
I whakaputaina: (2011)
mā: Demchak, Chris C.
I whakaputaina: (2011)
Terrorism and the chemical infrastructure protecting people and reducing vulnerabilities /
I whakaputaina: (2006)
I whakaputaina: (2006)
H4ckers5 wanted : an examination of the cybersecurity labor market /
mā: Libicki, Martin C., me ētahi atu.
I whakaputaina: (2014)
mā: Libicki, Martin C., me ētahi atu.
I whakaputaina: (2014)
The economic costs and implications of high-technology hardware theft
mā: Dertouzos, James N., 1950-
I whakaputaina: (1999)
mā: Dertouzos, James N., 1950-
I whakaputaina: (1999)
Disaster recovery planning for communications and critical infrastructure
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009)
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009)
Operational risk management a case study approach to effective planning and response /
mā: Abkowitz, Mark David
I whakaputaina: (2008)
mā: Abkowitz, Mark David
I whakaputaina: (2008)
Fighting computer crime : a new framework for protecting information /
mā: Parker, Donn B.
I whakaputaina: (1998)
mā: Parker, Donn B.
I whakaputaina: (1998)
Implementing PKI Services on z/OS
I whakaputaina: (2004)
I whakaputaina: (2004)
Risk factors in computer-crime victimization
mā: Choi, Kyung-shick, 1973-
I whakaputaina: (2010)
mā: Choi, Kyung-shick, 1973-
I whakaputaina: (2010)
Invisible threats financial and information technology crimes and national security /
I whakaputaina: (2006)
I whakaputaina: (2006)
Communications and information infrastructure security /
I whakaputaina: (2014)
I whakaputaina: (2014)
Hazardous future : disaster, representation and the assessment of risk /
I whakaputaina: (2015)
I whakaputaina: (2015)
Security sage's guide to hardening the network infrastructure
mā: Andrés, Steven
I whakaputaina: (2004)
mā: Andrés, Steven
I whakaputaina: (2004)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
I whakaputaina: (2009)
I whakaputaina: (2009)
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 July 2012 /
I whakaputaina: (2012)
I whakaputaina: (2012)
Strategic security management a risk assessment guide for decision makers /
mā: Vellani, Karim H., 1971-
I whakaputaina: (2007)
mā: Vellani, Karim H., 1971-
I whakaputaina: (2007)
Emerging biological threats a reference guide /
mā: Callahan, Joan R.
I whakaputaina: (2010)
mā: Callahan, Joan R.
I whakaputaina: (2010)
National infrastructure protecting, funding, and rebuilding /
I whakaputaina: (2009)
I whakaputaina: (2009)
Resilience of networked infrastructure systems : analysis and measurement /
mā: Mayada, Omer
I whakaputaina: (2013)
mā: Mayada, Omer
I whakaputaina: (2013)
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
I whakaputaina: (2012)
I whakaputaina: (2012)
Ngā tūemi rite
-
How to measure anything in cybersecurity risk /
mā: Hubbard, Douglas W., 1962-, me ētahi atu.
I whakaputaina: (2016) -
The defendeŕs dilemma : charting a course toward cybersecurity /
mā: Libicki, Martin C., me ētahi atu.
I whakaputaina: (2015) -
Cyber blockades /
mā: Russell, Alison Lawlor
I whakaputaina: (2014) -
The dark sides of the Internet : on cyber threats and information warfare /
mā: Heickerö, Roland
I whakaputaina: (2013) -
Cyber risks for business professionals a management guide /
mā: Kendrick, Rupert
I whakaputaina: (2010)