Convergence : illicit networks and national security in the age of globalization /
I tiakina i:
Ngā kaituhi rangatōpū: | National Defense University. Center for Technology and National Security Policy. Center for Complex Operations (Contributor), National Defense University. Institute for National Strategic Studies (Contributor) |
---|---|
Ētahi atu kaituhi: | Miklaucic, Michael (Editor), Brewer, Jacqueline (Editor), Stavridis, James (Contributor) |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Washington, DC :
Published for the Center for Complex Operations, Institute for National Strategic Studies by National Defense University Press; sold by the U.S. Government Printing Office,
2013.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Secure communicating systems design, analysis, and implementation /
mā: Huth, Michael, 1962-
I whakaputaina: (2001)
mā: Huth, Michael, 1962-
I whakaputaina: (2001)
Disaster recovery planning for communications and critical infrastructure
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009)
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009)
Cisco security professional's guide to secure intrusion detection systems
I whakaputaina: (2003)
I whakaputaina: (2003)
Security in ad hoc and sensor networks
mā: Beyah, Raheem (Raheem A.), 1976-
I whakaputaina: (2010)
mā: Beyah, Raheem (Raheem A.), 1976-
I whakaputaina: (2010)
Cryptography's role in securing the information society
I whakaputaina: (1996)
I whakaputaina: (1996)
Aspects of network and information security
I whakaputaina: (2008)
I whakaputaina: (2008)
Techno security's guide to e-discovery and digital forensics
mā: Wiles, Jack
I whakaputaina: (2007)
mā: Wiles, Jack
I whakaputaina: (2007)
Cyber threat! : how to manage the growing risk of cyber attacks /
mā: Ulsch, N. MacDonnell, 1951-
I whakaputaina: (2014)
mā: Ulsch, N. MacDonnell, 1951-
I whakaputaina: (2014)
Security for mobile networks and platforms
mā: Aissi, Selim
I whakaputaina: (2006)
mā: Aissi, Selim
I whakaputaina: (2006)
Network security /
mā: Perez, Andre
I whakaputaina: (2014)
mā: Perez, Andre
I whakaputaina: (2014)
Security and privacy in mobile and wireless networking /
I whakaputaina: (2009)
I whakaputaina: (2009)
Optimization of computer networks : modeling and algorithms : a hands-on approach /
mā: Marino, Pablo Pavon
I whakaputaina: (2016)
mā: Marino, Pablo Pavon
I whakaputaina: (2016)
Mastering network security
mā: Brenton, Chris
I whakaputaina: (2003)
mā: Brenton, Chris
I whakaputaina: (2003)
Network security foundations
mā: Strebe, Matthew
I whakaputaina: (2004)
mā: Strebe, Matthew
I whakaputaina: (2004)
Information assurance dependability and security in networked systems /
I whakaputaina: (2008)
I whakaputaina: (2008)
Signal traffic : critical studies of media infrastructures /
I whakaputaina: (2015)
I whakaputaina: (2015)
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)
mā: Kaeo, Merike
I whakaputaina: (2004)
Unauthorised access physical penetration testing for IT security teams /
mā: Allsopp, Wil
I whakaputaina: (2009)
mā: Allsopp, Wil
I whakaputaina: (2009)
Network attacks & exploitation : a framework /
mā: Monte, Matthew
I whakaputaina: (2015)
mā: Monte, Matthew
I whakaputaina: (2015)
From problem toward solution wireless sensor networks security /
I whakaputaina: (2009)
I whakaputaina: (2009)
Network security evaluation using the NSA IEM /
mā: Fuller, Ed
I whakaputaina: (2005)
mā: Fuller, Ed
I whakaputaina: (2005)
Security sage's guide to hardening the network infrastructure
mā: Andrés, Steven
I whakaputaina: (2004)
mā: Andrés, Steven
I whakaputaina: (2004)
Network security jumpstart
mā: Strebe, Matthew
I whakaputaina: (2002)
mā: Strebe, Matthew
I whakaputaina: (2002)
Network and system security
I whakaputaina: (2014)
I whakaputaina: (2014)
Hack proofing your wireless network
mā: Owens, Les
I whakaputaina: (2001)
mā: Owens, Les
I whakaputaina: (2001)
Security+ exam guide
mā: Crayton, Christopher A.
I whakaputaina: (2003)
mā: Crayton, Christopher A.
I whakaputaina: (2003)
Network and security issues for internet mobile entertainment
I whakaputaina: (2004)
I whakaputaina: (2004)
Managing Cisco network security
I whakaputaina: (2002)
I whakaputaina: (2002)
Introduction to network security : theory and practice /
mā: Wang, Jie, 1961-, me ētahi atu.
I whakaputaina: (2015)
mā: Wang, Jie, 1961-, me ētahi atu.
I whakaputaina: (2015)
Security in wireless LANs and MANs
mā: Hardjono, Thomas
I whakaputaina: (2005)
mā: Hardjono, Thomas
I whakaputaina: (2005)
Secure computer and network systems modeling, analysis and design /
mā: Ye, Nong
I whakaputaina: (2008)
mā: Ye, Nong
I whakaputaina: (2008)
Practical embedded security building secure resource-constrained systems /
mā: Stapko, Timothy John
I whakaputaina: (2008)
mā: Stapko, Timothy John
I whakaputaina: (2008)
Nokia Network security solutions handbook /
mā: Maxwell, Douglas D.
I whakaputaina: (2002)
mā: Maxwell, Douglas D.
I whakaputaina: (2002)
Cyber risks for business professionals a management guide /
mā: Kendrick, Rupert
I whakaputaina: (2010)
mā: Kendrick, Rupert
I whakaputaina: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
mā: Mehan, Julie E.
I whakaputaina: (2008)
mā: Mehan, Julie E.
I whakaputaina: (2008)
Insider threat protecting the enterprise from sabotage, spying, and theft /
mā: Cole, Eric
I whakaputaina: (2006)
mā: Cole, Eric
I whakaputaina: (2006)
Wireless communications security : solutions for the internet of things /
mā: Penttinen, Jyrki T. J.
I whakaputaina: (2017)
mā: Penttinen, Jyrki T. J.
I whakaputaina: (2017)
Computer security fundamentals /
mā: Easttom, Chuck
I whakaputaina: (2006)
mā: Easttom, Chuck
I whakaputaina: (2006)
Threat modeling : designing for security /
mā: Shostack, Adam
I whakaputaina: (2014)
mā: Shostack, Adam
I whakaputaina: (2014)
Security and privacy in the digital era.
mā: Guerrier, Claudine
I whakaputaina: (2016)
mā: Guerrier, Claudine
I whakaputaina: (2016)
Ngā tūemi rite
-
Secure communicating systems design, analysis, and implementation /
mā: Huth, Michael, 1962-
I whakaputaina: (2001) -
Disaster recovery planning for communications and critical infrastructure
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009) -
Cisco security professional's guide to secure intrusion detection systems
I whakaputaina: (2003) -
Security in ad hoc and sensor networks
mā: Beyah, Raheem (Raheem A.), 1976-
I whakaputaina: (2010) -
Cryptography's role in securing the information society
I whakaputaina: (1996)