H4ckers5 wanted : an examination of the cybersecurity labor market /
Saved in:
| Main Authors: | Libicki, Martin C. (Author), Senty, David (Author), Pollak, Julia (Author) |
|---|---|
| Other Authors: | Walker, Dori (Cover designer) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Santa Monica, California :
RAND,
2014.
|
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
H4ckers5 wanted : an examination of the cybersecurity labor market /
by: Libicki, Martin C., et al.
Published: (2014)
by: Libicki, Martin C., et al.
Published: (2014)
How to measure anything in cybersecurity risk /
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
How to measure anything in cybersecurity risk /
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
Policing cyberspace a structural and cultural analysis /
by: Nhan, Johnny, 1977-
Published: (2010)
by: Nhan, Johnny, 1977-
Published: (2010)
Policing cyberspace a structural and cultural analysis /
by: Nhan, Johnny, 1977-
Published: (2010)
by: Nhan, Johnny, 1977-
Published: (2010)
Cybercrime and cyberwarfare /
by: Bernik, Igor
Published: (2014)
by: Bernik, Igor
Published: (2014)
Cybercrime and cyberwarfare /
by: Bernik, Igor
Published: (2014)
by: Bernik, Igor
Published: (2014)
Biohackers the politics of open science /
by: Delfanti, Alessandro
Published: (2013)
by: Delfanti, Alessandro
Published: (2013)
Biohackers the politics of open science /
by: Delfanti, Alessandro
Published: (2013)
by: Delfanti, Alessandro
Published: (2013)
Cyber blockades /
by: Russell, Alison Lawlor
Published: (2014)
by: Russell, Alison Lawlor
Published: (2014)
Cyber blockades /
by: Russell, Alison Lawlor
Published: (2014)
by: Russell, Alison Lawlor
Published: (2014)
The browser hacker's handbook /
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
The browser hacker's handbook /
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
The Antivirus hacker's handbook /
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
The Antivirus hacker's handbook /
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
Steal this computer book 3 what they won't tell you about the Internet /
by: Wang, Wally
Published: (2003)
by: Wang, Wally
Published: (2003)
Steal this computer book 3 what they won't tell you about the Internet /
by: Wang, Wally
Published: (2003)
by: Wang, Wally
Published: (2003)
The defendeŕs dilemma : charting a course toward cybersecurity /
by: Libicki, Martin C., et al.
Published: (2015)
by: Libicki, Martin C., et al.
Published: (2015)
The defendeŕs dilemma : charting a course toward cybersecurity /
by: Libicki, Martin C., et al.
Published: (2015)
by: Libicki, Martin C., et al.
Published: (2015)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
Cyber risks for business professionals a management guide /
by: Kendrick, Rupert
Published: (2010)
by: Kendrick, Rupert
Published: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
by: Mehan, Julie E.
Published: (2008)
by: Mehan, Julie E.
Published: (2008)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
by: Mehan, Julie E.
Published: (2008)
by: Mehan, Julie E.
Published: (2008)
Cyber risks for business professionals a management guide /
by: Kendrick, Rupert
Published: (2010)
by: Kendrick, Rupert
Published: (2010)
The National Cybersecurity Policies and Their Mitigation of Kenya’s National Security Risks
by: Olang’, Alexander
Published: (2024)
by: Olang’, Alexander
Published: (2024)
The economic costs and implications of high-technology hardware theft
by: Dertouzos, James N., 1950-
Published: (1999)
by: Dertouzos, James N., 1950-
Published: (1999)
The economic costs and implications of high-technology hardware theft
by: Dertouzos, James N., 1950-
Published: (1999)
by: Dertouzos, James N., 1950-
Published: (1999)
Cybercrime and society crime and punishment in the information age /
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Cybercrime and society crime and punishment in the information age /
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Fighting computer crime : a new framework for protecting information /
by: Parker, Donn B.
Published: (1998)
by: Parker, Donn B.
Published: (1998)
Fighting computer crime : a new framework for protecting information /
by: Parker, Donn B.
Published: (1998)
by: Parker, Donn B.
Published: (1998)
Computer crime, investigation, and the law
by: Easttom, William C.
Published: (2010)
by: Easttom, William C.
Published: (2010)
Computer crime, investigation, and the law
by: Easttom, William C.
Published: (2010)
by: Easttom, William C.
Published: (2010)
Invisible threats financial and information technology crimes and national security /
Published: (2006)
Published: (2006)
Invisible threats financial and information technology crimes and national security /
Published: (2006)
Published: (2006)
Hate crime and the city
by: Iganski, Paul
Published: (2008)
by: Iganski, Paul
Published: (2008)
Risk factors in computer-crime victimization
by: Choi, Kyung-shick, 1973-
Published: (2010)
by: Choi, Kyung-shick, 1973-
Published: (2010)
Hate crime and the city
by: Iganski, Paul
Published: (2008)
by: Iganski, Paul
Published: (2008)
Markets for cybercrime tools and stolen data : hackers' bazaar /
by: Ablon, Lillian
Published: (2014)
by: Ablon, Lillian
Published: (2014)
Similar Items
-
H4ckers5 wanted : an examination of the cybersecurity labor market /
by: Libicki, Martin C., et al.
Published: (2014) -
How to measure anything in cybersecurity risk /
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016) -
How to measure anything in cybersecurity risk /
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016) -
Policing cyberspace a structural and cultural analysis /
by: Nhan, Johnny, 1977-
Published: (2010) -
Policing cyberspace a structural and cultural analysis /
by: Nhan, Johnny, 1977-
Published: (2010)