H4ckers5 wanted : an examination of the cybersecurity labor market /
Enregistré dans:
Auteurs principaux: | Libicki, Martin C. (Auteur), Senty, David (Auteur), Pollak, Julia (Auteur) |
---|---|
Autres auteurs: | Walker, Dori (Concepteur de pages couvertures) |
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Santa Monica, California :
RAND,
2014.
|
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
How to measure anything in cybersecurity risk /
par: Hubbard, Douglas W., 1962-, et autres
Publié: (2016)
par: Hubbard, Douglas W., 1962-, et autres
Publié: (2016)
Policing cyberspace a structural and cultural analysis /
par: Nhan, Johnny, 1977-
Publié: (2010)
par: Nhan, Johnny, 1977-
Publié: (2010)
Cybercrime and cyberwarfare /
par: Bernik, Igor
Publié: (2014)
par: Bernik, Igor
Publié: (2014)
Biohackers the politics of open science /
par: Delfanti, Alessandro
Publié: (2013)
par: Delfanti, Alessandro
Publié: (2013)
Cyber blockades /
par: Russell, Alison Lawlor
Publié: (2014)
par: Russell, Alison Lawlor
Publié: (2014)
The browser hacker's handbook /
par: Alcorn, Wade
Publié: (2014)
par: Alcorn, Wade
Publié: (2014)
The Antivirus hacker's handbook /
par: Koret, Joxean, et autres
Publié: (2015)
par: Koret, Joxean, et autres
Publié: (2015)
Steal this computer book 3 what they won't tell you about the Internet /
par: Wang, Wally
Publié: (2003)
par: Wang, Wally
Publié: (2003)
The dark sides of the Internet : on cyber threats and information warfare /
par: Heickerö, Roland
Publié: (2013)
par: Heickerö, Roland
Publié: (2013)
The defendeŕs dilemma : charting a course toward cybersecurity /
par: Libicki, Martin C., et autres
Publié: (2015)
par: Libicki, Martin C., et autres
Publié: (2015)
Cyber risks for business professionals a management guide /
par: Kendrick, Rupert
Publié: (2010)
par: Kendrick, Rupert
Publié: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
par: Mehan, Julie E.
Publié: (2008)
par: Mehan, Julie E.
Publié: (2008)
The economic costs and implications of high-technology hardware theft
par: Dertouzos, James N., 1950-
Publié: (1999)
par: Dertouzos, James N., 1950-
Publié: (1999)
Cybercrime and society crime and punishment in the information age /
par: Yar, Majid
Publié: (2006)
par: Yar, Majid
Publié: (2006)
Fighting computer crime : a new framework for protecting information /
par: Parker, Donn B.
Publié: (1998)
par: Parker, Donn B.
Publié: (1998)
Computer crime, investigation, and the law
par: Easttom, William C.
Publié: (2010)
par: Easttom, William C.
Publié: (2010)
Invisible threats financial and information technology crimes and national security /
Publié: (2006)
Publié: (2006)
Insider threat protecting the enterprise from sabotage, spying, and theft /
par: Cole, Eric
Publié: (2006)
par: Cole, Eric
Publié: (2006)
Incentives and dynamics in the Ethiopian health worker labor market
Publié: (2010)
Publié: (2010)
Supply and demand /
par: Henderson, Hubert
Publié: (1958)
par: Henderson, Hubert
Publié: (1958)
Internet governance in an age of cyber insecurity
par: Knake, Robert K.
Publié: (2010)
par: Knake, Robert K.
Publié: (2010)
Hate crime and the city
par: Iganski, Paul
Publié: (2008)
par: Iganski, Paul
Publié: (2008)
Risk factors in computer-crime victimization
par: Choi, Kyung-shick, 1973-
Publié: (2010)
par: Choi, Kyung-shick, 1973-
Publié: (2010)
Markets for cybercrime tools and stolen data : hackers' bazaar /
par: Ablon, Lillian
Publié: (2014)
par: Ablon, Lillian
Publié: (2014)
Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy /
Publié: (2010)
Publié: (2010)
Sanctioning bias crime a public perspective /
par: Pearlman, Terrylynn, 1971-
Publié: (2008)
par: Pearlman, Terrylynn, 1971-
Publié: (2008)
Web application defender's cookbook battling hackers and protecting users /
par: Barnett, Ryan C.
Publié: (2013)
par: Barnett, Ryan C.
Publié: (2013)
Alternate data storage forensics
par: Cohen, Tyler
Publié: (2007)
par: Cohen, Tyler
Publié: (2007)
The best damn cybercrime and digital forensics book period
par: Cardwell, Kevin
Publié: (2007)
par: Cardwell, Kevin
Publié: (2007)
Towards better work : understanding labour in apparel global value chains /
Publié: (2014)
Publié: (2014)
Piracy : leakages from modernity /
Publié: (2014)
Publié: (2014)
Devil's sanctuary an eyewitness history of Mississippi hate crimes /
par: Alston, Alex A., 1936-
Publié: (2009)
par: Alston, Alex A., 1936-
Publié: (2009)
Documents similaires
-
How to measure anything in cybersecurity risk /
par: Hubbard, Douglas W., 1962-, et autres
Publié: (2016) -
Policing cyberspace a structural and cultural analysis /
par: Nhan, Johnny, 1977-
Publié: (2010) -
Cybercrime and cyberwarfare /
par: Bernik, Igor
Publié: (2014) -
Biohackers the politics of open science /
par: Delfanti, Alessandro
Publié: (2013) -
Cyber blockades /
par: Russell, Alison Lawlor
Publié: (2014)