H4ckers5 wanted : an examination of the cybersecurity labor market /
Na minha lista:
Principais autores: | Libicki, Martin C. (Autor), Senty, David (Autor), Pollak, Julia (Autor) |
---|---|
Outros Autores: | Walker, Dori (Desenhista da capa) |
Formato: | Recurso Eletrônico livro eletrônico |
Idioma: | inglês |
Publicado em: |
Santa Monica, California :
RAND,
2014.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registros relacionados
Policing cyberspace a structural and cultural analysis /
por: Nhan, Johnny, 1977-
Publicado em: (2010)
por: Nhan, Johnny, 1977-
Publicado em: (2010)
How to measure anything in cybersecurity risk /
por: Hubbard, Douglas W., 1962-, et al.
Publicado em: (2016)
por: Hubbard, Douglas W., 1962-, et al.
Publicado em: (2016)
Cybercrime and cyberwarfare /
por: Bernik, Igor
Publicado em: (2014)
por: Bernik, Igor
Publicado em: (2014)
The browser hacker's handbook /
por: Alcorn, Wade
Publicado em: (2014)
por: Alcorn, Wade
Publicado em: (2014)
Biohackers the politics of open science /
por: Delfanti, Alessandro
Publicado em: (2013)
por: Delfanti, Alessandro
Publicado em: (2013)
The Antivirus hacker's handbook /
por: Koret, Joxean, et al.
Publicado em: (2015)
por: Koret, Joxean, et al.
Publicado em: (2015)
Cyber blockades /
por: Russell, Alison Lawlor
Publicado em: (2014)
por: Russell, Alison Lawlor
Publicado em: (2014)
Steal this computer book 3 what they won't tell you about the Internet /
por: Wang, Wally
Publicado em: (2003)
por: Wang, Wally
Publicado em: (2003)
Cybercrime and society crime and punishment in the information age /
por: Yar, Majid
Publicado em: (2006)
por: Yar, Majid
Publicado em: (2006)
Fighting computer crime : a new framework for protecting information /
por: Parker, Donn B.
Publicado em: (1998)
por: Parker, Donn B.
Publicado em: (1998)
Computer crime, investigation, and the law
por: Easttom, William C.
Publicado em: (2010)
por: Easttom, William C.
Publicado em: (2010)
Invisible threats financial and information technology crimes and national security /
Publicado em: (2006)
Publicado em: (2006)
Incentives and dynamics in the Ethiopian health worker labor market
Publicado em: (2010)
Publicado em: (2010)
Supply and demand /
por: Henderson, Hubert
Publicado em: (1958)
por: Henderson, Hubert
Publicado em: (1958)
Hate crime and the city
por: Iganski, Paul
Publicado em: (2008)
por: Iganski, Paul
Publicado em: (2008)
Risk factors in computer-crime victimization
por: Choi, Kyung-shick, 1973-
Publicado em: (2010)
por: Choi, Kyung-shick, 1973-
Publicado em: (2010)
Markets for cybercrime tools and stolen data : hackers' bazaar /
por: Ablon, Lillian
Publicado em: (2014)
por: Ablon, Lillian
Publicado em: (2014)
Sanctioning bias crime a public perspective /
por: Pearlman, Terrylynn, 1971-
Publicado em: (2008)
por: Pearlman, Terrylynn, 1971-
Publicado em: (2008)
Alternate data storage forensics
por: Cohen, Tyler
Publicado em: (2007)
por: Cohen, Tyler
Publicado em: (2007)
The best damn cybercrime and digital forensics book period
por: Cardwell, Kevin
Publicado em: (2007)
por: Cardwell, Kevin
Publicado em: (2007)
The defendeŕs dilemma : charting a course toward cybersecurity /
por: Libicki, Martin C., et al.
Publicado em: (2015)
por: Libicki, Martin C., et al.
Publicado em: (2015)
Towards better work : understanding labour in apparel global value chains /
Publicado em: (2014)
Publicado em: (2014)
Piracy : leakages from modernity /
Publicado em: (2014)
Publicado em: (2014)
Devil's sanctuary an eyewitness history of Mississippi hate crimes /
por: Alston, Alex A., 1936-
Publicado em: (2009)
por: Alston, Alex A., 1936-
Publicado em: (2009)
Internet fraud casebook the World Wide Web of deceit /
Publicado em: (2010)
Publicado em: (2010)
An introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An Introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An Introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An Introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
An Introduction to modern economics /
por: Hardwick, Philip
Publicado em: (1999)
por: Hardwick, Philip
Publicado em: (1999)
Planning teacher demand supply /
por: Williams, Peter
Publicado em: (1979)
por: Williams, Peter
Publicado em: (1979)
A guide to supply-side economics /
por: Hailstones, Thomas J.
Publicado em: (1982)
por: Hailstones, Thomas J.
Publicado em: (1982)
The Emerald international handbook of technology-facilitated violence and abuse /
por: Bailey, Jane, et al.
Publicado em: (2021)
por: Bailey, Jane, et al.
Publicado em: (2021)
Nursing workforce development strategic state initiatives /
Publicado em: (2005)
Publicado em: (2005)
The economic costs and implications of high-technology hardware theft
por: Dertouzos, James N., 1950-
Publicado em: (1999)
por: Dertouzos, James N., 1950-
Publicado em: (1999)
The dark sides of the Internet : on cyber threats and information warfare /
por: Heickerö, Roland
Publicado em: (2013)
por: Heickerö, Roland
Publicado em: (2013)
Murder, the media, and the politics of public feelings remembering Matthew Shepard and James Byrd Jr. /
por: Petersen, Jennifer, 1970-
Publicado em: (2011)
por: Petersen, Jennifer, 1970-
Publicado em: (2011)
Registros relacionados
-
Policing cyberspace a structural and cultural analysis /
por: Nhan, Johnny, 1977-
Publicado em: (2010) -
How to measure anything in cybersecurity risk /
por: Hubbard, Douglas W., 1962-, et al.
Publicado em: (2016) -
Cybercrime and cyberwarfare /
por: Bernik, Igor
Publicado em: (2014) -
The browser hacker's handbook /
por: Alcorn, Wade
Publicado em: (2014) -
Biohackers the politics of open science /
por: Delfanti, Alessandro
Publicado em: (2013)