Cyber security and resiliency policy framework /
Enregistré dans:
Autres auteurs: | Vaseashta, A. (Ashok) (Éditeur intellectuel), Susmann, Philip (Éditeur intellectuel), Braman, Eric (Éditeur intellectuel) |
---|---|
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Amsterdam, Netherlands :
IOS Press,
2014.
|
Collection: | NATO science for peace and security series. Information and communication security ;
Volume 83. |
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Cyber security /
Publié: (2014)
Publié: (2014)
Advances in cyber security : technology, operations, and experiences /
Publié: (2013)
Publié: (2013)
Cyber conflict competing national perspectives /
par: Ventre, Daniel
Publié: (2012)
par: Ventre, Daniel
Publié: (2012)
Wars of disruption and resilience cybered conflict, power, and national security /
par: Demchak, Chris C.
Publié: (2011)
par: Demchak, Chris C.
Publié: (2011)
Cyber blockades /
par: Russell, Alison Lawlor
Publié: (2014)
par: Russell, Alison Lawlor
Publié: (2014)
Cyber threat! : how to manage the growing risk of cyber attacks /
par: Ulsch, N. MacDonnell, 1951-
Publié: (2014)
par: Ulsch, N. MacDonnell, 1951-
Publié: (2014)
Cyber security and IT infrastructure protection /
Publié: (2014)
Publié: (2014)
Applied cyber security and the smart grid implementing security controls into the modern power infrastructure /
par: Knapp, Eric D.
Publié: (2013)
par: Knapp, Eric D.
Publié: (2013)
Cyber security culture : counteracting cyber threats through organizational learning and training /
par: Trim, Peter R. J.
Publié: (2013)
par: Trim, Peter R. J.
Publié: (2013)
Cyber adversary characterization auditing the hacker mind /
Publié: (2004)
Publié: (2004)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
par: Winterfeld, Steve
Publié: (2013)
par: Winterfeld, Steve
Publié: (2013)
Safeguarding critical e-documents implementing a program for securing confidential information assets /
par: Smallwood, Robert F., 1959-
Publié: (2012)
par: Smallwood, Robert F., 1959-
Publié: (2012)
Cyber security engineering : a practical approach for systems and software assurance /
par: Mead, Nancy R.
Publié: (2016)
par: Mead, Nancy R.
Publié: (2016)
Aligning the governance structure of the NNSA laboratories : to meet 21st century national security challenges /
Publié: (2015)
Publié: (2015)
Cyber risks for business professionals a management guide /
par: Kendrick, Rupert
Publié: (2010)
par: Kendrick, Rupert
Publié: (2010)
Introduction to cyber-warfare a multidisciplinary approach /
par: Shakarian, Paulo
Publié: (2013)
par: Shakarian, Paulo
Publié: (2013)
Aspects of network and information security
Publié: (2008)
Publié: (2008)
Designing network security : a practical guide to creating a secure network infrastructure /
par: Kaeo, Merike
Publié: (2004)
par: Kaeo, Merike
Publié: (2004)
Web commerce security design and development /
par: Nahari, Hadi
Publié: (2011)
par: Nahari, Hadi
Publié: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
par: Mularien, Peter
Publié: (2010)
par: Mularien, Peter
Publié: (2010)
IoT security issues /
par: Gilchrist, Alasdair
Publié: (2017)
par: Gilchrist, Alasdair
Publié: (2017)
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
Publié: (2014)
Publié: (2014)
Internet security and firewalls
par: Preetham, V. V.
Publié: (2002)
par: Preetham, V. V.
Publié: (2002)
Network and security issues for internet mobile entertainment
Publié: (2004)
Publié: (2004)
Security in ad hoc and sensor networks
par: Beyah, Raheem (Raheem A.), 1976-
Publié: (2010)
par: Beyah, Raheem (Raheem A.), 1976-
Publié: (2010)
Network security /
par: Perez, Andre
Publié: (2014)
par: Perez, Andre
Publié: (2014)
Internet security you can afford : using untangle as your internet gateway /
par: Dawson, Christopher
Publié: (2015)
par: Dawson, Christopher
Publié: (2015)
Web security basics
par: Bhasin, Shweta, 1977-
Publié: (2003)
par: Bhasin, Shweta, 1977-
Publié: (2003)
Developer's guide to web application security
par: Cross, Michael
Publié: (2007)
par: Cross, Michael
Publié: (2007)
Network security foundations
par: Strebe, Matthew
Publié: (2004)
par: Strebe, Matthew
Publié: (2004)
Mastering network security
par: Brenton, Chris
Publié: (2003)
par: Brenton, Chris
Publié: (2003)
Computer security fundamentals /
par: Easttom, Chuck
Publié: (2006)
par: Easttom, Chuck
Publié: (2006)
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Publié: (2009)
Publié: (2009)
Wireless communications security : solutions for the internet of things /
par: Penttinen, Jyrki T. J.
Publié: (2017)
par: Penttinen, Jyrki T. J.
Publié: (2017)
Security risk management building an information security risk management program from the ground up /
par: Wheeler, Evan
Publié: (2011)
par: Wheeler, Evan
Publié: (2011)
Cisco security
par: Bhatnagar, Kartik
Publié: (2002)
par: Bhatnagar, Kartik
Publié: (2002)
Documents similaires
-
Cyber security /
Publié: (2014) -
Advances in cyber security : technology, operations, and experiences /
Publié: (2013) -
Cyber conflict competing national perspectives /
par: Ventre, Daniel
Publié: (2012) -
Wars of disruption and resilience cybered conflict, power, and national security /
par: Demchak, Chris C.
Publié: (2011) -
Cyber blockades /
par: Russell, Alison Lawlor
Publié: (2014)