Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Security measures 14
- Computer security 6
- Internet 6
- Information warfare 5
- Research 5
- Cyberspace 4
- Prevention 4
- Law and legislation 3
- Telecommunication 3
- Computer crimes 2
- Cyberterrorism 2
- Data encryption (Computer science) 2
- Electronic data processing 2
- Government policy 2
- Information technology 2
- Planning 2
- Privacy, Right of 2
- Social aspects 2
- Technology 2
- Academic-industrial collaboration 1
- Access control 1
- Aerospace industries 1
- Armed Forces 1
- Civil defense 1
- Command and control systems 1
- Communication systems 1
- Computational grids (Computer systems) 1
- Computer hackers 1
- Computer viruses 1
-
1
Cyberdeterrence and cyberwar
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
-
3
A cyberworm that knows no boundaries
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Cybercrime and the law challenges, issues, and outcomes /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Computer networks, policies and applications
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
-
7
China's cyberwarfare capability
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
-
9
-
10
Cybersecurity today and tomorrow pay now or pay later /
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
-
12
-
13
-
14
The impact of academic research on industrial performance
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Who goes there? authentication through the lens of privacy /
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Security secrets, intruders and ID tags.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Internet applications the emerging global computer.
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
-
19
Outsourcing information security
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20