Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Prevention
- Security measures 30
- Computer security 28
- Computer crimes 14
- Cyberterrorism 12
- Corporations 6
- Business enterprises 4
- Computer hackers 4
- Government policy 4
- Terrorism 4
- Application software 2
- Civil defense 2
- Data protection 2
- Information networks 2
- Information technology 2
- Penetration testing (Computer security) 2
- Planning 2
- Protection 2
- Public utilities 2
- Telecommunication systems 2
- Web applications 2
- Web site development 2
- Web sites 2
-
1
Toward a safer and more secure cyberspace
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
The defendeŕs dilemma : charting a course toward cybersecurity /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Cyber security and IT infrastructure protection /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013 /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
The defendeŕs dilemma : charting a course toward cybersecurity /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Toward a safer and more secure cyberspace
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Web application defender's cookbook battling hackers and protecting users /
Published 2013Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
At the nexus of cybersecurity and public policy : some basic concepts and issues /
Published 2014Subjects: “…Computer security United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
At the nexus of cybersecurity and public policy : some basic concepts and issues /
Published 2014Subjects: “…Computer security United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Network attacks & exploitation : a framework /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Network attacks & exploitation : a framework /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Cyber security culture : counteracting cyber threats through organizational learning and training /
Published 2013Subjects:Book -
18
Cyber security culture : counteracting cyber threats through organizational learning and training /
Published 2013Subjects:Book -
19
Hacking web apps detecting and preventing web application security problems /
Published 2012Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Cyber threat! : how to manage the growing risk of cyber attacks /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook