Search Results - Unite States
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Security measures 38
- Internet 22
- Computer security 18
- Prevention 18
- Information warfare 14
- Law and legislation 14
- Cyberspace 12
- Government policy 12
- Research 10
- Cyberterrorism 8
- Planning 8
- Civil defense 6
- Computer crimes 6
- Social aspects 6
- Telecommunication 6
- Command and control systems 4
- Computers 4
- Data encryption (Computer science) 4
- Electronic data processing 4
- History 4
- Information technology 4
- Military art and science 4
- Military policy 4
- Privacy, Right of 4
- Technology 4
- Terrorism 4
- Academic-industrial collaboration 2
- Access control 2
- Aerospace industries 2
-
1
Global networks and local values a comparative look at Germany and the United States /
Published 2001Subjects: “…Computer networks Social aspects United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Global networks and local values a comparative look at Germany and the United States /
Published 2001Subjects: “…Computer networks Social aspects United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Critical infrastructure protection in homeland security : defending a networked nation /
Published 2015Subjects: “…Computer networks Security measures United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Critical infrastructure protection in homeland security : defending a networked nation /
Published 2015Subjects: “…Computer networks Security measures United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Cybercrime and the law challenges, issues, and outcomes /
Published 2012Subjects: “…Computer crimes United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Cybercrime and the law challenges, issues, and outcomes /
Published 2012Subjects: “…Computer crimes United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Who goes there? authentication through the lens of privacy /
Published 2003Subjects: “…Privacy, Right of United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Redefining information warfare boundaries for an Army in a wireless world
Published 2013Subjects: “…United States. Army Communication systems.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Redefining information warfare boundaries for an Army in a wireless world
Published 2013Subjects: “…United States. Army Communication systems.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Who goes there? authentication through the lens of privacy /
Published 2003Subjects: “…Privacy, Right of United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Information technology for counterterrorism immediate actions and future possibilities /
Published 2003Subjects: “…Information technology United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Information technology for counterterrorism immediate actions and future possibilities /
Published 2003Subjects: “…Information technology United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
The impact of academic research on industrial performance
Published 2003Subjects: “…Industrial efficiency United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
The impact of academic research on industrial performance
Published 2003Subjects: “…Industrial efficiency United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Published 2009Subjects: “…Computer networks Security measures Government policy United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Published 2009Subjects: “…Computer networks Security measures Government policy United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Cyberdeterrence and cyberwar
Published 2009Subjects: “…Information warfare United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Cyberdeterrence and cyberwar
Published 2009Subjects: “…Information warfare United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
Published 2002Subjects: “…Electronic data processing Security measures United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Buying military transformation technological innovation and the defense industry /
Published 2006Subjects: “…Military art and science Technological innovations United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook