Ohcanbohtosat
Fáddáevttohusat
Fáddáevttohusat
- Cyberterrorism
- Prevention 26
- Security measures 22
- Computer networks 14
- Computer security 9
- Cyberspace 9
- Information warfare 9
- Computer crimes 8
- Internet 6
- Terrorism 6
- National security 4
- Bioterrorism 3
- Data protection 3
- Government policy 3
- Information technology 3
- International cooperation 3
- Law and legislation 3
- Technological innovations 3
- Electronic surveillance 2
- Emergency management 2
- Quality control 2
- Standards 2
- Weapons of mass destruction 2
- Civil defense 1
- Computer hackers 1
- Computer network resources 1
- Conflict management 1
- Crisis management 1
- Cyberspace operations (Military science) 1
- Data mining 1
-
1
High-impact terrorism proceedings of a Russian-American workshop.
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš Konfereansapublikašuvdna E-girji -
2
Terrorism reducing vulnerabilities and improving responses : U.S.-Russian workshop proceedings /
Almmustuhtton 2004An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
3
Stealing the network how to own a shadow /
Almmustuhtton 2007An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
4
Fighting terror in cyberspace
Almmustuhtton 2005An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
5
Toward a safer and more secure cyberspace
Almmustuhtton 2007An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
6
Responses to cyber terrorism
Almmustuhtton 2008An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
7
-
8
Cyberdeterrence and cyberwar
Almmustuhtton 2009An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
9
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
Almmustuhtton 2009An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
10
The virtual battlefield perspectives on cyber warfare /
Almmustuhtton 2009An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
11
Networks and netwars the future of terror, crime, and militancy /
Almmustuhtton 2001An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
12
-
13
Cyber risks for business professionals a management guide /
Almmustuhtton 2010An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
14
-
15
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web /
Almmustuhtton 2010An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš Konfereansapublikašuvdna E-girji -
16
Wars of disruption and resilience cybered conflict, power, and national security /
Almmustuhtton 2011An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
17
Internet governance in an age of cyber insecurity
Almmustuhtton 2010An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
18
Skating on stilts why we aren't stopping tomorrow's terrorism /
Almmustuhtton 2010An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
19
-
20
The dark sides of the Internet : on cyber threats and information warfare /
Almmustuhtton 2013An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji