Search Results - "cybersecurity"
Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 26
- Computer networks 18
- Computer security 18
- Prevention 14
- Cyberterrorism 10
- Computer crimes 8
- Internet 6
- Cyberspace 4
- Law and legislation 4
- Access control 2
- Computer Science 2
- Computer Science, general 2
- Computer science 2
- Crime & criminology 2
- Data protection 2
- Government policy 2
- Hackers 2
- Hacking 2
- Information warfare 2
- Internet governance 2
- Online sexual predators 2
- Professions 2
- Research 2
- Risk management 2
- Sexual abuse 2
- Social Science, Violence in Society 2
- Supply and demand 2
-
21
How to measure anything in cybersecurity risk /
Published 2016An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
22
How to measure anything in cybersecurity risk /
Published 2016An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
23
-
24
-
25
-
26
-
27
-
28
-
29
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
30
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
31
Toward a safer and more secure cyberspace
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
32
Toward a safer and more secure cyberspace
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
33
The global war for internet governance /
Published 2014Table of Contents: “…The internet governance oxymoron -- Controlling internet resources -- Setting standards for the internet -- Cybersecurity governance -- Governance at the internet's core -- Internet access and network neutrality -- The public policy role of private information intermediaries -- Internet architecture and intellectual property -- The dark arts of internet governance -- Internet governance and internet freedom.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
34
The global war for internet governance /
Published 2014Table of Contents: “…The internet governance oxymoron -- Controlling internet resources -- Setting standards for the internet -- Cybersecurity governance -- Governance at the internet's core -- Internet access and network neutrality -- The public policy role of private information intermediaries -- Internet architecture and intellectual property -- The dark arts of internet governance -- Internet governance and internet freedom.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
35
The Emerald international handbook of technology-facilitated violence and abuse /
Published 2021Table of Contents: “…Threat modeling intimate partner violence : tech abuse as a cybersecurity challenge in the internet of things / Julia Slupska, and Leonie Maria Tanczer. …”
Get full text
Electronic eBook -
36
The Emerald international handbook of technology-facilitated violence and abuse /
Published 2021Table of Contents: “…Threat modeling intimate partner violence : tech abuse as a cybersecurity challenge in the internet of things / Julia Slupska, and Leonie Maria Tanczer. …”
Get full text
Electronic eBook