1. Computer attack and cyberterrorism by Wilson, Clay. Publication: New York, N.Y. : Nova Science Publishers, 2009 . 1 online resource (viii, 75 p.) Date:2009 Availability: No items available: Actions: Add to cart
2. The definitive guide to the C & A transformation by Mehan, Julie E. Publication: Ely, U.K. : IT Governance Pub., 2009 . 1 online resource. , Title from title screen. Date:2009 Availability: No items available: Actions: Add to cart
3. Schneier on security by Schneier, Bruce, Publication: Indianapolis, IN : Wiley Pub., 2008 . 1 online resource (viii, 328 p.) Date:2008 Availability: No items available: Actions: Add to cart
4. Cyberdeterrence and cyberwar by Libicki, Martin C. Publication: Santa Monica, CA : RAND, 2009 . 1 online resource (xxiv, 214 p.) : , "Prepared for the United States Air Force." | "Rand Project Air Force." Date:2009 Availability: No items available: Actions: Add to cart
5. Creating a national framework for cybersecurity by Fischer, Eric A. Publication: New York : Nova Science Publishers, 2009 . 1 online resource (viii, 92 p.) Date:2009 Availability: No items available: Actions: Add to cart
6. Cybersecurity, botnets, and cyberterrorism by Jacobson, George V. Publication: New York : Nova Science Publishers, 2009 . 1 online resource (viii, 71 p.) , "Order code RL32114." | "Order code RL32706." Date:2009 Availability: No items available: Actions: Add to cart
7. Cybersecurity, cyberanalysis, and warning   Publication: New York : Nova Science Publishers, 2009 . 1 online resource (117 p.) , Collection of three previously issued Government Accountabilty Office reports. Date:2009 Availability: No items available: Actions: Add to cart
8. Windows forensic analysis by Carvey, Harlan A. Publication: Burlington, MA : Syngress Pub., 2007 . 1 online resource (xxvi, 348 p.) : , "Incident response and cybercrime investigation secrets"--Cover. Date:2007 Availability: No items available: Actions: Add to cart
9. National security   Publication: Amsterdam ; | Oxford : Elsevier, 2007 . 1 online resource (xxii, 419 p.) : Date:2007 Availability: No items available: Actions: Add to cart
10. Outsourcing information security by Axelrod, C. Warren. Publication: Boston : Artech House, 2004 . 1 online resource (xxvi, 248 p.) : Date:2004 Availability: No items available: Actions: Add to cart
11. Cyber-threats, information warfare, and critical infrastructure protection by Cordesman, Anthony H. Publication: Westport, Conn. : Praeger, 2002 . 1 online resource (viii, 189 p.) : , "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." Date:2002 Availability: No items available: Actions: Add to cart
12. Trust in cyberspace   Publication: Washington, D.C. : National Academy Press, 1999 . 1 online resource (xviii, 331 pages) Date:1999 Availability: No items available: Actions: Add to cart
13. Who goes there?   Publication: Washington, D.C. : National Academies Press, 2003 . 1 online resource (xvii, 214 p.) , Chair: Stephen T. Kent. Date:2003 Availability: No items available: Actions: Add to cart No cover image available No cover image available
14. Cybersecurity today and tomorrow   Publication: Washington, D.C. : National Academy Press, 2002 . 1 online resource (x, 40 p.) Date:2002 Availability: No items available: Actions: Add to cart
15. Information technology for counterterrorism   Publication: Washington, D.C. : National Academies Press, 2003 . 1 online resource (xv, 128 p.) , Chairman: John Hennessy. Date:2003 Availability: No items available: Actions: Add to cart
16. Protecting yourself online :   Publication: New York : HarperEdge ; HarperCollins, 1998 . xxiii, 198 p. : Date:1998 Availability: Copies available: Turkeyen Campus Social Sciences [KF390.5 C6 G45] (1), Actions: Add to cart

Refine your search