|
|
1. |
|
Computer attack and cyberterrorism
by Wilson, Clay.
Publication:
New York, N.Y. : Nova Science Publishers, 2009
. 1 online resource (viii, 75 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
2. |
|
The definitive guide to the C & A transformation
by Mehan, Julie E.
Publication:
Ely, U.K. : IT Governance Pub., 2009
. 1 online resource.
, Title from title screen.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
3. |
|
Schneier on security
by Schneier, Bruce,
Publication:
Indianapolis, IN : Wiley Pub., 2008
. 1 online resource (viii, 328 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
4. |
|
Cyberdeterrence and cyberwar
by Libicki, Martin C.
Publication:
Santa Monica, CA : RAND, 2009
. 1 online resource (xxiv, 214 p.) :
, "Prepared for the United States Air Force." | "Rand Project Air Force."
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
5. |
|
Creating a national framework for cybersecurity
by Fischer, Eric A.
Publication:
New York : Nova Science Publishers, 2009
. 1 online resource (viii, 92 p.)
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
6. |
|
Cybersecurity, botnets, and cyberterrorism
by Jacobson, George V.
Publication:
New York : Nova Science Publishers, 2009
. 1 online resource (viii, 71 p.)
, "Order code RL32114." | "Order code RL32706."
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
7. |
|
Cybersecurity, cyberanalysis, and warning
Publication:
New York : Nova Science Publishers, 2009
. 1 online resource (117 p.)
, Collection of three previously issued Government Accountabilty Office reports.
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
8. |
|
Windows forensic analysis
by Carvey, Harlan A.
Publication:
Burlington, MA : Syngress Pub., 2007
. 1 online resource (xxvi, 348 p.) :
, "Incident response and cybercrime investigation secrets"--Cover.
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
9. |
|
National security
Publication:
Amsterdam ; | Oxford : Elsevier, 2007
. 1 online resource (xxii, 419 p.) :
Date:2007
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
10. |
|
Outsourcing information security
by Axelrod, C. Warren.
Publication:
Boston : Artech House, 2004
. 1 online resource (xxvi, 248 p.) :
Date:2004
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
11. |
|
Cyber-threats, information warfare, and critical infrastructure protection
by Cordesman, Anthony H.
Publication:
Westport, Conn. : Praeger, 2002
. 1 online resource (viii, 189 p.) :
, "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C."
Date:2002
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
12. |
|
Trust in cyberspace
Publication:
Washington, D.C. : National Academy Press, 1999
. 1 online resource (xviii, 331 pages)
Date:1999
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
13. |
|
Who goes there?
Publication:
Washington, D.C. : National Academies Press, 2003
. 1 online resource (xvii, 214 p.)
, Chair: Stephen T. Kent.
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
No cover image available
No cover image available
|
|
14. |
|
Cybersecurity today and tomorrow
Publication:
Washington, D.C. : National Academy Press, 2002
. 1 online resource (x, 40 p.)
Date:2002
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
15. |
|
Information technology for counterterrorism
Publication:
Washington, D.C. : National Academies Press, 2003
. 1 online resource (xv, 128 p.)
, Chairman: John Hennessy.
Date:2003
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
16. |
|
Protecting yourself online :
Publication:
New York : HarperEdge ; HarperCollins, 1998
. xxiii, 198 p. :
Date:1998
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[KF390.5 C6 G45]
(1),
Actions:
Add to cart (remove)
|
|