1
by Thakur, Kutub.
Published 2020
View fulltext via EzAccess
Electronic
2
by Shaw, William T.
Published 2006
View fulltext via EZaccess
Electronic
3
by Lee, Newton.
Published 2013
Table of Contents: '; ... Mining -- PART III: Counterterrorism Technologies: Social Media and Cybersecurity -- Social Media and Two...
Get full text
Electronic
4
Published 2005
...The Law & Economics of Cybersecurity...
View fulltext via EzAccess
eBook
5
by Moschovitis, Christos J. P.,
Published 2018
Table of Contents: '; ...); In the Beginning ... ; Key Definitions; Note; CHAPTER 3: A Cybersecurity Primer; Cybersecurity Defined; The Meaning...
View fulltext via EzAccess
eBook
6
by Dua, Sumeet.
Published 2011
Table of Contents: '; ... traffic -- 8. Privacy-preserving data mining -- 9. Emerging challenges in cybersecurity....
View fulltext via EzAccess
Electronic
7
Published 2008
Table of Contents: '; ...1. Cybercrime, cybersecurity, and financial institutions worldwide / Pauline Reich -- 2. Enhancing...
View fulltext via EzAccess
Electronic
8
by Wong, Rebecca.
Published 2013
Table of Contents: '; ...s Opinion on Cybersecurity -- Cybersecurity Directive 2013 -- Criticism of the Cybersecurity Directive...
Get full text
Electronic
9
Published 2010
Get full text
Electronic
10
Published 2013
Table of Contents: '; ...Preface -- Section 1 <U+0013> New Strategic Cybersecurity -- Between War & Peace: Considering...
Get full text
Electronic
11
...SpringerBriefs in Cybersecurity,...
Get full text
Electronic
12
by Rubinstein-Salzedo, Simon,
Published 2018
View fulltext via EzAccess
eBook
13
14
15
16
17
18
19
by Maurushat, Alana.
Published 2013
...SpringerBriefs in Cybersecurity,...
Get full text
Electronic
20