Suggested Topics within your search.
Suggested Topics within your search.
1
2
3
by Lee, Newton.
Published 2013
Table of Contents: ';
“... Mining -- PART III: Counterterrorism Technologies: Social Media and Cybersecurity -- Social Media and Two...”Published 2013
Get full text
Electronic
4
5
by Moschovitis, Christos J. P.,
Published 2018
Table of Contents: ';
“...); In the Beginning ... ; Key Definitions; Note; CHAPTER 3: A Cybersecurity Primer; Cybersecurity Defined; The Meaning...”Published 2018
View fulltext via EzAccess
eBook
6
by Dua, Sumeet.
Published 2011
Table of Contents: ';
“... traffic -- 8. Privacy-preserving data mining -- 9. Emerging challenges in cybersecurity....”Published 2011
View fulltext via EzAccess
Electronic
7
Published 2008
Table of Contents: ';
“...1. Cybercrime, cybersecurity, and financial institutions worldwide / Pauline Reich -- 2. Enhancing...”View fulltext via EzAccess
Electronic
8
by Wong, Rebecca.
Published 2013
Table of Contents: ';
“...s Opinion on Cybersecurity -- Cybersecurity Directive 2013 -- Criticism of the Cybersecurity Directive...”Published 2013
Get full text
Electronic
9
10
Published 2013
Table of Contents: ';
“...Preface -- Section 1 <U+0013> New Strategic Cybersecurity -- Between War & Peace: Considering...”Get full text
Electronic
11
12
13
14
15
16
17
18
19
by Maurushat, Alana.
Published 2013
“...SpringerBriefs in Cybersecurity,...”Published 2013
Get full text
Electronic
20