Searching Books & More : "Computer security"

Cyberterrorism X
57 results found in Books & More
RSS
Cover images provided by Open Library

Guide for security authorization of federal information systems a security life cycle approach

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Open source bibliography

Published: [Washington, D.C.] : President's Commission on Critical Infrastructure Protection, 1997
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Stealing the network : how to own a shadow : the chase for Knuth

Published: Rockland, Mass. : Syngress, 2007
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Cyber blockades

Published: Washington DC : Georgetown University Press, [2014]
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Cyber crime, security and digital intelligence

Published: Farnham, Surrey : Gower Publishing Limited, [2013]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cyber security a crisis of prioritization

Published: Arlington, Va. : National Coordination Office for Information Technology Research and Development, [2005]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Power and security in the information age investigating the role of the state in cyberspace

Published: Aldershot, Hants, England ; Burlington, VT : Ashgate, c2007
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Toward a safer and more secure cyberspace

Published: Washington, DC : National Academies Press, c2007
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Report to the President : immediate opportunities for strengthening the Nation's cybersecurity

Published: [Washington, D.C.] : Executive Office of the President, President's Council of Advisors on Science and Technology, 2013
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cyber Security and IT Infrastructure Protection

Published: Rockland, Massachusetts : Syngress 2014
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

How to own a shadow : the chase for Knuth

Published: Rockland, MA : Syngress, c2007
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Insider attack and cyber security beyond the hacker

Published: New York : Springer, c2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Protecting critical infrastructures against cyber-attack

Published: Oxford ; New York : Oxford University Press, c2003
Format: Print
Retrieving Holdings Information
Cover images provided by Open Library

Smart grid cyber security strategy and requirements

Published: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource, Remote
Retrieving Holdings Information