Your search returned 12 results.

1.
Strategic intelligence management : national security imperatives and information and communications technologies / Edited by Babak Akhgar, Simeon Yates.

by Akhgar, Babak | Yates, Simeon.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Elsevier, BH, Butterworth-Heinemann is an imprint of Elsevier, c2013Availability: Items available for loan: Main LibraryCall number: TK 5102.85 STR (2).

2.
Fighting Terror in Cyberspace.

by Last, Mark | Kandel, Abraham.

Series: Series in Machine Perception and Artificial Intelligence SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : World Scientific Publishing Co Pte Ltd, 2005Copyright date: ©2005Online access: Click to View Availability: No items available :

3.
CyberWar, CyberTerror, CyberCrime.

by Mehan, Julie E.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambs : IT Governance Publishing, 2008Copyright date: ©2008Online access: Click to View Availability: No items available :

4.
Web Intelligence and Security : Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web.

by Last, M | Kandel, A | NATO Advanced Research Workshop on Web Intelligence and Security | IOS Press.

Series: NATO Science for Peace and Security - D : Information and Communication SecurityMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Amsterdam : IOS Press, 2010Copyright date: ©2010Online access: Click to View Availability: No items available :

5.
Cyber Risks for Business Professionals : A Management Guide.

by Kendrick, Rupert.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambs : IT Governance Ltd, 2010Copyright date: ©2010Online access: Click to View Availability: No items available :

6.
Strategic Intelligence Management : National Security Imperatives and Information and Communications Technologies.

by Akhgar, Babak | Yates, Simeon.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oxford : Elsevier Science & Technology, 2013Copyright date: ©2013Online access: Click to View Availability: No items available :

7.
Crisis and Escalation in Cyberspace.

by Libicki, Martin C.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Santa Monica : RAND Corporation, The, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

8.
Cyber Security and IT Infrastructure Protection.

by Vacca, John R.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : William Andrew, 2013Copyright date: ©2014Online access: Click to View Availability: No items available :

9.
Emerging Trends in ICT Security.

by Akhgar, Babak | Arabnia, Hamid R.

Series: Emerging Trends in Computer Science and Applied Computing SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: San Francisco : Elsevier Science & Technology, 2013Copyright date: ©2014Online access: Click to View Availability: No items available :

10.
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013.

by Furnell, Steven | Ginodman, Veniamin | Obelets, Natalya.

Series: Information Management & Computer Security: Volume 22, Issue 2Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Bradford : Emerald Publishing Limited, 2014Copyright date: ©2014Online access: Click to View Availability: No items available :

11.
Cyber Blockades.

by Russell, Alison Lawlor.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Washington : Georgetown University Press, 2014Copyright date: ©2014Online access: Click to View Availability: No items available :

12.
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection.

by Čaleta, D | Radosevic, S.

Series: NATO Science for Peace and Security Series - D: Information and Communication SecurityMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Burke : IOS Press, 2014Copyright date: ©2014Online access: Click to View Availability: No items available :

Powered by Koha