Showing 1 - 20 results of 2,214 for search '"cybersecurity"', query time: 0.23s Refine Results
  1. 1
    by Gupta, C. P., Goyal, K. K.
    Published 2020
    Table of Contents: ...Cybersecurity_Ch00_FM.pdf -- Cybersecurity_Ch01.pdf -- Cybersecurity_Ch02.pdf -- Cybersecurity_Ch03...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  2. 2
    by Diffee, Erica, Datta, Pratim
    Published 2018

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  3. 3
    by Diogenes, Yuri, Ozkaya, Erdal
    Published 2022

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  4. 4
    Published 2015
    Table of Contents: ...Cybersecurity, the strategic view / by Kah-Kin Ho -- Networks on fire, defending critical...

    Book
  5. 5
    by Gupta, C. P., Goyal, K. K., Goyal, K. K.
    Published 2020
    Table of Contents: ...Cybersecurity_Ch00_FM.pdf -- Cybersecurity_Ch01.pdf -- Cybersecurity_Ch02.pdf -- Cybersecurity_Ch03...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  6. 6
    Published 2019
    ...Cybersecurity (McFarland & Company)...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  7. 7
    by Ozkaya, Erdal
    Published 2019
    Table of Contents: ...Chapter 1. Importance of cybersecurity -- Chapter 2. Security evolution -- from legacy to advanced...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  8. 8
    Published 2015
    Table of Contents: ... in Cybersecurity /...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  9. 9

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  10. 10
    Published 2015
    Table of Contents: ... in Cybersecurity -- Chapter 2: Critical Infrastructures, Key Assets : A Target-Rich Environment -- Chapter 3...

    Book
  11. 11
    by Blau, Alex et al
    Published 2019
    Table of Contents: ... in cybersecurity: leaders need to stop thinking about cybersecurity as a problem that can be solved / by Alex Blau...

    Book
  12. 12
    Published 2019
    Table of Contents: ... in cybersecurity: leaders need to stop thinking about cybersecurity as a problem that can be solved / by Alex Blau...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  13. 13
    Published 2022

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  14. 14
    Published 2018
    ...Cybersecurity (Singapore)...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Serial
  15. 15
    Published 2019
    Table of Contents: ... -- Cybersecurity and America's Governments / Roger L. Kemp -- NACo Members Zero In on Cybersecurity, Tech Safety...

    Book
  16. 16
    Table of Contents: ...Introduction to Cyber Ethics -- Ethical Issues in Cybersecurity -- Cybersecurity Ethics: Cyberspace...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  17. 17
    by Wilson, Duane
    Published 2021
    Table of Contents: ...Cybersecurity origins -- Foundations -- Cryptography demystified -- Cybersecurity in layers -- Who...

    This item is not available through BorrowDirect. Please contact your institution’s interlibrary loan office for further assistance.
    Book
  18. 18
    by Wilson, Duane
    Published 2021
    Table of Contents: ...Cybersecurity origins -- Foundations -- Cryptography demystified -- Cybersecurity in layers -- Who...

    Book
  19. 19
    by Shoemaker, Dan
    Published 2012
    Table of Contents: ...Two Common Sense Assumptions for Cybersecurity --...

    Book
  20. 20