by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
by
Shackelford, Scott J. author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html
Format:
Books
Publication Date
2014
Excerpt:
Defining the cyber threat in internet governance -- Who controls cyberspace? Analyzing cyber
by
Gragido, Will.
Format:
Books
Publication Date
2011
Excerpt:
Cybercrime and espionage : an analysis of subversive multivector threats / Gragido, Will.
by
Wells, Joseph T.
Format:
Books
Publication Date
2009
Excerpt:
Dervaes -- The man who told on himself / Alan Greggo and Mike Jessee -- Triple threat / Jean
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Limit Search Results
Narrowed by: