5 Results Found Subscribe to search results
00000IIE
Print
1. 
Cover image for Cyber Security : A practitioner's guide
by 
Sutton, David (Information security practitioner), author.
Format: 
Books
Publication Date 
2017
Excerpt: 
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
Available: Copies:
2. 
Cover image for Managing cyber attacks in international law, business, and relations : in search of cyber peace
by 
Shackelford, Scott J. author.
Format: 
Books
Publication Date 
2014
Excerpt: 
Defining the cyber threat in internet governance -- Who controls cyberspace? Analyzing cyber
Available: Copies:
3. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
by 
Gragido, Will.
Format: 
Books
Publication Date 
2011
Excerpt: 
Cybercrime and espionage : an analysis of subversive multivector threats / Gragido, Will.
Available: Copies:
4. 
Cover image for Computer fraud casebook : the bytes that bite
by 
Wells, Joseph T.
Format: 
Books
Publication Date 
2009
Excerpt: 
Dervaes -- The man who told on himself / Alan Greggo and Mike Jessee -- Triple threat / Jean
Available: Copies:
5. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Available: Copies:
Limit Search Results
Access Level
Format
Item Category 1
Language
Publication Date
Item Available