Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-37 of 37)
Computer networks -- Security measures -- United States
1
E-book
2021

Aan quan fang yu ru men shou ce = Defensive security handbook


Brotherston, Lee, author.
[First edition]
Beijing ; Boston : O'Reilly Media ; Beijing : Ren min you dian chu ban she, 2021

Rating:

 
3
E-book
2014

Behold a Pale Farce : Cyberwar, Threat Inflation, & the Malware Industrial Complex


Blunden, Bill

[Place of publication not identified] : Trine Day, 2014

Rating:

 
4
Streaming audio
2022

Breached! : why data security law fails and how to improve it


Solove, Daniel J., 1972- author.
[First edition]
[Prince Frederick, Maryland] : Recorded Books, 2022

Rating:

 
5
E-book
2019

Bridging the gap : how an airborne mobile-mesh network can overcome space vulnerabilities in tomorrow's fight


Patterson, Travis, author

Maxwell Air Force Base, Alabama : Air University Press, Muir S. Fairchild Research Information Center, 2019

Rating:

 
10
E-book
2014

Critical infrastructure protection in homeland security : defending a networked nation


Lewis, T. G. (Theodore Gyle), 1941-
2nd edition
Hoboken, New Jersey : John Wiley & Sons, [2014]

Rating:

 
11
E-book
2017

Cyber and Deterrence : the Military-Civil Nexus in High-End Conflict


Kramer, Franklin D., 1945- author.

Washington, D.C. : Atlantic Council, [2017]

Rating:

 
12
E-book
2016

Cyber, Extended Deterrence, and NATO


Kramer, Franklin D., 1945- author.

Washington, D.C. : Atlantic Council, [2016]

Rating:

 
13
Book
2008

Cyber-security and threat politics : US efforts to secure the information age


Dunn Cavelty, Myriam.

London : Routledge, 2008

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Dun/Csa  AVAILABLE
18
Book
2009

Cyberdeterrence and cyberwar


Libicki, Martin C.

Santa Monica, CA : RAND, 2009

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  355.343 Lib/Cac  AVAILABLE
 MELB  355.343 Lib/Cac  AVAILABLE
19
E-book
2009

Cyberdeterrence and cyberwar


Libicki, Martin C.



Rating:

 
20
E-book
2014

Cybersecurity and cyberwar : what everyone needs to know


Singer, P. W. (Peter Warren), author.

Oxford : Oxford University Press, [2014]

Rating:

 
21
Book
2005

Cybersecurity and homeland security




New York : Nova Science Publishers, 2005

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Cho/Cah  AVAILABLE
24
Book
1996

The cyberthief and the samurai


Goodell, Jeff.

New York : Dell, 1996

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  364.168092 Mitnic Goo/Cat  AVAILABLE
25
E-book
2017

Defensive security handbook : best practices for securing infrastructure


Brotherston, Lee, author.

Sebastopol, CA : O'Reilly Media, 2017

Rating:

 
26
28
E-book
2019

Implications of Service Cyberspace Component Commands for Army Cyberspace Operations


Caton, Jeffrey L.

Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, 2019

Rating:

 
29
E-book
2015

Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles


Snyder, Don, 1962- author.

Santa Monica, Calif. : RAND, [2015]

Rating:

 
30
E-book
2003

Information technology for counterterrorism : immediate actions and future possibilities


National Research Council (U.S.). Committee on the Role of Information Technology in Responding to Terrorism



Rating:

 
32
E-book
2017

A Nonstate Strategy for Saving Cyberspace


Healey, Jason, author.

Washington, D.C. : Atlantic Council, [2017]

Rating:

 
33
Book
2004

Outsourcing information security


Axelrod, C. Warren.

Boston : Artech House, 2004

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8068 Axe/Ois  AVAILABLE
34
E-book
2004

Outsourcing information security


Axelrod, C. Warren.



Rating:

 
35
Book
1998

Protecting yourself online : the definitive resource on safety, freedom, and privacy in cyberspace


Gelman, Robert B.
First edition
New York : HarperEdge : HarperCollins, [1998]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  KM 209 P7 G1 Gel/Pyo  AVAILABLE
36
Book
2002

Protection of USA's national information superstructure


Jordan, C.

Geelong, Vic. : Deakin University, School of Computing and Mathematics, 2002

Rating:

 
 
Location Call no. Vol. Availability
 ADPML SPDU  658.4780973 Jor/Pou  LIB USE ONLY
37
E-book
2017

Rebuilding trust between Silicon Valley and Washington


Segal, Adam, 1968- author.

New York, NY : Council on Foreign Relations, [2017]

Rating:

 
Add Marked to Bag Add All On Page
Locate in results