Critical Infrastructure Protection, Risk Management, and Resilience : A Policy Perspective
Kelley A. Pesch-Cronin
Download - Immediately Available
Format: eBook (PDF)
Critical Infrastructure Protection, Risk Management, and Resilience : A Policy Perspective
Kelley A. Pesch-Cronin
Download - Immediately Available
Format: eBook (EPUB)
Security Framework for The Internet of Things Applications
Salma Abdalla (Maquarie university, Australia) Hamad
Download - Immediately Available
Format: eBook (PDF)
Security Framework for The Internet of Things Applications
Salma Abdalla (Maquarie university, Australia) Hamad
Download - Immediately Available
Format: eBook (EPUB)
Facial Recognition Technology : Current Capabilities, Future Prospects, and Governance
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Information Technology Control and Audit, Fifth Edition
Angel R. (Florida Institute of Technology, Melbourne, USA) Otero
Download - Immediately Available
Format: eBook (PDF)
Information Technology Control and Audit, Fifth Edition
Angel R. (Florida Institute of Technology, Melbourne, USA) Otero
Download - Immediately Available
Format: eBook (EPUB)
Cyber-Physical Systems : Integrated Computing and Engineering Design
Fei (University of Alabama, Tuscaloosa, USA) Hu
Download - Immediately Available
Format: eBook (PDF)
Cryptography : Theory and Practice
Douglas Robert (University of Waterloo, Ontario, Canada) Stinson
Download - Immediately Available
Format: eBook (PDF)
Online Social Networks Security : Principles, Algorithm, Applications, and Perspectives
Brij B. (National Institute of Technology Kurukshetra, India) Gupta
Download - Immediately Available
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
Foundational Cybersecurity Research : Improving Science, Engineering, and Institutions
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler
Download - Immediately Available
Format: eBook (EPUB)
At the Nexus of Cybersecurity and Public Policy : Some Basic Concepts and Issues
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Sharing Health Data : The Why, the Will, and the Way Forward
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Health Data Sharing to Support Better Outcomes : Building a Foundation of Stakeholder Trust
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
What Do We Know and What Should We Do About Internet Privacy?
Paul Bernal
Download - Immediately Available
Format: eBook (EPUB)
What Do We Know and What Should We Do About Internet Privacy?
Paul Bernal
Download - Immediately Available
Format: eBook (PDF)
Data Thieves in Action : Examining the International Market for Stolen Personal Information
Thomas J. Holt
Download - Immediately Available
Format: eBook (PDF)
The 'Orange Book' Series
US Department of Defense
Download - Immediately Available
Format: eBook (PDF)
Cybersecurity : Ethics, Legal, Risks, and Policies
Ishaani (University of Delaware) Priyadarshini
Download - Immediately Available
Format: eBook (PDF)
Cybersecurity : Ethics, Legal, Risks, and Policies
Ishaani (University of Delaware) Priyadarshini
Download - Immediately Available
Format: eBook (EPUB)
Architecture or Revolution : Emancipatory Critique After Marx
Nadir (University of Pennsylvania, USA) Lahiji
Download - Immediately Available
Format: eBook (EPUB)