Suggested Topics within your search.
Suggested Topics within your search.
Computer security
110
Security measures
68
Computer networks
62
Prevention
50
Computer crimes
39
Cyberterrorism
36
Computer science
34
Computer Science
31
Systems and Data Security
25
Law and legislation
23
Data protection
17
Artificial intelligence
14
Management
14
Security
13
Computer Communication Networks
11
Information Systems Applications (incl. Internet)
10
Information technology
10
Internet
10
Engineering
9
National security
9
Computational intelligence
8
Data processing
8
General
8
Internet of things
8
Artificial Intelligence (incl. Robotics)
7
COMPUTERS
7
Computational Intelligence
7
Computers
7
Data encryption (Computer science)
7
Big data
6
-
41Published 2002Connect to this title online
Connect to this title online
Government Document Microfilm Book -
42by PETRENKO, SERGEITable of Contents: Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Published 2018
Electronic eBook -
43Published 2002Connect to this title online
Connect to this title online
Government Document Microfilm Book -
44
-
45
-
46Published 2002Connect to this title online
Connect to this title online
Government Document Microfilm Book -
47Published 2019Table of Contents: Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
48
-
49
-
50
-
51Published 2015Table of Contents: “…Part I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems.…”
Connect to this title online
Electronic eBook -
52
-
53Published 2017Table of Contents: “…Srinivasan) -- On Some Information Geometric Approaches to Cyber Security (C. Dodson) -- A Survey of Recent Inequalities for Relative Operator Entropy (S. …”
Connect to this title online
Electronic eBook -
54
-
55Published 2006Government Document Microfilm Book
-
56
-
57Published 2023Table of Contents: “…Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks.…”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
58by Wright, ChristopherTable of Contents: “…; Chapter 2: Cyber security governance; Introduction and overview; Culture and awareness; Threat and risk awareness; Risk management; Responding to cyber incidents; Cyber SOX; Summary: key cyber security questions for directors to ask; Chapter 3: Cyber security risk management; Introduction and overview; Risk management scoping; Process and control mapping…”
Published 2019
Connect to this title online (unlimited users allowed)
Electronic eBook -
59Published 2020Table of Contents: “…Cyber security issues in distributed microgirds 9. Microgrid cyber security reference architectures, state of art, cyber security forms, DoS and false data injection Cyber security issues in distributed control of microgrids </p> <p><b>Part 5: Cyber Attacks analysis and distributed countermeasures </b>10. …”
Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
Electronic eBook -
60