Showing 41 - 60 results of 229 for search '"cyber security"', query time: 0.10s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51
    Published 2015
    Table of Contents: “…Part I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems.…”
    Connect to this title online
    Electronic eBook
  12. 52
  13. 53
    Published 2017
    Table of Contents: “…Srinivasan) -- On Some Information Geometric Approaches to Cyber Security (C. Dodson) -- A Survey of Recent Inequalities for Relative Operator Entropy (S. …”
    Connect to this title online
    Electronic eBook
  14. 54
  15. 55
    Published 2006
    Government Document Microfilm Book
  16. 56
  17. 57
    Published 2023
    Table of Contents: “…Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  18. 58
    by Wright, Christopher
    Published 2019
    Table of Contents: “…; Chapter 2: Cyber security governance; Introduction and overview; Culture and awareness; Threat and risk awareness; Risk management; Responding to cyber incidents; Cyber SOX; Summary: key cyber security questions for directors to ask; Chapter 3: Cyber security risk management; Introduction and overview; Risk management scoping; Process and control mapping…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  19. 59
    Published 2020
    Table of Contents: “…Cyber security issues in distributed microgirds 9. Microgrid cyber security reference architectures, state of art, cyber security forms, DoS and false data injection Cyber security issues in distributed control of microgrids </p> <p><b>Part 5: Cyber Attacks analysis and distributed countermeasures </b>10. …”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  20. 60