Call Number (LC) | Title | Results |
---|---|---|
HV6773.15.C92 T33 2021 | Tackling cyberbullying and related problems : innovative usage of games, apps and manga / | 1 |
HV6773.15.C92 V43 2020 | Gaming the Dynamics of Online Harassment / | 1 |
HV6773.15.C94 C94 1999i | Cyberstalking, a new challenge for law enforcement and industry a report from the Attorney General to the Vice President. | 1 |
HV6773.15.C94 R49 2012 | The anti-social network : cyberstalking victimization among college students / | 1 |
HV6773.15.C97 |
Cyberspace, cyberterrorism and the international security in the fourth Industrial Revolution : threats, assessment and responses / Cybersecurity risk management : identify, analyze, and mitigate threats to inform business decisions. Battlefield cyber : how China and Russia are undermining our democracy and national security / Countering terrorist activities in cyberspace / Cyberwarfare : an introduction to information-age conflict / How to measure anything in cybersecurity risk / The cybersecurity dilemma : hacking, trust and fear between nations / Inside the enemy's computer : identifying cyber attackers / National cyber emergencies : the return to civil defence / Cyber enigma : unravelling the terror in the cyber world / Cyber risk, intellectual property theft and cyberwarfare : Asia, Europe and the USA / Making Sense of Cyber Capabilities for Small States : Case Studies from the Asia-Pacific. Salafi-jihadism and digital media : the Nordic and international context / EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS the ultimate guide to examining various threats and attacker techniques using security logs / Resilience and hybrid threats : security and integrity for the digital world / Combatting cyber terrorism : a guide to understanding the cyber threat landscape and incident response planning / Common types of attack / Cyberwar and revolution : digital subterfuge in global capitalism / The rest of the cybersecurity story : semiconscious decision-making is a common but too often unacknowledged cause of cyber risks / Cyberterrorism : understanding, assessment, and response / Cyber strategy : the evolving character of power and coercion / Cyberdanger : understanding and guarding against cybercrime / Cyber warfare : truth, tactics, and strategies : strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare / Hybrid threats, cyberterrorism and cyberwarfare / Cyber Crisis / |
34 |
HV6773.15.C97 B37 2022i | India's international cyber operations tracing national doctrines and capabilities / | 1 |
HV6773.15.C97 B43 2016eb | DDoS attacks : evolution, detection, prevention, reaction, and tolerance / | 2 |
HV6773.15.C97 B535 2016 | Policing Cyber Hate, Cyber Threats and Cyber Terrorism. | 1 |
HV6773.15.C97 B57 | Real-Time and Retrospective Analyses of Cyber Security. | 1 |
HV6773.15.C97 B57 2021 | Real-time and retrospective analyses of cyber security / | 1 |
HV6773.15.C97 C45 2015 | China and cybersecurity : espionage, strategy, and politics in the digital domain / | 1 |
HV6773.15.C97 C55 2016 | Cyberespace et terrorisme / | 1 |
HV6773.15.C97 C635 2021 | Cyber crisis : protecting your business from real threats in the virtual world / | 1 |
HV6773.15.C97 C66 2012eb |
Cyber conflict : competing national perspectives / Cyber conflict competing national perspectives / |
3 |
HV6773.15.C97 C87 2015eb | Current and emerging trends in cyber operations : policy, strategy and practice / | 1 |
HV6773.15.C97 C88 2022 | Cyber peace : charting a path toward a sustainable, stable, and secure cyberspace / | 2 |
HV6773.15.C97 C93 2014 | Cyberespace : enjeux géopolitiques. | 1 |
HV6773.15.C97 C93 2017 | Horizon. the inside story / | 1 |
HV6773.15.C97 C93 2023 | Cyberdefense : the next generation / | 1 |
HV6773.15.C97 .D555 2019 | Cyber Enigma : Unravelling the Terror in the Cyber World. | 1 |