Managerial guide for handling cyber-terrorism and information warfare
| Main Authors: | Janczewski, Lech , 1943- (Author), Colarik, Andrew M. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA :
Idea Group Publishing ,
c2005
|
| Subjects: |
Similar Items
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Cybercrime and society
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)
by: يوسف، يوسف حسن
Published: (2011)
Cyber attacks and international law on the use of force the turn to information ethics
by: Haataja, Samuli
Published: (2019)
by: Haataja, Samuli
Published: (2019)
Cyber laws and it protection
by: Chander, Harish
Published: (2012)
by: Chander, Harish
Published: (2012)
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed
by: Mohammed, Ammar Abdullah Saeed
Space warfare and strategic defense
by: Pahl, David
Published: (1987)
by: Pahl, David
Published: (1987)
Profiling hackers the science of criminal profiling as applied to the world of hacking
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)
by: Janal, Daniel S.
Published: (1998)
Ew 103 tactical battlefield communications electronic warfare
by: Adamy, David L.
Published: (2009)
by: Adamy, David L.
Published: (2009)
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
Art of deception mereka menipu dunia : Amerika, freemason, Zionis
by: Gray, Jerry D. (Jerry Duane) 1960-
Published: (2012)
by: Gray, Jerry D. (Jerry Duane) 1960-
Published: (2012)
Internet fraud casebook the World Wide Web of deceit
by: Wells, Joseph T.
Published: (2010)
by: Wells, Joseph T.
Published: (2010)
Information systems practice : the complete guide
by: Gunton, Tony , 1943-
Published: (1993)
by: Gunton, Tony , 1943-
Published: (1993)
Fundamentals of information technology
by: Mathew, Anoop
Published: (2013)
by: Mathew, Anoop
Published: (2013)
Insider attack and cyber security beyond the hacker
by: Stolfo, Salvatore J.
Published: (2008)
by: Stolfo, Salvatore J.
Published: (2008)
Information technology and applications : proceedings of the 2014 International Conference on information technology and applications
Published: (2015)
Published: (2015)
Information systems and information technology
Published: (2014)
Published: (2014)
Information architecture designing information environments for purpose
by: Gilchrist, Alan, et al.
Published: (2004)
by: Gilchrist, Alan, et al.
Published: (2004)
Principles of information systems a managerial approach
by: Stair, Ralph M., et al.
Published: (2010)
by: Stair, Ralph M., et al.
Published: (2010)
Information technology : a framework
by: Fitz-Gerald, Lois, et al.
Published: (1991)
by: Fitz-Gerald, Lois, et al.
Published: (1991)
Information technology concepts and issues
by: Laudon, Kenneth C. 1944-, et al.
Published: (1995)
by: Laudon, Kenneth C. 1944-, et al.
Published: (1995)
Management information systems for the information age
by: Haag, Stephen, et al.
Published: (2008)
by: Haag, Stephen, et al.
Published: (2008)
The art of war in the network age back to the future
by: Henrotin, Joseph
Published: (2016)
by: Henrotin, Joseph
Published: (2016)
Information technology in context
by: Griffin, Jacky
Published: (1990)
by: Griffin, Jacky
Published: (1990)
Information technology : an introduction for today's digital world
by: Fox, Richard , 1964-
Published: (2013)
by: Fox, Richard , 1964-
Published: (2013)
Management information systems for the information age
by: Haag, Stephen, et al.
Published: (2010)
by: Haag, Stephen, et al.
Published: (2010)
Introduction to information systems supporting and transforming business
by: Rainer, R. Kelly (Rex Kelly) 1949-, et al.
Published: (2007)
by: Rainer, R. Kelly (Rex Kelly) 1949-, et al.
Published: (2007)
Information technology for management
by: Turban, Efraim, et al.
Published: (2012)
by: Turban, Efraim, et al.
Published: (2012)
Information systems essentials
by: Haag, Stephen, et al.
Published: (2008)
by: Haag, Stephen, et al.
Published: (2008)
Information technology for management
by: Lucas, Henry C.
Published: (2000)
by: Lucas, Henry C.
Published: (2000)
Introduction to information technology
by: Turban, Efraim, et al.
Published: (2001)
by: Turban, Efraim, et al.
Published: (2001)
Information systems solutions a project approach
by: Van Horn, Richard L., et al.
Published: (2006)
by: Van Horn, Richard L., et al.
Published: (2006)
Handbook on business information systems
by: Gunasekaran, Angappa, et al.
Published: (2010)
by: Gunasekaran, Angappa, et al.
Published: (2010)
Information technology and development study of a national IT programme
by: Sharifah M. Alhabshi
Published: (2002)
by: Sharifah M. Alhabshi
Published: (2002)
Similar Items
-
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015) -
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013) -
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012) -
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015) -
Cybercrime and society
by: Yar, Majid
Published: (2006)