Search Results - "cyber security"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Cyber security essentials by Graham, James, Howard, Richard, Olson, Ryan

    Published 2011
    Table of Contents: “…1. Cyber security fundamentals -- 2. Attacker techniques and motivations -- 3. …”
  2. 2
  3. 3
  4. 4

    OIC-CERT Journal of Cyber Security

  5. 5
  6. 6

    Cyber security policy guidebook by Bayuk, Jennifer L.

    Published 2012
    Table of Contents: “…Introduction -- 2. Cyber security evolution -- 3. Cyber security objectives -- 4. …”
  7. 7
  8. 8

    Cyber crime, security and digital intelligence by Johnson, Mark , 1959-

    Published 2013
    Table of Contents: “…The cybercrime challenge -- 2. The cyber security response…”
  9. 9

    Issues in human security in Asia

    Published 2011
    Table of Contents: “…Governance, politics and identity -- 5. Terrorism, cyber security and cyberspace -- 6. Maritime security and piracy -- 7. …”
    Table of contents only
  10. 10

    Internet of things, for things and by things by Chaudhuri, Abhik

    Table of Contents: “…Internet of things and regulations -- 11. IoT cyber security - a discourse on the human dimension…”
  11. 11

    Industrial network security : securing critical infrastructure networks for smart grid, scada, and other industrial control systems by Knapp, Eric D., Langill, Joel

    Published 2015
    Table of Contents: “…About Industrial Networks -- 3. Industrial Cyber Security, History and Trends -- 4. Introduction to ICS Systems and Operations -- 5. …”
  12. 12

    Security and resilience in intelligent data-centric systems and communication networks

    Table of Contents: “…Risk Assessment and Monitoring in Intelligent Data-Centric Systems -- 3. The Cyber Security Challenges in the IoT Era -- 4. IoT and Sensor Networks Security -- 5. …”
  13. 13

    Embracing issues and challenges during COVID-19

    Published 2020
    Table of Contents: “…Online learning from the perspective of cyber security -- 8. Online learning: from brick to click amid -- 9. …”
  14. 14

    Data mining and machine learning in cybersecurity by Dua, Sumeet, Du, Xian

    Published 2011