Biblio

Export 21393 results:
2015
Minchev, Zlatogor, and Georgi Dukov. "Cyber Intelligence Decision Support in the Era of Big Data." In ESGI 113 Problems & Final Reports Book, 85-92. Sofia: Fastumprint, 2015.
Rajamäki, Jyri, and Juha Knuuttila. Cyber Security and Trust Tools for Multi-agency Cooperation between Public Authorities In Proceedings of the 7th International Conference on Knowledge Management and Information Sharing - KMIS., 2015.
Muller, Lilly Pijnenburg. Cyber Security Capacity Building in Developing Countries: Challenges and Opportunities In Report. Norwegian Institute for International Affairs-NUPI, 2015.
Universities, Cyber Security C.. Cyber Security Competencies: Cyber Security Education and Research in Finnish Universities In 14th European Conference on Cyber Warfare & Security. Hatfield, UK: University of Hertfordshire, 2015.
Cyber Security. Content and Structure. City University London, 2015.
Devi, S. "Cyber Security in India: Problems and Prospects." MA Rather - IITM Journal of Management and IT (2015).
The Cyber Security Modeling Language. KTH Royal Institute of Technology, 2015.
NATO. Cyber Security Strategy Documents. Cooperative Cyber Defence Centre of Excellence (CCDCOE), 2015.
Jajodia, Sushil, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, and Cliff Wang. "Cyber Warfare: Building the Scientific Foundation." In Advances in Information Security, 3. Vol. 56., 2015.
Cyberalbania., 2015.
CyberAware: A Mobile Game-Based App for Cybersecurity Education and Awareness In 2015 International Conference on Interactive Mobile Communication Technologies and Learning, IMCL 2015., 2015.
CyberCrime.BG., 2015.
Liang, Christina Schori. Cyber-Jihad: Understanding and Countering Islamic State Propaganda In Policy Paper. Geneva: Geneva Center for Security Policy, 2015.
Lakomy, Miron. Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw. Vol. 21. Katowice: Wydawnictwo Uniwersytetu Śląskiego, 2015.
Nolan, Andrew. Cybersecurity and Information Sharing: Legal Challenges and Solutions In CRS Report. Congressional Research Service, 2015.
Newmeyer, K.. Cybersecurity and the 2015 State of the Union Address. Cyber Experts Blog at National Cybersecurity Institute., 2015.
"Cybersecurity and the Internet of Things ." EY (2015).
Delibert, A. C., M.W. Laurent, and Schneider L.L.. "Cybersecurity: Could Investment Company Directors be Liable for a Breach? ." The Investment Lawyer 22, no. 2 (2015).
Cybersecurity Doctrine of the Republic of Poland. National Security Bureau (Biuro Bezpieczenstwa Narodowego), 2015.
Newmeyer, K.. Cybersecurity in the President’s National Security Strategy. Cyber Experts Blog at National Cybersecurity Institute., 2015.
Pot, ii, Oleksandr V., Oleksandr V. Korneyko, and Yrii I. Gorbenko. "Cybersecurity in Ukraine: Problems and Perspectives." Information & Security: An International Journal 32, no. 1 (2015): 71-94.
Choejey, Pema, Chun Che Fung, Kok Wai Wong, David Murray, and Hong Xie. Cybersecurity Practices for E - Government: An Assessment in Bhutan In The 10 th International Conference on e - Business (iNCEB2015)., 2015.
Choejey, Pema, Chun Che Fung, Kok Wai Wong, David Murray, and Hong Xie. "Cybersecurity Practices for E-Government: An Assessment in Bhutan." In The 10th International Conference on e-Business (iNCEB2015)., 2015.
Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats." Information & Security: An International Journal 32, no. 2 (2015): 155-174.
Williams, Patricia A. H., and Andrew J. Woodward. "Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem." Medical Devices 8 (2015): 305-316.

Pages