Biblio

Export 21423 results:
2019
Cybersecurity Capability Maturity Model (C2M2), Version 2.0(link is external)., 2019.
Oloidi, Aramide. Cyber-security Challenges in Financial Institutions in Nigeria: A Multiple Case Study. Vol. PhD dissertation. San Diego, CA: Northcentral University, 2019.
Morris, Gerald F.. The Cyber-Security Concerns regarding the Internet of Things Associated with the Critical Infrastructure within Northern Nevada. Northcentral University, 2019.
Cybersecurity Considerations for Institutions of Higher Education., 2019.
Gonzalez, III, Joaquin Jay, and Roger L. Kemp. Cybersecurity: Current Writings on Threats and Protection . Jefferson, NC: McFarland, 2019.
Asghar, Muhammad Rizwan, Qinwen Hu, and Sherali Zeadally. "Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges." Computer Networks 165 (2019): 106946.
Cybersecurity in the shipping industry(link is external) In Capital Link Cyprus Shipping Forum, Deloitte., 2019.
Cybersecuritymonitor 2019(link is external). CBS, 2019.
"Cyberspace(link is external)." In The United Nations Terminology Database., 2019.
Gonçalves, Carlos Pedro. "Cyberspace and Artificial Intelligence: The New Face of Cyber-Enhanced Hybrid Threats." In Cyberspace. Books on Demand, 2019.
The National Institute of Standards and Technology. Cyberspace (Definition)(link is external)., 2019.
Raychev, Yavor. "Cyberwar in Russian and USA Military-Political Thought: A Comparative View." Information & Security: An International Journal 43, no. 3 (2019): 349-361.
CYREX 2018 Web Page(link is external)., 2019.
Stein, Silvia. Dal Macro al Micro Grilletto: Modello del Stato Mentale come il Variabile Moderante nella Gestione di Conflitti Organizzativi., 2019.
Zareapoor, Masoumeh, Pourya Shamsolmoali, and Afshar M. Alam. "Data Mining for Secure Online Payment Transaction Data Mining for Secure Online Payment Transaction." In Digital Currency: Breakthroughs in Research and Practice. IGI Global, 2019.
Richter, Heiko, and Peter R. Slowinski. "The Data Sharing Economy: On the Emergence of New Intermediaries." International Review of Intellectual Property and Competition Law 50 (2019): 4-29.
Kim, Dohoon. "Decision-Making Method for Estimating Malware Risk Index." Applied Sciences 9, no. 22 (2019): 4943.
Kveberg, Torbjørn, Vårin Alme, and Sverre Diesen. Defence against foreign influence -a value-based approach to define and assess harm, and to direct defence measures In FFI-RAPPORT . Norwegian Defence Research Establishment (FFI) , 2019.
The Defence Innovation Greenhouse(link is external)., 2019.
Defending against today’s critical threats In 2019 Threat Report. Cisco, 2019.
Defense Intelligence and Security Service (MIDD)(link is external)., 2019.
McKenna, Matthew A.. Deficiencies in Electoral Security: Outcomes of the 2007 and 2013 Kenyan Elections. Vol. Master's thesis. Harvard Extension School, 2019.
Berutti, Martin. Defining the digital twin: 7 essential steps(link is external). ICE - Institution of Civil Engineers, 2019.
Nissen, Christopher A., John E. Gronager, Robert S. Metzger, Rogers Joseph O’Donnell, and Harvey Rishikof. Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience. Washington, DC: MITRE, 2019.
Lunn, Simon, and Nicholas Williams. The Demise of the INF Treaty: What Are the Consequences for NATO(link is external) In Policy Brief, European Leadership Network., 2019.

Pages