Emerging trends in ICT security
Discusses the foundations and theoretical aspects of ICT security. This title covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation. It gives you the knowledge needed for successful deployment of security solutions in many environments.
Saved in:
| Other Authors: | Akhgar, Babak, Arabnia, Hamid |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Morgan Kaufmann/Elsevier
[2014]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019)
Published: (2019)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Managing cyber threats
Published: (2015)
Published: (2015)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020)
Published: (2020)
Power and security in information age investigating the role of the state in cyberspace
Published: (2007)
Published: (2007)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Developments in information security and cybernetic wars
Published: (2019)
Published: (2019)
The use of cyberspace as a platform to conduct cyberterrorism a case study on ISIS
by: Ahmad Nizam Adnan
by: Ahmad Nizam Adnan
Utilization of new technologies in global terror emerging research and opportunities
by: Stacey, Emily 1984
Published: (2019)
by: Stacey, Emily 1984
Published: (2019)
The virtual battlefield perspectives on cyber warfare
Published: (2009)
Published: (2009)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
Introduction to intelligent surveillance
by: Yan, Wei Qi
Published: (2017)
by: Yan, Wei Qi
Published: (2017)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Surveillance and threat detection prevention versus mitigation
by: Kirchner, Richard, Jr
Published: (2014)
by: Kirchner, Richard, Jr
Published: (2014)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Securing social media in the enterprise
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Educational research trends in ICT
Published: (2014)
Published: (2014)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
Ninja hacking unconventional penetration testing tactics and techniques
by: Wilhelm, Thomas
Published: (2011)
by: Wilhelm, Thomas
Published: (2011)
Sailing safe in cyberspace protect your identity and data
by: Kaushik, Anjali
Published: (2013)
by: Kaushik, Anjali
Published: (2013)
Similar Items
-
Cyber security and IT infrastructure protection
Published: (2014) -
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019) -
Cyber insecurity navigating the perils of the next information age
Published: (2016) -
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013) -
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)


