Search Results - Allen Hatcher~
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 4
- Computer crimes 2
- Computer hackers 2
- Cyberterrorism 2
- History 2
- Data mining 1
- Espionage 1
- Finance, Personal 1
- Finance, Public 1
- Hackers 1
- Information warfare 1
- Intelligence service 1
- Internal security 1
- Internet governance 1
- Military interrogation 1
- Moral and ethical aspects 1
- Penetration testing (Computer security) 1
- Philosophy 1
- Political ethics 1
- Prevention 1
- Professional ethics 1
- Secret service 1
- Spies 1
- Teams in the workplace 1
- Telecommunication 1
- Temporal databases 1
- history 1
- security measures 1
-
1
-
2
-
3
-
4
The Fathers of New England A Chronicle of the Puritan Commonwealths
Published 2009Get full text
Rights
Electronic eBook -
5
-
6
-
7
-
8
The Copper Princess: A Story of Lake Superior Mines
Published 2008Get full text
Rights
Electronic eBook -
9
-
10
-
11
Ethics of spying a reader for the intelligence professional.
Published 2010Table of Contents: “…Professionalization of intelligence (1984) / George Allen -- Office of Naval Intelligence's Special intelligence memorandum (1941) / Randy Balano and John L. …”
Book -
12
-
13
Cyber insecurity navigating the perils of the next information age
Published 2016Table of Contents: “…Understanding internet security governance / Trey Herr and Heather West -- A holistic approach to the encryption debate / Aaron Brantly -- Certificate authorities: modernizing the internet's chain of trust / Adrienne Allen -- Multistakeholder approaches to cybersecurity challenges / Allan Friedman and Jonah F. …”
Book -
14
The virtual battlefield perspectives on cyber warfare
Published 2009Table of Contents: “…/ Forrest Hare -- Towards a global regime for cyber warfare / Rex Hughes -- What analogies can tell us about the future of cybersecurity / David Sulek, Ned Moran -- The information sphere domain-increasing understanding and cooperation / Patrick D. Allen, Dennis P. Gilbert Jr. -- Sun Tzu was a hacker : an examination of the tactics and operations from a real world cyber attack / Billy K. …”
Book


