Biblio

Export 21400 results:
2014
Kominsky, Mitchell. "The Current Landscape of Cybersecurity Policy: Legislative Issues in the 113th Congress." Harvard Law School National Security Journal (2014).
Cyber Glossary In National Initiative for Cybersecurity Careers and Studies., 2014.
Cyber Security Challenge UK., 2014.
Boyanov, L., and Zlatogor Minchev. "Cyber Security Challenges in Smart Homes, Cyber Security and Resiliency Policy Framework." Cyber Security and Resiliency Policy Framework 38 (2014).
Keegan, Christopher. "Cyber Security in the Supply Chain: A Perspective from the Insurance Industry." Technovation 7, no. 34 (2014): 380-381.
Cyber Security Incident Response: Are We as Prepared as We Think?. Ponemon Institute, 2014.
Franke, Ulrik, and Joel Brynielsson. "Cyber situational awareness - A systematic review of the literature." Computers & Security 46 (2014): 18-31.
Franke, Ulrik, and Joel Brynielsson. "Cyber Situational Awareness: A Systematic Review of the Literature." Computers & Security 46 (2014): 18-31.
Minchev, Zlatogor. Cyber Threats Analysis In On-Line Social Networks With A Study On User Response In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2014.
Wilson, Clay. "Cyber Threats to Critical Information Infrastructure." In Cyberterrorism, 123-136. New York, NY, USA: Springer, 2014.
Cybersäkerhetscentrets Verksamhetsplan 2014–2016. Kommunikationsverket, 2014.
DoDI), Department of Defense. Cybersecurity., 2014.
Singer, P. W., and Allan Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press, 2014.
Singer, P. W., and Allan Friedman. Cybersecurity and Cyberwar, What Everyone Needs to Know. Oxford University Press, 2014.
Geer, Dan. "Cybersecurity as Realpolitik." In Black Hat USA 2014 Conference., 2014.
Cybersecurity Capability Maturity Model (C2M2), Version 1.1., 2014.
Wandera, Max, Brent Jonasson, and Jacques Benoit. Cybersecurity Considerations for Electrical Distribution Systems In White Paper., 2014.
Cybersecurity in 2015: What to expect? In 2015 Global Megatrends in Cybersecurity. ZDNET, 2014.
Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model In Complimentary Report . Milpitas: FireEye Inc., 2014.
Cybersecurity strategy of Ukraine In draft., 2014.
Cybersecurity's Maginot Line: A Real-world Assessment of the Defense-in-Depth Model In Complimentary Report. Milpitas: FireEye Inc., 2014.
Burt, David, Aaron Kleiner, Paul Nicholas, and Kevin Sullivan. Cyberspace 2025: Navigating the Future of Cybersecurity Policy. Microsoft Corporation, 2014.
Appel, Edward J.. Cybervetting: Internet Searches for Vetting, Investigations, and Open-Source Intelligence. Taylor & Francis Group, LLC, 2014.
Mehan, Julie. CyberWar, CyberTerror, CyberCrime and CyberActivism: An In-depth Guide to the Role of Standards in the Cybersecurity Environment. IT Governance Publishing, 2014.
Evangelista, Stefania, Giovanni De Marinis, Cristiana Di Cristo, and Angelo Leopardi. "Dam-break dry granular flows: experimental and numerical analysis." Wseas Transactions on Environment and Development 10 (2014).

Pages