452 results Skip to content
VuFind
Advanced
  • 0 items (Full)
  • Your Account
  • Log Out
  • Login
  • Language
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
Advanced
  • Search: "Cyberterrorism"
Showing 1 - 20 of 452 for search: '"Cyberterrorism"', query time: 0.17s
Inside the enemy's computer : identifying cyber attackers
by Guitton, Clement,
Published: Oxford University Press, 2017
Description: 1 online resource : illustrations (black and white)
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Black Hat Kamchatka
by Hammerquist, Oren,
Published: Army Press, 2016
Description: 1 online resource (6 pages) : illustration.
Located: Loading...
Call Number: Loading...
Get full text
eBook
 Place Hold
Save to List
Saved in:
Cover Image
Code Wars America's Cyber Threat
Published: Infobase, 2012
Description: 1 streaming video file (44 min.) : sd., col., digital file.
Located: Loading...
Call Number: Loading...
Video Loading...
Save to List
Saved in:
Cover Image
Cyberwar Threat
Published: Public Broadcasting Service (U.S.), 2015
Description: 1 online resource (1 video file (53 min., 20 sec.)) : sound, color.
Located: Loading...
Call Number: Loading...
Video Loading...
Save to List
Saved in:
Cover Image
Ransomware revolution : the rise of a prodigious cyber threat
by Ryan, Matthew,
Published: Springer, 2021
Description: 1 online resource : illustrations (some color).
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Blackhatonomics : an inside look at the economics of cybercrime
by Gragido, Will.
Published: Syngress, 2013
Description: 1 online resource (xliv, 168 pages :) : illustrations, map.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Waging cyber war : technical challenges and operational constraints
by Oakley, Jacob G.,
Published: Apress, 2019
Description: 1 online resource (200 pages)
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Open source bibliography
Published: President's Commission on Critical Infrastructure Protection, 1997
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Stealing the network : how to own a shadow: the chase for Knuth
by Long, Johnny.
Published: Syngress, 2007
Description: 1 online resource (xxxvi, 409 pages) : illustrations.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
CyberSkills Task Force report
by President's Homeland Security Advisory Council (U.S.). CyberSkills Task Force,
Published: Dept. of Homeland Security, Homeland Security Advisory Council, CyberSkills Task Force, 2012
Description: 1 online resource (41 unnumbered pages)
Located: Loading...
Call Number: Loading...
Get full text
eBook
 Place Hold
Save to List
Saved in:
Cover Image
Inside cyber warfare
2nd ed.
by Carr, Jeffrey.
Published: O'Reilly, 2012
Description: xviii, 294 pages : illustrations, maps ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
The global cyber-vulnerability report
Published: Springer, 2015
Description: 1 online resource : illustrations, maps.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Deterring cybertrespass and securing cyberspace : lessons from United States border control strategies
by Manjikian, Mary,
Published: Strategic Studies Institute and U.S. Army War College Press, 2016
Description: 1 online resource (xiv, 65 pages).
Located: Loading...
Call Number: Loading...
Get full text
eBook
 Place Hold
Save to List
Saved in:
Cover Image
Stealing the network : how to own a continent
Published: Syngress, 2004
Description: 1 online resource.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Understanding the role of connected devices in recent cyberattacks : joint hearing before the Subcommittee on Communications and Technology and the Subcommittee on Commerce, Manufa...
by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Communications and Technology,
Published: U.S. Government Publishing Office, 2017
Description: 1 online resource (v, 127 pages) : illustrations.
Located: Loading...
Call Number: Loading...
Get full text
eBook
 Place Hold
Save to List
Saved in:
Cover Image
How to measure anything in cybersecurity risk
by Hubbard, Douglas W., 1962-
Published: Wiley, 2016
Description: 1 online resource (xv, 280 pages).
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
Information technology in 21st century battlespace : hearing before the Terrorism, Unconventional Threats and Capabilities Subcommittee of the Committee on Armed Services, House of...
by United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities.
Published: U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2004
Description: iv, 242 pages : illustrations ; 24 cm.
Located: Loading...
Call Number: Loading...
Book Loading...
 Place Hold
Save to List
Saved in:
Cover Image
Ecological, societal, and technological risks and the financial sector
Published: Palgrave Macmillan, 2020
Description: 1 online resource.
Located: Loading...
Call Number: Loading...
Electronic Loading...
Save to List
Saved in:
Cover Image
The Cyber War Threat Has Been Grossly Exaggerated A Debate
Published: Infobase, 2014
Description: 1 streaming video file (98 min.) : sd., col.
Located: Loading...
Call Number: Loading...
Video Loading...
Save to List
Saved in:
Cover Image
Cyberdanger : understanding and guarding against cybercrime
by Willems, Eddy,
Published: Springer, 2019
Description: 1 online resource.
Located: Loading...
Call Number: Loading...
eBook Loading...
Save to List
Saved in:
Cover Image
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next »
  • [23]

In Prospector

Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools: Get RSS Feed — Email this Search — Save Search

Narrow Search

Institution
452 Colorado Mesa University see all ...
Collection
278 Gov Pub Electronic 127 Gov Pub Microfiche 36 Electronic Access 4 Main Books 3rd Floor 4 Storage Gov Pub 1 Bestsellers 1st Floor more ... 1 Ref Coll 1st Floor see all ... less ...
Format
222 eBook 104 Microfilm 60 Electronic 43 Book 18 Unknown 4 Video more ... 1 Serial see all ... less ...
Subject
300 Cyberterrorism Prevention 117 Computer networks Security measures 90 Computer security 77 National security 72 Cyberterrorism 66 Cyberinfrastructure Security measures more ... 61 Cyberspace Security measures 54 Rules and practice 41 Cyberterrorism Prevention Government policy 39 Computer security Government policy 33 Computer crimes Prevention 33 Information warfare 30 Computer networks Security measures Government policy 28 Computer security Law and legislation 26 Cyber intelligence (Computer security) 26 Public-private sector cooperation 22 Cyberspace operations (Military science) 21 Cyberspace Government policy 21 Data protection 21 Terrorism Prevention 20 Computer crimes 19 Electric power systems Security measures 17 Infrastructure (Economics) Security measures 16 Data protection Law and legislation 15 Appropriations and expenditures 14 Information technology 13 Information resources management 12 Armed Forces 11 Security measures 10 Cyberterrorism Law and legislation see all ... less ...
Author
34 United States. Congress. House. Committee on Homeland Security, 26 United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, 17 Library of Congress. Congressional Research Service, 16 United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs, 15 United States. Congress. Senate. Committee on Armed Services, 15 United States. Congress. Senate. Select Committee on Intelligence, more ... 13 United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities 12 Army War College (U.S.). Strategic Studies Institute, 12 United States. Congress. House. Committee on Armed Services, 11 Army War College (U.S.). Press, 11 SpringerLink (Online service) 11 United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity and Infrastructure Protection, 9 ScienceDirect (Online service) 9 United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities, 9 United States. Congress. Senate. Committee on Energy and Natural Resources, 8 United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology 6 Oxford Scholarship Online 6 United States. Congress. House. Committee on Homeland Security. Subcommittee on Counterterrorism and Intelligence, 6 United States. Congress. House. Committee on Science 6 United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Crime and Terrorism, 5 United States. Congress. House. Committee on Energy and Commerce, 5 United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census 5 United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation, 5 United States. Congress. House. Committee on Small Business, 5 United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, Science, and Research and Development 5 United States. Congress. Senate. Committee on Commerce, Science, and Transportation, 5 United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs 4 Caton, Jeffrey L., 4 United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities 4 United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology see all ... less ...
Language
452 English 1 Dutch see all ...
Genre
167 Legislative hearings 47 Legislative materials 14 Bibliographies 4 Conference papers and proceedings 3 Case studies 2 Congresses more ... 1 Catalogs 1 Encyclopedias 1 Fiction 1 Handbooks and manuals 1 Short stories 1 Statutes and codes 1 Thrillers (Fiction) 1 War fiction see all ... less ...
Literary Form
425 Non fiction 2 Fiction 1 Short stories see all ...
Era
9 2016 3 21st century 1 1946- 1 2017- see all ...
Region
395 United States 24 Russia (Federation) 15 China 10 Iran 4 Middle East 3 Europe more ... 2 California 2 Germany 2 Montenegro 1 Colorado 1 Korea (North) 1 Korea (South) 1 Latin America 1 New York (State) 1 South Dakota see all ... less ...
Call Number
302 K - Law 29 D - World History 27 H - Social Science 17 L - Education 16 P - Language and Literature 16 Q - Science more ... 8 U - Military Science 6 C - Historical Sciences 5 J - Political Science 2 G - Geography, Anthropology, Recreation 1 A - General Works 1 F - General American History 1 S - Agriculture 1 T - Technology see all ... less ...
Year of Publication
chat loading...

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Course Reserves

Need Help?

  • Search Tips
  • Ask a Librarian
Loading...
Chat requires JavaScript.
Ask a Librarian!
Ask a Librarian!
Ask a Librarian chat is offline