Call Number (LC) Title Results
HS 9.2:C 99/2 Preparing for a cyber incident. E-skimming 1
HS 9.2:C 99/3 Preparing for a cyber incident 1
HS 9.2:C 99/4 Preparing for a cyber incident. Contacting law enforcement : what you need to know 1
HS 9.2:C 99/5 Preparing for a cyber incident. A guide to business email compromises 1
HS 9.2:EX 8 Investigating ideologically inspired violent extremists: local partners are an asset : a case study on Abdulhakim Mujahid Muhammad 1
HS 9.2:G 74 Insider threat study : illicit cyber activity in the government sector 1
HS 9.2:H 62 Moments in history 1
HS 9.2:IN 7 Insider threat study : illicit cyber activity in the information technology and telecommunications sector
Insider threat study : computer system sabotage in critical infrastructure sectors
2
HS 9.2:IN 8 Office of Investigations strategy, FY 2021-2027 1
HS 9.2:L 62/2014 History of the presidential limousines 1
HS 9.2:L 92 Using a systems approach for threat assessment investigations : a case study on Jared Lee Loughner 1
HS 9.2:M 74/ Know your money 1
HS 9.2:M 74/2008 Know your money 1
HS 9.2:M 74/2014 Know your money 1
HS 9.2:SCH 6 Prior knowledge of potential school-based violence : information students learn may prevent a targeted attack 1
HS 9.2:SCH 6/2 Enhancing school safety using a threat assessment model : an operational guide for preventing targeted school violence 1
HS 9.2:SCH 6/2/EXEC.SUMM. Enhancing school safety using a threat assessment model : an operational guide for preventing targeted school violence : executive summary 1
HS 9.2:SCH 6/3 School safety program 1
HS 9.2:SCH 6/4 Making schools safer 1
HS 9.2:SCH 6/5 Protecting America's schools : a U.S. Secret Service analysis of targeted school violence 1