4 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Chen, Thomas M.,
Showing
1
-
4
of
4
for search:
'Chen, Thomas M.,'
, query time: 0.04s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Cyberterrorism after Stuxnet
by
Chen
,
Thomas
M
.,
Published: Strategic Studies Institute and U.S. Army War College Press, 2014
Description: 1 online resource (ix, 30 pages)
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
2
An assessment of the Department of Defense strategy for operating in cyberspace
by
Chen
,
Thomas
M
.,
Published: Strategic Studies Institute and U.S. Army War College Press, 2013
Description: 1 online resource (ix, 46 pages).
Located:
Loading...
Call Number:
Loading...
PDF, Mobi, and epub versions
eBook
Place Hold
Save to List
Saved in:
3
Forward error correction based on algebraic-geometric theory
by
Alzubi, Jafar A.,
Published: Springer, 2014
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Cyberterrorism : understanding, assessment, and response
Published: Springer, 2014
Description: 1 online resource (xxiii, 215 pages) : color illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Cyberterrorism
Coding theory
Computer viruses
Cyberinfrastructure Risk assessment
Cyberinfrastructure Security measures
Cyberinfrastructure Security measures Evaluation
Cyberspace Government policy Evaluation
Cyberterrorism Prevention Evaluation
Error-correcting codes (Information theory)
Evaluation
Malware (Computer software)
National security
Rules and practice
×
Loading...