1
Published 2015
Springer International Publishing
Table of Contents: ...Cyber War Games -- Alternatives to Cyber Warfare: Deterrence and Assurance -- Identifying...

2
by Peng Liu, Jajodia, Sushil
Published 2002
Springer US
... the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database...

3
Published 1999
Springer US
Table of Contents: ... -- VI Information Warfare Defense -- 9 Reconstructing the Database after Electronic Attacks -- VII...

4
Published 2008
Springer US
Table of Contents: ... Systems -- Adversary Modeling and Simulation in Cyber Warfare -- Interactive Selection of ISO 27001...