Search alternatives:
warfare monitor » hardware monitor, warfare monika, warfare munitions

1
by Ma, Sheng-Hao
Published 2023
PACKT PUBLISHING LIMITED
Table of Contents: ..., Process, and Environment Information -- Sample programs -- Function calling convention -- Calling...

2
by Hunter, John M.
Published 2001
Springer London
Table of Contents: ...1. Introduction -- 1.1 Why a Book about Information Security? -- 1.2 Some Conventions -- 1.3 Risks...

3
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ...Protecting Mission-Critical Systems / Albert Caballero -- 1.Information Security Essentials...

4
by Slade, Robert
Published 1996
Springer New York
Table of Contents: ... -- Computer Viruses and Anti-Virus Warfare -- The PC Virus Control Handbook --...

5
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Benefit of a Kind of Inconvenience for Social Information Systems -- The Present Condition and Problems...

6
Published 2024
Springer Nature Singapore
Table of Contents: ...Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis...

7
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... to operational security -- OPSEC step 1 -- identify critical information -- OPSEC step 2 -- analysis of threats...

8
Published 2020
Springer International Publishing
Table of Contents: ... Training Outcomes for Submarine Electronic Warfare Operators --...

9
by Anderson, Ross
Published 2008
Wiley Publishing Inc.
Table of Contents: ... -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright...