1
by Biringer, Betty E.
Published 2013
Taylor & Francis
Subjects: ...Terrorism / United States / Prevention...

2
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

3
by Uceda Vélez, Tony, Morana, Marco M.
Published 2015
John Wiley & Sons
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / Terrorism / bisacsh...

4
by Young, Carl
Published 2014
Butterworth-Heinemann
... foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful...

5
by Calder, Alan
Published 2005
IT Governance Pub.
Table of Contents: ... CRIME; CHAPTER 8 TERRORISM; CHAPTER 9 EVOLVING THREAT ENVIRONMENT; CHAPTER 10 REGULATORY COMPLIANCE...

6
by Kleindorfer, Paul R.
Published 2009
Wharton School Pub.
Table of Contents: ... -- Terrorism networks / Boaz Ganor -- The itinerary of microorganisms : a network-based response to the network...

7
by Robin, Jennifer
Published 2013
Jossey-Bass
Table of Contents: ... and Sizes; Mergers and Acquisitions; Leadership Changes; Layoffs; Internal Changes and Spikes; Terrorism...

8
by Mehan, Julie E.
Published 2008
IT Governance
...CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile...

9
by Moschovitis, Christos J. P.
Published 2018
Wiley
..., the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority...

10
by Valcik, Nicolas A., Tracy, Paul E.
Published 2013
CRC Press/Taylor & Francis, Taylor and Francis, an imprint of Routledge