1
by Katz, Sarah
Published 2022
IT Governance Publishing
... discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate...

2
by Pal, Sankar K.
Published 2012
CRC Press
..., with applications ranging from fight against terrorism and crime, to private and public safety (e.g., in private...