1
by Katz, Sarah
Published 2022
IT Governance Publishing
... discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate...

2
by Pal, Sankar K.
Published 2012
CRC Press
..., with applications ranging from fight against terrorism and crime, to private and public safety (e.g., in private...

3
by Steinhaus, Hugo
Published 2015
Birkhäuser
... years spent evading Nazi terror is especially moving. The steadfast honesty and natural dignity he...

4
by Steinhaus, Hugo
Published 2016
Birkhäuser
... years spent evading Nazi terror is especially moving. The steadfast honesty and natural dignity he...