1
Published 2022
Springer International Publishing
... in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems...

2
by Review, Harvard, Blau, Alex, Burt, Andrew, Groysberg, Boris
Published 2019
Ascent Audio
... the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can...

3
by Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents: ...; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary...

4
Published 2023
Springer International Publishing
Table of Contents: ...1. Cybersecurity Technology: A Landscape Analysis -- 2. Cybersecurity technology: an analysis...

5
by Andreasson, Kim J.
Published 2011
Taylor & Francis
Subjects: ...Cybersecurity...

6
by Andreasson, Kim J.
Published 2012
Taylor & Francis

7
by Diogenes, Yuri, Ozkaya, Erdal
Published 2022
Packt Publishing
Table of Contents: ...? Understanding the Cybersecurity Kill Chain Reconnaissance Compromising the System Chasing a User’s Identity...

8
by Tabansky, Lior, Ben Israel, Isaac
Published 2015
Springer International Publishing
Table of Contents: ... -- The National Innovation Ecosystem of Israel -- Mid 1990’s: The Prequel for National Cybersecurity Policy...

9 ...Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next...

10 ...The expert's voice in cybersecurity...

11
by Cerra, Allison
Published 2019
Wiley
Table of Contents: ... -- Letting Go to Hold On 153 -- Assuming the Mantle 156 -- W.I.S.D.O.M. for the Cybersecurity Professional...

12
by Ackerman, Pascal
Published 2017
Packt Publishing
Table of Contents: ...Industrial cybersecurity : efficiently secure critical infrastructure systems -- Credits -- About...

13
by Schallbruch, Martin, Skierka, Isabel
Published 2018
Springer International Publishing
...SpringerBriefs in Cybersecurity...

14
by Iorliam, Aamo
Published 2019
Springer International Publishing
Table of Contents: ... -- Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection -- Cybersecurity and Mobile...

15
by Christen, Markus
Published 2020
Springer Nature
... an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical...

16
by Christen, Markus
Published 2020
Springer Nature
Subjects: ...the cybersecurity landscape...

17
by Dunn Cavelty, Myriam
Published 2014
Springer International Publishing
...SpringerBriefs in Cybersecurity...

18
by Singer, P. W.
Published 2016
Tantor Media, Inc.
...In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times bestselling author P.W...

19
by Steinberg, Joseph
Published 2019
Tantor Media, Inc.
...If keeping your business or your family safe from cybersecurity threats is on your to-do list...

20
Published 2022
Springer International Publishing
Table of Contents: ...Part IV Combating cybercrime as a special task in the area of cybersecurity -- Cybercrime...