Suggested Topics within your search.
Suggested Topics within your search.
- Management
- Security measures 30
- Cyberspace 29
- Prevention 16
- Computer security 13
- Computer networks 12
- Information technology 9
- Computer crimes 8
- Cyberterrorism 7
- Economic aspects 6
- Risk management 6
- Computer insurance 4
- Data protection 4
- Database security 4
- Information warfare 4
- Cyberspace operations (Military science) 3
- Evaluation 3
- Government policy 3
- Internet 3
- National security 3
- Political aspects 3
- Trust 3
- Access control 2
- Administrative agencies 2
- Armed Forces 2
- Auditing 2
- Business enterprises 2
- Computer systems 2
- Data processing 2
- Industrial management 2
-
1
Examining the roles of Army Reserve component forces in military cyberspace operations /
Published 2019Subjects: “…Cyberspace operations (Military science) United States.…”
Online Access
Government Document eBook -
2
Cyber risk management prioritize threats, identify vulnerabilities and apply controls /
Published 2019Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
3
Cyber Risk Management : Prioritize Threats, Identify Vulnerabilities and Apply Controls /
Published 2019Subjects: Full Text (via Skillsoft)
Electronic eBook -
4
Enhancing the role of insurance in cyber risk management
Published 2017Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
5
DHS can take actions to address its additional cybersecurity responsibilities /
Published 2013Subjects: Online Access
Online Access
Government Document eBook -
6
The Google predicament transforming U.S. cyberspace policy to advance democracy, security, and trade : hearing before the Committee on Foreign Affairs, House of Representatives, On...
Published 2010Subjects: Full Text (via ProQuest)
Government Document Electronic eBook -
7
-
8
Examining the mission, structure, and reorganization effort of the National Protection and Programs Directorate : hearing before the Subcommittee on Cybersecurity, Infrastructure P...
Published 2016Subjects:Government Document Book -
9
Examining the mission, structure, and reorganization effort of the National Protection and Programs Directorate : hearing before the Subcommittee on Cybersecurity, Infrastructure P...
Published 2016Subjects: Online Access
Online Access
Government Document eBook -
10
-
11
-
12
Bloomberg special report.
Published 2019Subjects: Streaming Video (via Alexander Street Press)
Video -
13
The management of the National Nuclear Security Administration's Classified Enterprise Secure Network project
Published 2009Subjects: Connect to online resource
Connect to online resource
Government Document Electronic eBook -
14
Cybersecurity incident response : how to contain, eradicate, and recover from incidents /
Published 2018Subjects: Full Text (via O'Reilly/Safari)
eBook -
15
How to build a cyber-resilient organization /
Published 2018Subjects: Full Text (via Taylor & Francis)
eBook -
16
The Google predicament transforming U.S. cyberspace policy to advance democracy, security, and trade : hearing before the Committee on Foreign Affairs, House of Representatives, On...
Published 2010Subjects: “…Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499.…”
Online Access
Online Access
Government Document Electronic eBook -
17
Department of Defense, actions needed to address five key mission challenges : report to congressional addressees.
Published 2017Subjects: Online Access
Government Document eBook -
18
DHS' efforts to coordinate the activities of Federal cyber operations centers /
Published 2013Subjects: Online Access
Online Access
Government Document eBook -
19
The role of cyber insurance in risk management : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland...
Published 2016Subjects: Online Access
Online Access
Government Document eBook -
20
Business Continuity in a Cyber World : Surviving Cyberattacks.
Published 2018Subjects: “…Cyberspace Security measures.…”
Full Text (via ProQuest)
eBook