Warning: file_put_contents(cache/omni_d71981fb1e2180959d64ba1238df9968.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
A Framework for Programming and Budgeting for Cybersecurity
"When defending an organization against cyberattacks, cybersecurity professionals are faced with the dilemma of selecting from a large set of cybersecurity defense measures while operating with a limi...
View Book →National Association of State Chief Information Officers, “Harmonize Disparate Federal Cybersecuri
Available on Internet Archive....
View Book →
Web Application Security
Exploitation and Countermeasures for Modern Web Applications...
View Book →Cybersecurity Fundamentals
First published in 2020...
View Book →ERIC ED539813: Taking Action for America: A CEO Plan for Jobs and Economic Growth
America faces many challenges in working together to restore the promise of economic growth and security for the country, U.S. families and the American worker. The challenges are both real and seriou...
View Book →Cyber-physical resilience system for anomaly detection in industrial environments
This work explores the topic of cybersecurity in the context of electric vehicles (EVs). It ensures the resilience of cyber-physical systems against anomalies, which is paramount for maintaining opera...
View Book →
Kiribati national cybersecurity strategy 2020
Title from cover....
View Book →
Securing U.S. Elections : a method for prioritizing cybersecurity risk in election infrastructure
U.S. election systems are diverse in terms of governance and technology. This reflects the constitutional roles reserved for the states in administering and running elections but makes it challenging ...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Challenges in cybersecurity and privacy : the European research landscape
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specia...
View Book →Cybersecurity for critical infrastructure protection via reflection of industrial control systems
Includes bibliographical references and index....
View Book →
A framework for exploring cybersecurity policy options
"Today's cyber environment presents unlimited opportunities for innovation, interaction, commerce, and creativity, but these benefits also bring serious security challenges. Satisfactory solutions wil...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
A methodology for quantifying the value of cybersecurity investments in the Navy
RAND Corporation researchers developed and supported the implementation of a methodology to assess the value of resource options for U.S. Navy cybersecurity investments. The proposed methodology featu...
View Book →ERIC ED609875: LEA Website Student Privacy Transparency Reviews: Year One Report Summary. PTAC-IB-8
The U.S. Department of Education's (Department's or ED's) Student Privacy Policy Office (SPPO) and its Privacy Technical Assistance Center (PTAC) are conducting a four-year review of the websites of 1...
View Book →H.R. 285 : Department of Homeland Security Cybersecurity Enhancement Act of 2005 : hearing before th
Distributed to some depository libraries in microfiche. Shipping list no.: 2006-0007-P. Also available via Internet from the GPO Access web site. Addresses as of 9/26/05: http://frwebgate.access.gpo.g...
View Book →DTIC AD1045000: Defining a Progress Metric for CERT RMM Improvement
This report describes how the authors defined a Cybersecurity Program Progress Metric (CPPM) in support of a large, diverse U.S. national organization. The CPPM, based on the CERT-Resilience Managemen...
View Book →
Cybersecurity : emerging issues, trends, technologies, and threats in 2015 and beyond
"March 2016." Includes bibliographical references. In English. Title from PDF file as viewed on 11/06/2023....
View Book →
Security Infrastructure Technology for Integrated Utilization of Big Data
Applied to the Living Safety and Medical Fields...
View Book →
The defender's dilemma : charting a course toward cybersecurity
Includes bibliographical references. Description based on print version record and CIP data provided by publisher....
View Book →Digital Vigitrust
Redefining Cybersecurity: How VigiTrust is Pioneering a Safer Digital Future...
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →
Rhode Island state cybersecurity strategy
Also available in digital form on the Library of Congress Web site. Title from cover. Description based on online resource, viewed on 2021-07-29....
View Book →
Hackers wanted : an examination of the cybersecurity labor market
Includes bibliographical references. Description based on print version record and CIP data provided by publisher....
View Book →Conflict and cooperation in cyberspace : the challenge to national security
xxviii, 332 pages : 24 cm...
View Book →American Tech Becomes Occupying Force
Major US tech giants—Google, Microsoft, Amazon, Apple—now function as extensions of a foreign army due to systematic penetration and operational control by Unit 8200, Israel’s elite military int...
View Book →An analysis of cyber security and how it is affecting a contract writing system, Seaport
The purpose of this paper is to research cyber security and whether it creates inefficiencies and ineffective business support for the DOD--specifically, the contract writing system SeaPort. Is cybers...
View Book →Careers in Internet technology
1 online resource...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
CISA Cybersecurity Advisory Committee
Federal Advisory Committee depository collection. Committee name may vary....
View Book →Office of the Inspector General of the Intelligence Community, Joint Report on the Implementation of
0...
View Book →
Comparison of public and private sector cybersecurity and IT workforces
"Direct workforce comparisons between U.S. Department of Defense (DoD) and private sector organizations are complicated because of available data and the different taxonomies used to classify cybersec...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Cybersecurity Risk Management
First published in 2021...
View Book →Development of a blockchain-based electronic voting system utilizing national identification number
Traditional voting methods in Nigeria face numerous challenges, including logistic issues, security concerns, and allegations of fraud, which undermine public trust. This work develops a blockchain-ba...
View Book →
Defend Dissent
Digital Suppression and Cryptographic Defense of Social Movements...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
A powerful machine learning method for detecting phishing threats
Phishing threats exploit social engineering and deceptive web infrastructure to steal sensitive personal information, often by mimicking legitimate websites. With the proliferation of online services ...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
How to Measure Anything in Cybersecurity Risk
First published in 2016...
View Book →Recent developments in cybersecurity
"December 2022."...
View Book →
Cybersecurity Essentials
First published in 2018...
View Book →
ERIC ED597111: Experience Teaching Emerging Information Technologies
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life c...
View Book →Cybersecurity : the Beginner's Guide
First published in 2019...
View Book →IT & C, Volumul 3, Numărul 4, Decembrie 2024
Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. Cuprins: EDITORIAL / EDITORIAL The Importance of Bi...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →Cybersecurity of freight information systems : a scoping study
1 online resource (xiv, 80 pages) :...
View Book →National cybersecurity plan, 2023-2028
Covet title. "February 2024." Includes bibliographical references (pages 28-32). In English. Title from PDF file as viewed on 02/13/2026...
View Book →Exploring the Frontier of Password Cracking: Methods, Effectiveness, and Defense Strategies
The manner of attacker's behavior cannot be underestimated; hackers use simple traditional attacks such as brute-force and dictionary attacks as well as sophisticated algorithms including: Markov mode...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Cybersecurity for Dummies
First published in 2019...
View Book →
DTIC ADA465101: CyberSecurity Monitoring Tools and Projects: A Compendium of Commercial and Governme
This document is a compendium of CyberSecurity Monitoring (CSMn) automated tools and research projects. In the first appendix to this document, users will find an explanation of what the author means ...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →PUBLIC API DOCUMENTATION FOR VNeID
VNeID is an application for residents of Vietnam to manage their official government information and access administrative services. It was developed by the National Population Data Centre under Minis...
View Book →
Counterterrorism and Cybersecurity
First published in 2013...
View Book →
Intel Trusted Execution Technology for Server Platforms
A Guide to More Secure Datacenters...
View Book →Cybersecurity and privacy in business transactions : managing data risk in deals
"... focuses on transactional risks encountered by attorneys, compliance officers and contract managers. It provides a practical overview of relevant laws and issues and how they arise in various type...
View Book →National Institute of Standards and Technology, Initial Analysis of Cybersecurity Framework RFI Resp
Available on Internet Archive....
View Book →
The federal government's track record on cybersecurity and critical infrastructure
The report details serious vulnerabilities in the government's efforts to protect its own civilian computers and networks, and the critical, sensitive information they contain. The report notes that ...
View Book →
Cybersecurity and Cyberwar
First published in 2013...
View Book →
Cybersecurity
First published in 1900...
View Book →