Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for cybersecurity

Warning: file_put_contents(cache/omni_d71981fb1e2180959d64ba1238df9968.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of The Privacy Engineer's Manifesto
dBooks

The Privacy Engineer's Manifesto

By Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Getting from Policy to Code to QA to Value...

View Book →
Cover of A Framework for Programming and Budgeting for Cybersecurity
Library of Congress

A Framework for Programming and Budgeting for Cybersecurity

By kumar, jason, national defense research institute (u.s.), da

"When defending an organization against cyberattacks, cybersecurity professionals are faced with the dilemma of selecting from a large set of cybersecurity defense measures while operating with a limi...

View Book →
Cover of Web Application Security
dBooks

Web Application Security

By Andrew Hoffman

Exploitation and Countermeasures for Modern Web Applications...

View Book →
Cover of Cybersecurity Fundamentals
Open Library

Cybersecurity Fundamentals

By Kutub Thakur, Al-Sakib Khan Pathan

First published in 2020...

View Book →
Cover of ERIC ED539813: Taking Action for America: A CEO Plan for Jobs and Economic Growth
Internet Archive

ERIC ED539813: Taking Action for America: A CEO Plan for Jobs and Economic Growth

By ERIC

America faces many challenges in working together to restore the promise of economic growth and security for the country, U.S. families and the American worker. The challenges are both real and seriou...

View Book →
Cover of Cyber-physical resilience system for anomaly detection in industrial environments
Internet Archive

Cyber-physical resilience system for anomaly detection in industrial environments

By Debani Prasad Mishra, Rakesh Kumar Lenka, Rampa Sri Sai Yagy

This work explores the topic of cybersecurity in the context of electric vehicles (EVs). It ensures the resilience of cyber-physical systems against anomalies, which is paramount for maintaining opera...

View Book →
Cover of How Cybersecurity Really Works
Open Library

How Cybersecurity Really Works

By Sam Grubb

First published in 2021...

View Book →
Cover of Kiribati national cybersecurity strategy 2020
Library of Congress

Kiribati national cybersecurity strategy 2020

By kiribati. ministry of information, communication, transport

Title from cover....

View Book →
Cover of The Ethics of Cybersecurity
dBooks

The Ethics of Cybersecurity

By Markus Christen, Bert Gordijn, Michele Loi

...

View Book →
Cover of Securing U.S. Elections : a method for prioritizing cybersecurity risk in election infrastructure
Library of Congress

Securing U.S. Elections : a method for prioritizing cybersecurity risk in election infrastructure

By lilly, bilyana, lohn, andrew j., boudreaux, benjamin, bodine

U.S. election systems are diverse in terms of governance and technology. This reflects the constitutional roles reserved for the states in administering and running elections but makes it challenging ...

View Book →
Cover of A Graduate Course in Applied Cryptography
dBooks

A Graduate Course in Applied Cryptography

By Dan Boneh, Victor Shoup

The indispensable tool used to protect information in computing systems...

View Book →
Cover of Challenges in cybersecurity and privacy : the European research landscape
Library of Congress

Challenges in cybersecurity and privacy : the European research landscape

By skármeta, antonio, bernal bernabe, jorge

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specia...

View Book →
Cover of Cybersecurity for critical infrastructure protection via reflection of industrial control systems
Library of Congress

Cybersecurity for critical infrastructure protection via reflection of industrial control systems

By proceedings of the nato advanced research workshop on cybers

Includes bibliographical references and index....

View Book →
Cover of A framework for exploring cybersecurity policy options
Library of Congress

A framework for exploring cybersecurity policy options

By mikolic-torreira, igor, rand justice, infrastructure, and en

"Today's cyber environment presents unlimited opportunities for innovation, interaction, commerce, and creativity, but these benefits also bring serious security challenges. Satisfactory solutions wil...

View Book →
Cover of Configuring Microsoft SharePoint Hybrid Capabilities
dBooks

Configuring Microsoft SharePoint Hybrid Capabilities

By Jeremy Taylor, Neil Hodgkinson, Manas Biswas

...

View Book →
Cover of RubyFu
dBooks

RubyFu

By RubyFu

...

View Book →
Cover of A methodology for quantifying the value of cybersecurity investments in the Navy
Library of Congress

A methodology for quantifying the value of cybersecurity investments in the Navy

By mayer, lauren a., connolly, kevin j., rand corporation. nati

RAND Corporation researchers developed and supported the implementation of a methodology to assess the value of resource options for U.S. Navy cybersecurity investments. The proposed methodology featu...

View Book →
Cover of ERIC ED609875: LEA Website Student Privacy Transparency Reviews: Year One Report Summary. PTAC-IB-8
Internet Archive

ERIC ED609875: LEA Website Student Privacy Transparency Reviews: Year One Report Summary. PTAC-IB-8

By ERIC

The U.S. Department of Education's (Department's or ED's) Student Privacy Policy Office (SPPO) and its Privacy Technical Assistance Center (PTAC) are conducting a four-year review of the websites of 1...

View Book →
Cover of H.R. 285 : Department of Homeland Security Cybersecurity Enhancement Act of 2005 : hearing before th
Library of Congress

H.R. 285 : Department of Homeland Security Cybersecurity Enhancement Act of 2005 : hearing before th

By united states. congress. house. committee on homeland securi

Distributed to some depository libraries in microfiche. Shipping list no.: 2006-0007-P. Also available via Internet from the GPO Access web site. Addresses as of 9/26/05: http://frwebgate.access.gpo.g...

View Book →
Cover of DTIC AD1045000: Defining a Progress Metric for CERT RMM Improvement
Internet Archive

DTIC AD1045000: Defining a Progress Metric for CERT RMM Improvement

By Defense Technical Information Center

This report describes how the authors defined a Cybersecurity Program Progress Metric (CPPM) in support of a large, diverse U.S. national organization. The CPPM, based on the CERT-Resilience Managemen...

View Book →
Cover of Cybersecurity for Beginners
Open Library

Cybersecurity for Beginners

By Raef Meeuwisse

First published in 2015...

View Book →
Cover of Cybersecurity : emerging issues, trends, technologies, and threats in 2015 and beyond
Library of Congress

Cybersecurity : emerging issues, trends, technologies, and threats in 2015 and beyond

By tan, eugene e. g., s. rajaratnam school of international stu

"March 2016." Includes bibliographical references. In English. Title from PDF file as viewed on 11/06/2023....

View Book →
Cover of Cybersecurity Law
Open Library

Cybersecurity Law

By Jeff Kosseff

First published in 2017...

View Book →
Cover of Security Infrastructure Technology for Integrated Utilization of Big Data
dBooks

Security Infrastructure Technology for Integrated Utilization of Big Data

By Atsuko Miyaji, Tomoaki Mimoto

Applied to the Living Safety and Medical Fields...

View Book →
Cover of The defender's dilemma : charting a course toward cybersecurity
Library of Congress

The defender's dilemma : charting a course toward cybersecurity

By webb, tim, libicki, martin c., ablon, lillian

Includes bibliographical references. Description based on print version record and CIP data provided by publisher....

View Book →
Cover of Cyber Security Education
Open Library

Cyber Security Education

By Greg Austin

First published in 2020...

View Book →
Cover of Digital Vigitrust
Internet Archive

Digital Vigitrust

By Unknown Author

Redefining Cybersecurity: How VigiTrust is Pioneering a Safer Digital Future...

View Book →
Cover of Building the Infrastructure for Cloud Security
dBooks

Building the Infrastructure for Cloud Security

By Raghu Yeluri, Enrique Castro-Leon

A Solutions view...

View Book →
Cover of Rhode Island state cybersecurity strategy
Library of Congress

Rhode Island state cybersecurity strategy

By rhode island. department of administration

Also available in digital form on the Library of Congress Web site. Title from cover. Description based on online resource, viewed on 2021-07-29....

View Book →
Cover of Hackers wanted : an examination of the cybersecurity labor market
Library of Congress

Hackers wanted : an examination of the cybersecurity labor market

By pollak, julia, libicki, martin c., senty, david

Includes bibliographical references. Description based on print version record and CIP data provided by publisher....

View Book →
Cover of Conflict and cooperation in cyberspace : the challenge to national security
Internet Archive

Conflict and cooperation in cyberspace : the challenge to national security

By Unknown Author

xxviii, 332 pages : 24 cm...

View Book →
Cover of American Tech Becomes Occupying Force
Internet Archive

American Tech Becomes Occupying Force

By @superzar_pro

Major US tech giants—Google, Microsoft, Amazon, Apple—now function as extensions of a foreign army due to systematic penetration and operational control by Unit 8200, Israel’s elite military int...

View Book →
Cover of An analysis of cyber security and how it is affecting a contract writing system, Seaport
Internet Archive

An analysis of cyber security and how it is affecting a contract writing system, Seaport

By Turner, Bill, Belcher, Daniel, Allen, Danielle

The purpose of this paper is to research cyber security and whether it creates inefficiencies and ineffective business support for the DOD--specifically, the contract writing system SeaPort. Is cybers...

View Book →
Cover of Careers in Internet technology
Internet Archive

Careers in Internet technology

By Steffens, Bradley, 1955- author

1 online resource...

View Book →
Cover of Defense against the Black Arts
dBooks

Defense against the Black Arts

By Jesse Varsalone, Matthew McFadden, Sean Morrissey, Michael S

How Hackers Do What They Do and How to Protect against It...

View Book →
Cover of Hacking the Xbox
dBooks

Hacking the Xbox

By Andrew Huang

An Introduction to Reverse Engineering...

View Book →
Cover of CISA Cybersecurity Advisory Committee
Library of Congress

CISA Cybersecurity Advisory Committee

By united states. department of homeland security

Federal Advisory Committee depository collection. Committee name may vary....

View Book →
Cover of Comparison of public and private sector cybersecurity and IT workforces
Library of Congress

Comparison of public and private sector cybersecurity and IT workforces

By johnson, ryan, rand corporation, schwindt, karen, romanosky,

"Direct workforce comparisons between U.S. Department of Defense (DoD) and private sector organizations are complicated because of available data and the different taxonomies used to classify cybersec...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Cybersecurity Risk Management
Open Library

Cybersecurity Risk Management

By Cynthia Brumfield, Brian Haugli

First published in 2021...

View Book →
Cover of Development of a blockchain-based electronic voting system utilizing national identification number
Internet Archive

Development of a blockchain-based electronic voting system utilizing national identification number

By International Journal of Reconfigurable and Embedded Systems

Traditional voting methods in Nigeria face numerous challenges, including logistic issues, security concerns, and allegations of fraud, which undermine public trust. This work develops a blockchain-ba...

View Book →
Cover of Defend Dissent
dBooks

Defend Dissent

By Glencora Borradaile

Digital Suppression and Cryptographic Defense of Social Movements...

View Book →
Cover of Hacking Secret Ciphers with Python
dBooks

Hacking Secret Ciphers with Python

By Al Sweigart

A beginner's guide to cryptography and computer programming with Python...

View Book →
Cover of Managing Risk and Information Security
dBooks

Managing Risk and Information Security

By Malcolm Harkins

Protect to Enable...

View Book →
Cover of A powerful machine learning method for detecting phishing threats
Internet Archive

A powerful machine learning method for detecting phishing threats

By Unknown Author

Phishing threats exploit social engineering and deceptive web infrastructure to steal sensitive personal information, often by mimicking legitimate websites. With the proliferation of online services ...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of How to Measure Anything in Cybersecurity Risk
Open Library

How to Measure Anything in Cybersecurity Risk

By Douglas W. Hubbard, Richard Seiersen, Daniel E. Geer Jr., St

First published in 2016...

View Book →
Cover of Recent developments in cybersecurity
Library of Congress

Recent developments in cybersecurity

By maryland. general assembly. department of legislative servic

"December 2022."...

View Book →
Cover of Cybersecurity Essentials
Open Library

Cybersecurity Essentials

By Charles J. Brooks, Christopher Grow, Philip Craig, Donald Sh

First published in 2018...

View Book →
Cover of Cybersecurity Ethics
Open Library

Cybersecurity Ethics

By Mary Manjikian

First published in 2017...

View Book →
Cover of ERIC ED597111: Experience Teaching Emerging Information Technologies
Internet Archive

ERIC ED597111: Experience Teaching Emerging Information Technologies

By ERIC

This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life c...

View Book →
Cover of Cybersecurity : the Beginner's Guide
Open Library

Cybersecurity : the Beginner's Guide

By Erdal Ozkaya

First published in 2019...

View Book →
Cover of IT & C, Volumul 3, Numărul 4, Decembrie 2024
Internet Archive

IT & C, Volumul 3, Numărul 4, Decembrie 2024

By Nicolae Sfetcu

Revista IT & C este o publicație trimestrială din domeniile tehnologiei informației și comunicații, și domenii conexe de studiu și practică. Cuprins: EDITORIAL / EDITORIAL The Importance of Bi...

View Book →
Cover of Security in Computer and Information Sciences
dBooks

Security in Computer and Information Sciences

By Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokrati

First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...

View Book →
Cover of Cybersecurity of freight information systems : a scoping study
Internet Archive

Cybersecurity of freight information systems : a scoping study

By National Research Council (U.S). Committee on Freight Transp

1 online resource (xiv, 80 pages) :...

View Book →
Cover of National cybersecurity plan, 2023-2028
Library of Congress

National cybersecurity plan, 2023-2028

By philippines. department of information and communications te

Covet title. "February 2024." Includes bibliographical references (pages 28-32). In English. Title from PDF file as viewed on 02/13/2026...

View Book →
Cover of Exploring the Frontier of Password Cracking: Methods, Effectiveness, and Defense Strategies
Internet Archive

Exploring the Frontier of Password Cracking: Methods, Effectiveness, and Defense Strategies

By Tejas kottarshettar

The manner of attacker's behavior cannot be underestimated; hackers use simple traditional attacks such as brute-force and dictionary attacks as well as sophisticated algorithms including: Markov mode...

View Book →
Cover of A Practical Guide to TPM 2.0
dBooks

A Practical Guide to TPM 2.0

By Will Arthur, David Challener, Kenneth Goldman

Using the New Trusted Platform Module in the New Age of Security...

View Book →
Cover of Cybersecurity for Dummies
Open Library

Cybersecurity for Dummies

By Dummies, Steinberg, Joseph

First published in 2019...

View Book →
Cover of Hacking Exposed Web Applications
dBooks

Hacking Exposed Web Applications

By Joel Scambray, Mike Shema

...

View Book →
Cover of DTIC ADA465101: CyberSecurity Monitoring Tools and Projects: A Compendium of Commercial and Governme
Internet Archive

DTIC ADA465101: CyberSecurity Monitoring Tools and Projects: A Compendium of Commercial and Governme

By Defense Technical Information Center

This document is a compendium of CyberSecurity Monitoring (CSMn) automated tools and research projects. In the first appendix to this document, users will find an explanation of what the author means ...

View Book →
Cover of Demystifying Internet of Things Security
dBooks

Demystifying Internet of Things Security

By Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler

Successful IoT Device/Edge and Platform Security Deployment...

View Book →
Cover of PUBLIC API DOCUMENTATION FOR VNeID
Internet Archive

PUBLIC API DOCUMENTATION FOR VNeID

By Unknown Author

VNeID is an application for residents of Vietnam to manage their official government information and access administrative services. It was developed by the National Population Data Centre under Minis...

View Book →
Cover of Counterterrorism and Cybersecurity
Open Library

Counterterrorism and Cybersecurity

By Newton Lee

First published in 2013...

View Book →
Cover of Intel Trusted Execution Technology for Server Platforms
dBooks

Intel Trusted Execution Technology for Server Platforms

By William Futral, James Greene

A Guide to More Secure Datacenters...

View Book →
Cover of Cybersecurity and privacy in business transactions : managing data risk in deals
Library of Congress

Cybersecurity and privacy in business transactions : managing data risk in deals

By kennedy, john b., bureau of national affairs (arlington, va.

"... focuses on transactional risks encountered by attorneys, compliance officers and contract managers. It provides a practical overview of relevant laws and issues and how they arise in various type...

View Book →
Cover of The federal government's track record on cybersecurity and critical infrastructure
Library of Congress

The federal government's track record on cybersecurity and critical infrastructure

By coburn, tom a., united states. congress. senate. committee o

The report details serious vulnerabilities in the government's efforts to protect its own civilian computers and networks, and the critical, sensitive information they contain. The report notes that ...

View Book →
Cover of Cybersecurity and Cyberwar
Open Library

Cybersecurity and Cyberwar

By P. W. Singer, Allan Friedman

First published in 2013...

View Book →
Cover of Cybersecurity
Open Library

Cybersecurity

By S. R. Westcott, Jean Riescher Westcott

First published in 1900...

View Book →