1. Big data technologies for monitoring of computer security : a case study of the Russian Federation /: a case study of the Russian Federation. ([2018]) Other Names: Petrenko, Sergei Record Type: Book Extent: 1 online resource (xxvii, 249 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Internet fraud casebook : the World Wide Web of deceit /: the World Wide Web of deceit. (2010) Other Names: Wells, Joseph T Record Type: Book Extent: 1 online resource (416 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Cybersecurity public policy : SWOT analysis conducted on 43 countries /: SWOT analysis conducted on 43 countries. (2022) Authors: Fowler, Bradley, 1968-; Maranga, Kennedy M, 1965- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Cybersecurity first principles : a reboot of strategy and tactics /: a reboot of strategy and tactics. (2023) Authors: Howard, Richard, 1959- Record Type: Book Extent: 1 online resource (400 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Case studies in secure computing : achievements and trends /: achievements and trends. (2014) Editors: Issac, Biju; Israr, Nauman Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗