1. Practical cyber intelligence : how action-based intelligence can be an effective response to incidents /: how action-based intelligence can be an effective response to incidents. (2018) Authors: Jr, Bautista, Wilson Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. The Cyber Threat and Globalization : The Impact on U.S. National and International Security /: The Impact on U.S. National and International Security. ([2018]) Authors: Jarmon, Jack A, 1951-; Yannakogeorgos, Pano Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Operations research, engineering, and cyber security : trends in applied mathematics and technology /: trends in applied mathematics and technology. ([2017]) Editors: Daras, Nicholas J; Rassias, Themistocles M, 1951- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Critical infrastructure security and resilience : theories, methods, tools and technologies /: theories, methods, tools and technologies. ([2019]) Other Names: Gritzalis, Dimitris; Theocharidou, Marianthi; Stergiopoulos, George Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions /: leadership perspectives and guidance for systems and institutions. ([2019]) Authors: Rohmeyer, Paul; Bayuk, Jennifer L Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Cyber-risk informatics : engineering evaluation with data science /: engineering evaluation with data science. (2016) Authors: Sahinoglu, Mehmet, 1951- Record Type: Book Extent: 1 online resource (560 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Fundamentals of network forensics : a research perspective /: a research perspective. ([2016]) Authors: Joshi, R. C; Pilli, Emmanuel S (Emmanuel Shubhakar) Record Type: Book Extent: 1 online resource (214 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Cyber Power : Crime, Conflict and Security in Cyberspace /: Crime, Conflict and Security in Cyberspace. (2013) Other Names: Ghernaouti-Helie, Solange Record Type: Book Extent: 1 online resource (464 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Cyberstrategien für Unternehmen und Behörden : Maßnahmen zur Erhöhung der Cyberresilienz /: Maßnahmen zur Erhöhung der Cyberresilienz. ([2017]) Authors: Bartsch, Michael; Frey, Stefanie Record Type: Book Extent: 1 online resource (xv, 124 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Cyber security : analytics, technology and automation /: analytics, technology and automation. ([2015]) Editors: Lehto, Martti; Neittaanmäki, P (Pekka) Record Type: Book Extent: 1 online resource, color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗