11. Collaborative cyber threat intelligence : detecting and responding to advanced cyber attacks on national level /: detecting and responding to advanced cyber attacks on national level. (2017) Editors: Skopik, Florian Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
12. GDPR and cyber security for business information systems. (2022) Authors: Gobeo, Antoni; Fowler, Connor; Buchanan, William Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
13. Bytes, bombs, and spies : the strategic dimensions of offensive cyber operations /: the strategic dimensions of offensive cyber operations. ([2018]) Editors: Lin, Herbert; Zegart, Amy B, 1967- Record Type: Book Extent: 1 online resource (443 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
14. Open source intelligence investigation : investigation from strategy to implementation /: investigation from strategy to implementation. (2016) Editors: Akhgar, Babak; Bayerl, P. Saskia; Sampson, Fraser Record Type: Book Extent: 1 online resource (302 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
15. There's a war going on but no one can see it. (2021) Authors: Modderkolk, Huib Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
16. The cyber deterrence problem. (2020) Editors: Brantly, Aaron Franklin Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
17. Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage /: how to identify the actors behind cyber-espionage. ([2020]) Authors: Steffens, Timo Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
18. Cyber intelligence driven risk : how to build, deploy, and use cyber intelligence for improved business risk decisions /: how to build, deploy, and use cyber intelligence for improved business risk decisions. (2020) Authors: III, Moore, Richard O, 1971- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
19. Adversarial and uncertain reasoning for adaptive cyber defense : control- and game-theoretic approaches to cyber security /: control- and game-theoretic approaches to cyber security. ([2019]) Editors: Jajodia, Sushil; Cybenko, George; Liu, Peng; Wang, Cliff; Wellman, Michael Record Type: Book Extent: 1 online resource, illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
20. Cyber enigma : unraveling the terror in the cyber world /: unraveling the terror in the cyber world. (2019) Authors: Dilipraj, E Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗