skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Index

Results 1 - 50 of 153  for Library Catalog (Excludes Articles)

Results 1 2 3 4 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Inside the enemy's computer : identifying cyber-attackers
Material Type:
Book
Add to e-Shelf

Inside the enemy's computer : identifying cyber-attackers

Clement Guitton author.

2017

Online access

2
Cyberterrorism : understanding, assessment, and response
Material Type:
Book
Add to e-Shelf

Cyberterrorism : understanding, assessment, and response

Thomas M. Chen editor.; Lee Jarvis 1979- editor.; Stuart Macdonald editor.

2014]

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773.15 .C97 C935 2014 )()

3
Responses to cyber terrorism
Material Type:
Book
Add to e-Shelf

Responses to cyber terrorism

Centre of Excellence Defence Against Terrorism.; North Atlantic Treaty Organization. Public Diplomacy Division.

2008

Online access

4
The dark side of the Internet : protecting yourself and your family from online criminals
Material Type:
Book
Add to e-Shelf

The dark side of the Internet : protecting yourself and your family from online criminals

Paul. Bocij

2006

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .B633 2006 )()

5
Cyber blockades
Material Type:
Book
Add to e-Shelf

Cyber blockades

Alison Lawlor Russell author. Bruce Gore cover designer.

2014

Online access

6
Material Type:
Book
Add to e-Shelf

Terrorist threats to the United States hearing before the Special Oversight Panel on Terrorism of the Committee on Armed Services, House of Representatives, One Hundred Sixth Congress, second session, hearing held May 23, 2000.

United States. Congress. House. Committee on Armed Services. Special Oversight Panel on Terrorism

2000

Available at UDM McNichols Campus Library  UDM McNichols Library Government Document microfiche (3rd floor storage)  (Y 4.AR 5/2 A:999-2000/52 )()

7
Material Type:
Book
Add to e-Shelf

Cyberterrorism how real is the threat?

Gabriel Weimann 1950- United States Institute of Peace.

2004

Online access

8
Essential cybersecurity science : build, test, and evaluate secure systems
Material Type:
Book
Add to e-Shelf

Essential cybersecurity science : build, test, and evaluate secure systems

Josiah Dykstra author.

First edition.. 2015

Online access

9
Networks and netwars the future of terror, crime, and militancy
Material Type:
Book
Add to e-Shelf

Networks and netwars the future of terror, crime, and militancy

John Arquilla; David F Ronfeldt; United States. Dept. of Defense. Office of the Secretary of Defense.

2001

Online access

10
Fighting terror online the convergence of security, technology, and the law
Material Type:
Book
Add to e-Shelf

Fighting terror online the convergence of security, technology, and the law

Martin Charles Golumbic

c2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .C65 G65 2008 )()

11
The virtual battlefield perspectives on cyber warfare
Material Type:
Book
Add to e-Shelf

The virtual battlefield perspectives on cyber warfare

Christian Czosseck; Kenneth Geers

c2009

Online access

12
Material Type:
Book
Add to e-Shelf

Open source bibliography

United States. President's Commission on Critical Infrastructure Protection

1997

Online access. The library also has physical copies.

13
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web
Material Type:
Book
Add to e-Shelf

Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the Web

NATO Advanced Research Workshop on Web Intelligence and Security Corporate Author Mark Last; Abraham Kandel; North Atlantic Treaty Organization. Public Diplomacy Division.; NATO Advanced Research Workshop on Web Intelligence and Security (2009 : ʻEn Boḳeḳ, Israel)

2010

Online access

14
The transnational dimension of cyber crime terrorism
Material Type:
Book
Add to e-Shelf

The transnational dimension of cyber crime terrorism

Mariano-Florentino. Cuéllar Seymour E Goodman; Abraham D Sofaer

2001

Online access

15
Cyberwarfare and the laws of war
Material Type:
Book
Add to e-Shelf

Cyberwarfare and the laws of war

Heather Harrison. Dinniss

2012

Online access

16
U.S. national cybersecurity : strategic challenges and opportunities
Material Type:
Book
Add to e-Shelf

U.S. national cybersecurity : strategic challenges and opportunities

Grace Powers editor.

2014

Online access

17
Policing cyber hate, cyber threats and cyber terrorism
Material Type:
Book
Add to e-Shelf

Policing cyber hate, cyber threats and cyber terrorism

Imran Awan editor.; Brian Blakemore editor.

2016

Online access

18
Computer Security : Cyber Attacks--War Without Borders : HEARING before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, July 26, 2000.
Material Type:
Book
Add to e-Shelf

Computer Security : Cyber Attacks--War Without Borders : HEARING before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, July 26, 2000.

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology.

2001

Online access. The library also has physical copies.

19
Cyber crime and cyber terrorism investigator's handbook
Material Type:
Book
Add to e-Shelf

Cyber crime and cyber terrorism investigator's handbook

Babak Akhgar editor.; Andrew Staniforth editor.; Francesca M. Bosco editor.; Steve Elliot editor.; Benjamin Rearick project director.; Priya Kumaraguruparan project director.; Mark Rogers designer.

2014

Online access

20
Material Type:
Video
Add to e-Shelf

NOVA. Cyber_war threat

Daniel McCabe producer.; Craig Sechler narrator.; WGBH (Television station : Boston, Mass.), production company.

2015

Online access

21
Cyber terrorism : a guide for facility managers
Material Type:
Book
Add to e-Shelf

Cyber terrorism : a guide for facility managers

Joseph F. Gustin 1947-

c2004

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .G87 2004 )()

22
Material Type:
Book
Add to e-Shelf

Toward deterrence in the cyber dimension report to the President's Commission on Critical Infrastructure Protection.

United States. President's Commission on Critical Infrastructure Protection

1997

Online access. The library also has physical copies.

23
Material Type:
Book
Add to e-Shelf

Regulating the Internet report to the President's Commission on Critical Infrastructure Protection.

Ethan B. Kapstein United States. President's Commission on Critical Infrastructure Protection

1997

Online access. The library also has physical copies.

24
Exploring common criteria : can it assure that the federal government gets needed security in software? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 17, 2003.
Material Type:
Book
Add to e-Shelf

Exploring common criteria : can it assure that the federal government gets needed security in software? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 17, 2003.

United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census

2004

Online access. The library also has physical copies.

25
Optimizing cyberdeterrence : a comprehensive strategy for preventing foreign cyberattacks
Material Type:
Book
Add to e-Shelf

Optimizing cyberdeterrence : a comprehensive strategy for preventing foreign cyberattacks

Robert Mandel 1949- author.

2017

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .M355 2017 )()

26
How to measure anything in cybersecurity risk
Material Type:
Book
Add to e-Shelf

How to measure anything in cybersecurity risk

Douglas W. Hubbard 1962- author. Richard Seiersen author.

2016

Online access

27
Fighting terror in cyberspace
Material Type:
Book
Add to e-Shelf

Fighting terror in cyberspace

Mark Last; Abraham Kandel

c2005

Online access

View 2 versions
28
Stealing the network how to own a shadow
Material Type:
Book
Add to e-Shelf

Stealing the network how to own a shadow

Johnny. Long Ryan Russell 1969-; Timothy Mullen; Scott Pinzon

2007

Online access

29
Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013
Material Type:
Book
Add to e-Shelf

Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013

Veniamin Ginodman editor.; Natalya Obelets editor.; Ram Herkanaidu editor.

2014

Online access

30
Proceedings, WOMBAT Workshop on Information Security Threats Data Collection and Sharing : WISTDCS 2008, 21-22 April 2008, Amsterdam, Netherlands
Material Type:
Book
Add to e-Shelf

Proceedings, WOMBAT Workshop on Information Security Threats Data Collection and Sharing : WISTDCS 2008, 21-22 April 2008, Amsterdam, Netherlands

WOMBAT Workshop on Information Security Threats Data Collection and Sharing Corporate Author IEEE Computer Society Content Provider

2008

Online access

31
The defendeŕs dilemma : charting a course toward cybersecurity
Material Type:
Book
Add to e-Shelf

The defendeŕs dilemma : charting a course toward cybersecurity

Martin C. Libicki author. Lillian Ablon author.; Tim Webb (Children's story adapter), author.

2015

Online access

32
Managerial guide for handling cyber-terrorism and information warfare
Material Type:
Book
Add to e-Shelf

Managerial guide for handling cyber-terrorism and information warfare

Lech Janczewski 1943- Andrew M Colarik

c2005

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .J354 2005 )()

33
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger
Material Type:
Book
Add to e-Shelf

Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger

Julie E. Mehan

2008

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773 .M44 2008 )()

View 2 versions
34
Implementing homeland security for enterprise IT
Material Type:
Book
Add to e-Shelf

Implementing homeland security for enterprise IT

Michael Erbschloe 1951-

c2004

Check holdings()

View 2 versions
35
Cyber security and IT infrastructure protection
Material Type:
Book
Add to e-Shelf

Cyber security and IT infrastructure protection

John R Vacca

First edition.. 2014

Online access

36
Strategic cyber defense : a multidisciplinary perspective
Material Type:
Book
Add to e-Shelf

Strategic cyber defense : a multidisciplinary perspective

Unal Tatar editor.; Yasir Gokce editor.; Adrian V. Gheorghe editor.

2017

Online access

37
Material Type:
Book
Add to e-Shelf

Homeland security the federal and regional response : field hearing before the Subcommittee on Environment, Technology, and Standards, Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 10, 2002.

United States. Congress. House. Committee on Science. Subcommittee on Environment, Technology, and Standards

2002

Online access

38
Material Type:
Journal
Add to e-Shelf

Global security (Abingdon, England)

Routledge (Firm)

2016

Online access

39
Material Type:
Book
Add to e-Shelf

Homeland security the federal and New York response : field hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002.

United States. Congress. House. Committee on Science

2003

Online access

40
Terrorism : reducing vulnerabilities and improving responses : U.S.-Russian Workshop proceedings
Material Type:
Book
Add to e-Shelf

Terrorism : reducing vulnerabilities and improving responses : U.S.-Russian Workshop proceedings

National Research Council (U.S.). Committee on Counterterrorism Challenges for Russia and the United States Rossiĭskai︠a︡ akademii︠a︡ nauk.

2004

Online access. The library also has physical copies.

41
Material Type:
Journal
Add to e-Shelf

International journal of critical infrastructure protection.

2008

Online access

42
Material Type:
Journal
Add to e-Shelf

ECrime Researchers Summit : [proceedings].

APWG eCrime Researchers Summit. Institute of Electrical and Electronics Engineers.; Anti-Phishing Working Group.

200?

Online access

43
Getting to yes with China in cyberspace
Material Type:
Book
Add to e-Shelf

Getting to yes with China in cyberspace

Scott Harold 1975- author. Martin C. Libicki author.; Astrid Stuth Cevallos author.

2016

Online access

44
Cyber attacks : the national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000.
Material Type:
Book
Add to e-Shelf
45
Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002.
Material Type:
Book
Add to e-Shelf

Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002.

United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime

2001

Online access

46
Material Type:
Book
Add to e-Shelf

Understanding cyberspace as a medium for radicalization and counter-radicalization : hearing before the Terrorism, Unconventional Threats and Capabilities Subcommittee of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, first session, hearing held December 16, 2009.

United States. Congress. House. Committee on Armed Services. Subcommittee on Terrorism, Unconventional Threats, and Capabilities

2010

Available at UDM McNichols Campus Library  UDM McNichols Library Government Document microfiche (3rd floor storage)  (Y 4.AR 5/2 A:2009-2010/113 )()

47
Toward a safer and more secure cyberspace
Material Type:
Book
Add to e-Shelf

Toward a safer and more secure cyberspace

Seymour E Goodman; Herbert Lin; National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States

c2007

Online access. The library also has physical copies.

48
Corporate security crossroads : responding to terrorism, cyberthreats, and other hazards in the global business environment
Material Type:
Book
Add to e-Shelf

Corporate security crossroads : responding to terrorism, cyberthreats, and other hazards in the global business environment

Richard J. Chasdi 1958- author.

2018

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HD 61.5 .C43 2018 )()

49
Cyber mercenaries : the state, hackers, and power
Material Type:
Book
Add to e-Shelf

Cyber mercenaries : the state, hackers, and power

Tim Maurer author.

2018

Available at UDM McNichols Campus Library  UDM McNichols Library Stacks  (HV 6773.15.C97 M383 2018 )()

50
Proceedings of a workshop on deterring cyber attacks informing strategies and developing options for U.S. policy
Material Type:
Book
Add to e-Shelf

Proceedings of a workshop on deterring cyber attacks informing strategies and developing options for U.S. policy

National Research Council (U.S.). Committee on Deterring Cyber attacks: Informing Strategies and Developing Options for U.S. Policy. National Research Council (U.S.). Computer Science and Telecommunications Board.; National Research Council (U.S.). Division on Engineering and Physical Sciences.; National Academies (U.S.). Policy and Global Affairs Division.

2010

Online access