
Search
Full Listing
2217 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
|
The Discourse Of Cyberterrorism: Exceptional Measures Call For The Framing Of Exceptional Times
View Abstract |
2015 | Auwema, N. M. | View Publisher |
|
Cyber-Terrorism: Finding A Common Starting Point
View Abstract |
2012 | Jeffrey Thomas, B. | View Publisher |
|
Identification And Ranking Of Critical Assets Within An Electrical Grid Under Threat Of Cyber Attack
View Abstract |
2011 | Boyer, B. R. | View Publisher |
|
The California Independent System Operator Security Vulnerabilities
View Abstract |
2010 | Brow, S. L. | View Publisher |
|
Hyper-connectivity: Intricacies Of National And International Cyber Securities
View Abstract |
2017 | Dawson, M. | View Publisher |
|
Cyberterrorism Cyber Prevention Vs Cyber Recovery
View Abstract |
1993 | DiBiasi, J. R. | View Publisher |