Books on the topic 'Cyber crisis management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 books for your research on the topic 'Cyber crisis management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Kaschner, Holger. Cyber Crisis Management. Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-35489-3.
Full textKaschner, Holger. Cyber Crisis Management. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-27914-1.
Full textKaschner, Holger. Cyber Crisis Management. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-43465-6.
Full textGustin, Joseph F. Cyber terrorism: A guide for facility managers. Fairmont Press, 2004.
Find full textWillemssen, Joel C. Critical infrastructure protection: Comments on the proposed Cyber Security Information Act of 2000 : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Subcommittee on Government Management, Information and Technology, Committee on Government Reform, House of Representatives. The Office, 2000.
Find full textUnited, States Congress House Committee on Government Reform Subcommittee on Government Management Information and Technology. Computer security: Cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congess, 2nd session, July 26, 2000. U.S. G.P.O., 2001.
Find full textGladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textservice), SpringerLink (Online, ed. Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Cyber security: The status of information security and the effects of the Federal Information Security Management Act (FISMA) at federal agencies : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, June 24, 2003. U.S. G.P.O., 2004.
Find full textKaschner, Holger. Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication. Springer Fachmedien Wiesbaden GmbH, 2022.
Find full textCrump, Jeffrey Don, and Jeffrey Don Crump. Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. Jeffrey Crump, 2019.
Find full textKaschner, Holger. Cyber Crisis Management: Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation. Springer Vieweg, 2020.
Find full textDror, Ishai. Cyber Incident and Crisis Management: A Guide for Managers. Independently Published, 2019.
Find full textCyber Crisis Management: Das Praxishandbuch Zu Krisenmanagement und Krisenkommunikation. Springer Fachmedien Wiesbaden GmbH, 2024.
Find full textPeoples, Columba. Security in Crisis. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/9780191976292.001.0001.
Full textKovid, Dr Raj K., Dr Daleep Parimoo, and Dr Santhi Narayanan. EMERGING CONTOURS OF BUSINESS AND MANAGEMENT. SVDES BOOK SERIES, Delhi, 2021. http://dx.doi.org/10.52458/9789391842413.
Full textTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.
Find full textTrim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.
Find full textMcGonagle , Jr., John J., and Carolyn M. Vella. New Archetype for Competitive Intelligence. Greenwood Publishing Group, Inc., 1996. http://dx.doi.org/10.5040/9798400690716.
Full textCyber Security Management a Governance Risk and Compliance Framework. Ashgate Publishing, Limited, 2014.
Find full textCountering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering. Taylor & Francis Group, 2020.
Find full textBochman, Andrew A., and Sarah Freeman. Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering. Taylor & Francis Group, 2020.
Find full textBochman, Andrew A., and Sarah Freeman. Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering. Taylor & Francis Group, 2020.
Find full textGustin, Joseph F. Cyber Terrorism: A Guide for Facility Managers. Fairmont Press, 2003.
Find full textPalkova, Karina, Aleksandra Palkova, Vitālijs Rakstins, et al. Handbook for Academic and Scientific Institutions: Improve Risk Management and Institutional Resilience in the face of Security Threats. Rīga Stradiņš University, 2024. https://doi.org/10.25143/handbook_isbn-978-9934-618-61-1.
Full textEvans, Ariel. Enterprise Cybersecurity in Digital Busines: Building a Cyber Resilient Organization. Taylor & Francis Group, 2021.
Find full textEnterprise Cybersecurity in Digital Busines: Building a Cyber Resilient Organization. Routledge, 2021.
Find full textHandbook of Research on Information and Cyber Security in the Fourth Industrial Revolution. IGI Global, 2018.
Find full textTermanini, Rocky. Nano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities. Taylor & Francis Group, 2018.
Find full textTermanini, Rocky. Nano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities. Taylor & Francis Group, 2018.
Find full textTermanini, Rocky. Nano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities. Taylor & Francis Group, 2018.
Find full textNano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities. Taylor & Francis Group, 2018.
Find full textUS GOVERNMENT. Computer security: Cyber attacks--war without borders : Hearing before the Subcommittee on Government Management, Information, and Technology of the Committee ... Congress, second session, July 26, 2000. For sale by the Supt. of Docs., U.S. G.P.O. [Congressional Sales Office], 2001.
Find full textDigital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers. Springer, 2016.
Find full textJames, Joshua, George Markowsky, Sanjay Goel, Pavel Gladyshev, and Daryl Johnson. Digital Forensics and Cyber Crime: 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings. Springer International Publishing AG, 2022.
Find full textMarrington, Andrew, Pavel Gladyshev, and Ibrahim Baggili. Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers. Springer International Publishing AG, 2015.
Find full textMarrington, Andrew, Pavel Gladyshev, and Ibrahim Baggili. Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers. Springer London, Limited, 2014.
Find full textGoel, Sanjay, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, and Suryadipta Majumdar. Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings. Springer International Publishing AG, 2021.
Find full textGladyshev, Pavel, and Marcus K. Rogers. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Springer, 2012.
Find full textGladyshev, Pavel, and Marcus K. Rogers. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers ... and Telecommunications Engineering). Springer, 2012.
Find full textH.R. 4246, the Cyber Security Information Act of 2000: An examination of issues involving public-private partnerships for critical infrastructures : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 4246 ... June 22, 2000. U.S. G.P.O., 2001.
Find full text