Books on the topic 'Cyber(in-)security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Cyber(in-)security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Shukla, Sandeep Kumar, and Manindra Agrawal, eds. Cyber Security in India. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1675-7.
Full textShen, Bazhong, Baocang Wang, Jinguang Han, and Yong Yu, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0818-9.
Full textXu, Guangquan, Kaitai Liang, and Chunhua Su, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9739-8.
Full textAnbar, Mohammed, Nibras Abdullah, and Selvakumar Manickam, eds. Advances in Cyber Security. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2693-0.
Full textLi, Fagen, Tsuyoshi Takagi, Chunxiang Xu, and Xiaosong Zhang, eds. Frontiers in Cyber Security. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3095-7.
Full textAnbar, Mohammed, Nibras Abdullah, and Selvakumar Manickam, eds. Advances in Cyber Security. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6835-4.
Full textRass, Stefan, Stefan Schauer, Sandra König, and Quanyan Zhu. Cyber-Security in Critical Infrastructures. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46908-5.
Full textProbst, Christian W., Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, eds. Insider Threats in Cyber Security. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3.
Full textAwad, Ali Ismail, Steven Furnell, Marcin Paprzycki, and Sudhir Kumar Sharma, eds. Security in Cyber-Physical Systems. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67361-1.
Full textKarake-Shalhoub, Zeinab. Cyber law and cyber security in developing and emerging economies. Cheltenham, UK: Edward Elgar, 2010.
Find full textThomas, Tony, Athira P. Vijayaraghavan, and Sabu Emmanuel. Machine Learning Approaches in Cyber Security Analytics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1706-8.
Full textSong, Houbing, Glenn A. Fink, and Sabina Jeschke, eds. Security and Privacy in Cyber-Physical Systems. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119226079.
Full textShandilya, Shishir K., Neal Wagner, and Atulya K. Nagar, eds. Advances in Cyber Security Analytics and Decision Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-19353-9.
Full textBiffl, Stefan, Matthias Eckhart, Arndt Lüder, and Edgar Weippl, eds. Security and Quality in Cyber-Physical Systems Engineering. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25312-7.
Full textLi, Kuan-Ching, Xiaofeng Chen, and Willy Susilo, eds. Advances in Cyber Security: Principles, Techniques, and Applications. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-1483-4.
Full textYu, Philip S. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. Boston, MA: Springer-Verlag US, 2009.
Find full textAlfaries, Auhood, Hanan Mengash, Ansar Yasar, and Elhadi Shakshuki, eds. Advances in Data Science, Cyber Security and IT Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36365-9.
Full textAlfaries, Auhood, Hanan Mengash, Ansar Yasar, and Elhadi Shakshuki, eds. Advances in Data Science, Cyber Security and IT Applications. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36368-0.
Full textChristou, George. Cyber security in the European Union: Resilience and adaptability in governance policy. Houndmills, Basingstoke Hampshire: Palgrave Macmillan, 2015.
Find full textNational security and counterintelligence in the era of cyber espionage. Hershey: Information Science Reference, 2016.
Find full textInstitution of Engineering and Technology, ed. Code of practice for cyber security in the built environment. London: Institution of Engineering and Technology, 2014.
Find full textCyber threat: The rise of information geopolitics in U.S. national security. Santa Barbara, California: Praeger, 2016.
Find full textRogers, W. S. Cyber liability in the age of the new data security laws. [Boston, Mass.]: MCLE, 2010.
Find full textAbawajy, Jemal, Kim-Kwang Raymond Choo, and Rafiqul Islam, eds. International Conference on Applications and Techniques in Cyber Security and Intelligence. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-67071-3.
Full textHeuven, Marten Van. Managing new issues: Cyber security in an era of technological change. Santa Monica, CA: Rand, 2003.
Find full textCyber challenges and national security: Threats, opportunities, and power in a virtual world. Washington, D.C: Georgetown University Press, 2012.
Find full textAbawajy, Jemal, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, and Mohammed Atiquzzaman, eds. International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-98776-7.
Full textHandbook of research on civil society and national security in the era of cyber warfare. Hershey, PA: Information Science Reference, 2016.
Find full textWood, Theodore A. Understanding recent cyberlaw lawsuits and developments: An in-depth look at new cyber security threats and their impact on digital business. [Boston, Mass.]: Aspatore, 2010.
Find full textHsu, D. Frank, and Dorothy Marinucci, eds. Advances in Cyber Security. Fordham University Press, 2013. http://dx.doi.org/10.5422/fordham/9780823244560.001.0001.
Full textMartellini, Maurizio, and Stanislav Abaimov. Cyber Arms: Security in Cyberspace. Taylor & Francis Group, 2020.
Find full textMartellini, Maurizio, and Stanislav Abaimov. Cyber Arms: Security in Cyberspace. Taylor & Francis Group, 2020.
Find full textMartellini, Maurizio, and Stanislav Abaimov. Cyber Arms: Security in Cyberspace. Taylor & Francis Group, 2020.
Find full textMartellini, Maurizio, and Stanislav Abaimov. Cyber Arms: Security in Cyberspace. Taylor & Francis Group, 2020.
Find full textConfident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career. Kogan Page, Limited, 2020.
Find full textBarker, Jessica. Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career. Kogan Page, Limited, 2020.
Find full textLe, DacNhuong, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, and Jyotir Moy Chatterjee, eds. Cyber Security in Parallel and Distributed Computing. Wiley, 2019. http://dx.doi.org/10.1002/9781119488330.
Full textMikolic-Torreira, Igor, Don Snyder, Michelle Price, David Shlapak, Sina Beaghley, Megan Bishop, Sarah Harting, et al. Exploring Cyber Security Policy Options in Australia. RAND Corporation, 2017. http://dx.doi.org/10.7249/rr2008.
Full textHsu, D. Frank, and Dorothy Marinucci. Advances in Cyber Security: Technology, Operation, and Experiences. Fordham University Press, 2013.
Find full textHsu, D. Frank, and Dorothy Marinucci. Advances in Cyber Security: Technology, Operations, and Experiences. Fordham University Press, 2013.
Find full textAgrawal, Manindra, and Sandeep Kumar Shukla. Cyber Security in India: Education, Research and Training. Springer, 2020.
Find full textChen, Xiaofeng, Willy Susilo, and Kuan-Ching Li. Advances in Cyber Security: Principles, Techniques, and Applications. Springer, 2019.
Find full textNagar, Atulya K., Shishir K. Shandilya, and Neal Wagner. Advances in Cyber Security Analytics and Decision Systems. Springer, 2020.
Find full textTan, Chee Wei, and YU Pei-duo. Network Inference for Cyber Security in Complex Networks. Springer, 2020.
Find full textAgrawal, Manindra, and Sandeep Kumar Shukla. Cyber Security in India: Education, Research and Training. Springer, 2020.
Find full textAdvances in Cyber Security: Technology, Operations, and Experiences. Fordham University Press, 2013.
Find full textWang, Xiaoyu, Shichao Liu, and Wenchao Meng. Distributed Control Methods and Cyber Security Issues in Microgrids. Elsevier Science & Technology, 2020.
Find full text