Books on the topic 'Internet of Threads'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Internet of Threads.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Shiaeles, Stavros, and Nicholas Kolokotronis, eds. Internet of Things, Threats, Landscape, and Countermeasures. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152.
Full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Boston, MA: Addison-Wesley, 2007.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Upper Saddle River, NJ: Addison-Wesley, 2008.
Find full textDienel, Hans-Liudger. Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.
Find full textTerrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.
Find full textBou-Harb, Elias, and Nataliia Neshenko. Cyber Threat Intelligence for the Internet of Things. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45858-4.
Full textThreat talk: The comparative politics of internet addiction. Burlington, VT: Ashgate, 2011.
Find full textHow serious a threat are online predators? San Diego, CA: ReferencePoint Press, 2013.
Find full textUnited Service Institution of India., ed. Internal threats and national security. New Delhi: United Service Institution of India, 1986.
Find full textOffice, New Zealand Audit. Managing threats to domestic security. Wellington [N.Z.]: Audit Office, 2003.
Find full textCybercrime: Criminal threats from cyberspace. Santa Barbara, Calif: Praeger, 2010.
Find full textNATO, Advanced Research Workshop on Emerging Asymmetric Threats in the Balkans (2010 Belgrade Serbia). Evolving asymmetric threats in the Balkans. Amsterdam: IOS Press, 2011.
Find full textResearch Editors Doctoral Directorate on Gambling, ed. The gambling threat to national and homeland security: Internet gambling. Buffalo, N.Y: William S. Hein & Co., 2012.
Find full textResearch Editors Doctoral Directorate on Gambling, ed. The gambling threat to economies and financial systems: Internet gambling. Buffalo, N.Y: William S. Hein & Co., Inc., 2010.
Find full textHubbard, Douglas W. Pulse: The new science of harnessing Internet buzz to track threats and opportunities. Hoboken, N.J: Wiley, 2011.
Find full textTerrorism: Understanding the global threat. Harlow, England: Longman/Pearson, 2007.
Find full textResearch Editors Doctoral Directorate on Gambling, ed. The gambling threat to world public order and stability: Internet gambling. Buffalo, New York: William S. Hein & Co., Inc., 2013.
Find full textBoni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.
Find full textCyber threat: The rise of information geopolitics in U.S. national security. Santa Barbara, California: Praeger, 2016.
Find full textBlack ice: The invisible threat of cyber-terrorism. New York: McGraw-Hill/Osborne, 2003.
Find full textW, Shinder Thomas, ed. Deploying Microsoft Forefront Threat Management Gateway 2010. Redmond: Microsoft Press, 2010.
Find full textEvgenia, Bystrov, and Universiṭat Ḥefah. Ḳatedrat Ḥaiḳin le-geoesṭraṭegyah., eds. Tel Aviv state: A threat to Israel. Haifa: Reuven Chaikin Chair in Geostrategy, University of Haifa, 2006.
Find full textSorensen, Karen. Silencing the net: The threat to freedom of expression on-line. New York, N.Y: Human Rights Watch, 1996.
Find full textAfghanistan's internal security threats: The dynamics of ethnic and sectarian violence. Lahore: Dua Publications, 2002.
Find full textThreat to security: How secured is India from within. New Delhi: Manas Publications, 2007.
Find full textNorth America's soft security threats and multilateral governance: A post-Westphalian pathway. New York, NY: Palgrave Macmillan, 2013.
Find full textGordon, Gary R. Identity fraud: A critical national and global threat. [Utica, N.Y.]: Economic Crime Institute, 2003.
Find full textAfghan national army: State security, nuclear neighbors and internal security threats. Lahore: al-Abbas International, 2004.
Find full textGanguly, D. K. Law of cyber crimes: India & abroad : a primer on internet threats and e-mail abuses, hacking, and computer crimes. Allahabad: Dwivedi Law Agency, 2015.
Find full textCongdon, Tim. The debt threat: The dangers of high real interest rates for the world economy. Oxford, UK: B. Blackwell, 1988.
Find full textLone wolf terrorism: Understanding the growing threat. Amherst, N.Y: Prometheus Books, 2013.
Find full textJalālzaʾī, Mūsá K̲h̲ān. Afghan national army: State security, nuclear neighbors and internal security threats. Lahore: Maktaba-e-Jadeed Press, 2005.
Find full textBoko Haram: Threat to national security and right to life. Abuja: Diamondreal Resources Consult, Law Publications Department of Chief J. Alobo & Co, Alobo & Alobo Chambers, 2013.
Find full textInternational Institute for Strategic Studies., ed. Somalia: State collapse and the threat of terrorism. Oxford: Institute of Strategic Studies, 2004.
Find full textThe ethical subject of security: Geopolitical reason and the threat against Europe. Milton Park, Abingdon, Oxon, [England]: Routledge, 2011.
Find full textGompert, David C. Security in Iraq: A framework for analyzing emerging threats as U.S. forces leave. Santa Monica, CA: RAND, 2010.
Find full textK, Kelly Terrence, and Watkins Jessica, eds. Security in Iraq: A framework for analyzing emerging threats as U.S. forces leave. Santa Monica, CA: RAND, 2010.
Find full textHenri, Boshoff, and Institute for Security Studies (South Africa), eds. 'Volk', faith and fatherland: The security threat posed by the white right. Pretoria: Institute for Security Studies, 2003.
Find full text(Foreword), Tom Vilsack, and James N. Levitt (Editor), eds. Conservation in the Internet Age: Threats And Opportunities. Island Press, 2002.
Find full text(Foreword), Tom Vilsack, and James N. Levitt (Editor), eds. Conservation in the Internet Age: Threats and Opportunities. Tandem Library, 2002.
Find full textN, Levitt James, ed. Conservation in the Internet age: Threats and opportunities. Washington, DC: Island Press, 2002.
Find full textThermos, Peter, and Ari Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, 2007.
Find full textSubhani, Abdul B., and Muhammad Faisal Anjad. Smarter World, Bigger Threats: Understanding the Internet of Things. Author Solutions, Incorporated, 2020.
Find full textSubhani, Abdul B., and Muhammad Faisal Anjad. Smarter World, Bigger Threats: Understanding the Internet of Things. Author Solutions, Incorporated, 2020.
Find full text