Books on the topic 'Security threat'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security threat.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Remerowski, Ted, and Marrin Canell. Security threat. Films for the Humanities and Sciences, 2004.
Find full textUnited States. Dept. of State. Office of Public Communication. Editorial Division, ed. Narcotics: Threat to global security. U.S. Dept. of State, Bureau of Public Affairs, Office of Public Communication, Editorial Division, 1990.
Find full textS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance Pub. House, 1990.
Find full textS, Nagar K., Sharma Gautam, and International Seminar on "The Security of the Indian Sub-Continent: Challenges from the Super Power Politics" (1986 : University of Gorakhpur), eds. India's security: Super power threat. Reliance, 1987.
Find full textUnited States. Dept. of the Air Force and United States. Air Force Satellite Control Network System Program Office, eds. The hacker threat: ADP security. Dept. of the Air Force, 1989.
Find full textIII, Clark Champ, ed. Infosecurity 2008 threat analysis. Syngress Publishing, 2008.
Find full textNational Defense University. Africa Center for Strategic Studies, ed. Boko Haram's evolving threat. Africa Center for Strategic Studies, 2012.
Find full textSuggs, Robert C. Glasnost, perestroika, and the Soviet threat. USIC Educational Foundation, 1990.
Find full textWhitmore, D. C. Characterization of the nuclear proliferation threat. D.C. Whitmore, 1994.
Find full textKiesbye, Stefan. Is Iran a threat to global security? Edited by Kiesbye Stefan. Greenhaven Press, 2010.
Find full textNayar, V. K. Threat from within: India's internal security environment. Lancer Publishers, 1992.
Find full textDupont, Alan. Australia's threat perceptions: A search for security. Strategic and Defence Studies Centre, Research School of Pacific Studies, Australian National University, 1991.
Find full textFrancis, Samuel T. Illegal immgration: A threat to US security. Centre for Security and Conflict Studies, 1986.
Find full textFrancis, Samuel T. Illegal immigration - a threat to US security. Centre for Security and Conflict Studies, 1986.
Find full textAdolfo, Leyva de Varona, ed. Cuba: Assessing the threat to U.S. security. Endowment for Cuban American Studies, 2001.
Find full textPolice, Illinois State. Bomb threats: Recommended procedures for : security, handling the threat, evacuation, the search. Illinois State Police, 1996.
Find full textNational Security Council (U.S.), ed. International crime threat assessment. Executive Office of the President, National Security Council?, 2000.
Find full textSullivan, Peter. Iraq's enduring proliferation threat. National Defense University, Institute for National Strategic Studies, 1996.
Find full textRubin, Uzi. The missile threat from Gaza: From nuisance to strategic threat. Begin-Sadat Center for Strategic Studies, 2011.
Find full textNeil, MacFarlane S., and Queen's University.(Kingston, Ont.). Centre for International Relations., eds. The " Soviet threat" revisited. Centre for International Relations, Queen's University, 1992.
Find full textCarus, W. Seth. The threat of bioterrorism. National Defense University, Institute for National Strategic Studies, 1997.
Find full textKumar, Satish. Reassessing Pakistan as a long term security threat. Centre for Policy Research, 2004.
Find full textMarr, Phebe. U.S.-GCC security relations, I: Differing threat perceptions. National Defense University, Institute for National Strategic Studies, 1995.
Find full textMarr, Phebe. U.S.-GCC security relations, I: Differing threat perceptions. National Defense University, Institute for National Strategic Studies, 1995.
Find full textLawrence, Pfleeger Shari, ed. Analyzing computer security: A threat/vulnerability/countermeasure approach. Prentice Hall, 2011.
Find full textSullivan, Brian. International organized crime: A growing national security threat. National Defense University, Institute for National Strategic Studies, 1996.
Find full textMarr, Phebe. U.S.-GCC security relations, I: Differing threat perceptions. National Defense University, Institute for National Strategic Studies, 1995.
Find full textSullivan, Brian. International organized crime: A growing national security threat. National Defense University, Institute for National Strategic Studies, 1996.
Find full textMarr, Phebe. U.S.-GCC security relations, I: Differing threat perceptions. National Defense University, Institute for National Strategic Studies, 1995.
Find full textShikārah, Aḥmad ʻAbd al-Razzāq. The Gulf States: Threat perceptions and security policies. Emirates Center for Strategic Studies and Research, 2007.
Find full textAgency, International Atomic Energy. National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements (Arabic Edition). International Atomic Energy Agency, 2022.
Find full textDunn Cavelty, Myriam. Cyber-Security and Threat Politics. Routledge, 2007. http://dx.doi.org/10.4324/9780203937419.
Full textSharma, Gautam. India's Security: Super Power Threat. Stosius Inc/Advent Books Division, 1990.
Find full textShirkey, Zachary C., and Ivan Savic. Uncertainty Threat and International Security. Taylor & Francis Group, 2019.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textMaj. Gen. Dr Virinder Uberoy. Threat Perception for National Security. UBSPD, 2005.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textBrannan, David W., and David Tucker. Unconventional Threat to Homeland Security. Wiley & Sons, Incorporated, John, 2018.
Find full textAgency, International Atomic Energy. National Nuclear Security Threat Assessment, Design Basis Threats and Representative Threat Statements: IAEA Nuclear Security Series No. 10-G. International Atomic Energy Agency, 2021.
Find full textSecuring Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSchoenfield, Brook S. E. Securing Systems: Applied Security Architecture and Threat Models. Taylor & Francis Group, 2015.
Find full textSkopik, Florian. Collaborative Cyber Threat Intelligence. Taylor & Francis Group, 2020.
Find full textDecision Making Handbook: Cyber Security Threats, Security Issues, Cybersecurity, Threat, DM9, Security Technologies, Security Concerns, Security Risks, Security Analytics, Startups, Data Security. Independently Published, 2022.
Find full textFogie, Seth, Michael Gregg, Colby DeRodeff, Craig Schiller, and Paul Schooping. InfoSecurity 2008 Threat Analysis. Elsevier Science & Technology Books, 2011.
Find full text