Books on the topic 'Strategic cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 books for your research on the topic 'Strategic cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Find full textAddressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.
Find full textUnderstanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.
Find full textUnited, States Congress House Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology. A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.
Find full textA roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Criminal Justice, Drug Policy, and Human Resources., ed. Fencing the border: Construction options and strategic placement : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security with the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, July 20, 2006. Washington: U.S. G.P.O., 2009.
Find full textPowers, Grace. U. S. National Cybersecurity: Strategic Challenges and Opportunities. Nova Science Publishers, Incorporated, 2014.
Find full textMARK A RUSSO CISSP-ISSAP CISO. Is "Agile Cybersecurity" Possible?: Strategic and Tactical Solutions to Realizing Agility. Independently published, 2018.
Find full textCowhey, Peter F., and Jonathan D. Aronson. Two Cases and Policy Implications. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0003.
Full textSchiller, Dan. Accumulation and Repression. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038761.003.0014.
Full textFreilich, Charles D. The Military Response Today. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0008.
Full textRoberts, Anthea. Disruptions Leading to a Competitive World Order. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190696412.003.0006.
Full textCowhey, Peter F., and Jonathan D. Aronson. Creating an International Governance Regime for the Digital Economy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0009.
Full textCowhey, Peter F., and Jonathan D. Aronson. Digital DNA. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.001.0001.
Full textCowhey, Peter F., and Jonathan D. Aronson. Global Policy for the Cloud. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0006.
Full text