Libri sul tema "Strategic cybersecurity"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-16 libri per l'attività di ricerca sul tema "Strategic cybersecurity".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoAddressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnderstanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnited, States Congress House Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology. A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoA roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnited States. Congress. House. Committee on Government Reform. Subcommittee on Criminal Justice, Drug Policy, and Human Resources., a cura di. Fencing the border: Construction options and strategic placement : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security with the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, July 20, 2006. Washington: U.S. G.P.O., 2009.
Cerca il testo completoPowers, Grace. U. S. National Cybersecurity: Strategic Challenges and Opportunities. Nova Science Publishers, Incorporated, 2014.
Cerca il testo completoMARK A RUSSO CISSP-ISSAP CISO. Is "Agile Cybersecurity" Possible?: Strategic and Tactical Solutions to Realizing Agility. Independently published, 2018.
Cerca il testo completoCowhey, Peter F., e Jonathan D. Aronson. Two Cases and Policy Implications. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0003.
Testo completoSchiller, Dan. Accumulation and Repression. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038761.003.0014.
Testo completoFreilich, Charles D. The Military Response Today. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0008.
Testo completoRoberts, Anthea. Disruptions Leading to a Competitive World Order. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190696412.003.0006.
Testo completoCowhey, Peter F., e Jonathan D. Aronson. Creating an International Governance Regime for the Digital Economy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0009.
Testo completoCowhey, Peter F., e Jonathan D. Aronson. Digital DNA. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.001.0001.
Testo completoCowhey, Peter F., e Jonathan D. Aronson. Global Policy for the Cloud. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0006.
Testo completo