Books on the topic 'CyberSecurty'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'CyberSecurty.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Guiora, Amos N. Cybersecurity. Boca Raton, FL : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.1201/9781315370231.
Full textBrooks, Charles J., Christopher Grow, Philip Craig, and Donald Short. Cybersecurity. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119369141.
Full textKumar, Gautam, Om Prakash Singh, and Hemraj Saini. Cybersecurity. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042.
Full textAbd El-Latif, Ahmed A., and Christos Volos, eds. Cybersecurity. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92166-8.
Full textDonaldson, Scott E., Stanley G. Siegel, Chris K. Williams, and Abdul Aslam. Enterprise Cybersecurity. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4302-6083-7.
Full textConti, Mauro, Gaurav Somani, and Radha Poovendran, eds. Versatile Cybersecurity. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3.
Full textWaschke, Marvin. Personal Cybersecurity. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2430-4.
Full textAyala, Luis. Cybersecurity Lexicon. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2068-9.
Full textBeissel, Stefan. Cybersecurity Investments. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30460-1.
Full textKaplan, James M., Tucker Bailey, Chris Rezek, Derek O'Halloran, and Alan Marcus, eds. Beyond Cybersecurity. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119055228.
Full textPatterson, Wayne, and Cynthia E. Winston-Proctor. Behavioral Cybersecurity. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484.
Full textKosseff, Jeff. Cybersecurity Law. Hoboken, New Jersey: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119231899.
Full textPatterson, Wayne, and Cynthia E. Winston-Proctor. Behavioral Cybersecurity. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029.
Full textVerma, Rakesh M., and David J. Marchette. Cybersecurity Analytics. Boca Raton, FL : CRC Press, 2020. | Series: Chapman & Hall/CRC data science series: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429326813.
Full textWurm, Manuel. Automotive Cybersecurity. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64228-3.
Full textVanuatu. National cybersecurity policy. Port Vila, Vanuatu]: [Republic of Vanuatu], 2013.
Find full textLee, Newton. Counterterrorism and Cybersecurity. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17244-6.
Full textLee, Newton. Counterterrorism and Cybersecurity. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7205-6.
Full textDunn Cavelty, Myriam. Cybersecurity in Switzerland. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10620-5.
Full textBaumard, Philippe. Cybersecurity in France. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54308-6.
Full textIorliam, Aamo. Cybersecurity in Nigeria. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15210-9.
Full textTabansky, Lior, and Isaac Ben Israel. Cybersecurity in Israel. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4.
Full textAustin, Greg. Cybersecurity in China. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-68436-9.
Full textThompson, Eric C. Cybersecurity Incident Response. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3870-7.
Full textOakley, Jacob G. Cybersecurity for Space. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5732-6.
Full textSikos, Leslie F., ed. AI in Cybersecurity. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-98842-9.
Full textTouhill, Gregory J., and C. Joseph Touhill. Cybersecurity for Executives. Hoboken, NJ: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118908785.
Full textSchallbruch, Martin, and Isabel Skierka. Cybersecurity in Germany. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90014-8.
Full textBartsch, Michael, and Stefanie Frey, eds. Cybersecurity Best Practices. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21655-9.
Full textMillett, Lynette I., Baruch Fischhoff, and Peter J. Weinberger, eds. Foundational Cybersecurity Research. Washington, D.C.: National Academies Press, 2017. http://dx.doi.org/10.17226/24676.
Full textMongeau, Scott, and Andrzej Hajdasinski. Cybersecurity Data Science. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74896-8.
Full textChałubińska-Jentkiewicz, Katarzyna, Filip Radoniewicz, and Tadeusz Zieliński, eds. Cybersecurity in Poland. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78551-2.
Full textSeguridad en redes. Madrid, Spain: DarFe Learning Consulting, S. L., 2016.
Find full textJohnson, Thomas A., ed. Cybersecurity. Routledge, 2015. http://dx.doi.org/10.1201/b18335.
Full textCybersecurity. The MIT Press, 2021.
Find full textAndreasson, Kim. Cybersecurity. Edited by Kim J. Andreasson. CRC Press, 2011. http://dx.doi.org/10.1201/b11363.
Full textCybersecurity. RAND Corporation, 2021. http://dx.doi.org/10.7249/cpa1329-2.
Full textCybersecurity Lexicon. Apress, 2016.
Find full textKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2017.
Find full textCybersecurity Essentials. Wiley & Sons, Incorporated, John, 2018.
Find full textMarchette, David J., and Rakesh M. Verma. Cybersecurity Analytics. Taylor & Francis Group, 2019.
Find full textKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2019.
Find full textMarchette, David J., and Rakesh M. Verma. Cybersecurity Analytics. CRC Press LLC, 2020.
Find full textKosseff, Jeff. Cybersecurity Law. Wiley, 2017.
Find full textCybersecurity Careers. Referencepoint Pr Inc, 2018.
Find full textKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2019.
Find full textMarchette, David J., and Rakesh M. Verma. Cybersecurity Analytics. Taylor & Francis Group, 2019.
Find full textCapitano, Madison. Cybersecurity Experts. Rourke Educational Media, 2020.
Find full textCybersecurity Fundamentals. Taylor & Francis Group, 2020.
Find full textKosseff, Jeff. Cybersecurity Law. Wiley & Sons, Incorporated, John, 2017.
Find full text