Books on the topic 'Human aspects of cyber security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Human aspects of cyber security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Kizza, Joseph Migga. Computer network security and cyber ethics. 3rd ed. Jefferson, N.C: McFarland, 2011.
Find full texteditor, Babic Mile, ed. Human security. London: SCM Press, 2018.
Find full textScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Find full textFurnell, Steven, and Nathan Clarke, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2.
Full textClarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2.
Full textClarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8.
Full textKartashkin, V. A. International security and human rights. Moscow: Novosti Press Agency Pub. House, 1988.
Find full textThanh-Đạm, Trương, Wieringa Saskia 1950-, and Chhachhi Amrita, eds. Engendering human security: Feminist perspectives. London: Zed Books, 2006.
Find full textMarinos, Louis, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7.
Full textTryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7.
Full textTryfonas, Theo, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20376-8.
Full textTryfonas, Theo, ed. Human Aspects of Information Security, Privacy, and Trust. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39381-0.
Full textTryfonas, Theo, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07620-1.
Full textCyber terrorism: Political and economic implications. Hershey, PA: Idea Group Pub., 2006.
Find full textErickson, Chris. The poetics of fear: A human response to human security. New York: Continuum, 2010.
Find full textPicciotto, Robert. Global development and human security. New Brunswick, NJ: Transaction Publishers, 2007.
Find full textAnthony, Matthew Richard, ed. Global environmental change and human security. Cambridge, MA: MIT Press, 2010.
Find full textGendered bodies and new technologies: Rethinking embodiment in a cyber-era. Newcastle upon Tyne: Cambridge Scholars, 2009.
Find full textʾFunmi, Olonisakin, and Clarke Michael 1950-, eds. Global development and human security. New Brunswick: Transaction Publishers, 2006.
Find full textReligion and human security: A global perspective. New York: Oxford University Press, 2012.
Find full textGasper, D., and Thanh-Đạm Trương. Transnational migration and human security: The migration-development-security nexus. Heidelberg: Springer, 2011.
Find full textClimate change, ethics and human security. New York: Cambridge University Press, 2010.
Find full textHuman security in Southeast Asia. Milton Park, Abingdon, Oxon: Routledge, 2010.
Find full textThe poetics of fear: A human response to human security. New York: Continuum, 2010.
Find full textZhongguo shu bu qi de wang luo zhan zheng: We can't lose the cyber war. Changsha: Hunan ren min chu ban she, 2010.
Find full textNATO Science for Peace and Security Programme and North Atlantic Treaty Organization. Public Diplomacy Division, eds. Achieving environmental security: Ecosystem services and human welfare. Amsterdam: IOS Press, 2010.
Find full textBao, Tiffany, Milind Tambe, and Cliff Wang. Cyber Deception: Techniques, Strategies, and Human Aspects. Springer International Publishing AG, 2022.
Find full textShekokar, Narendra M., Surya Srinivas Durbha, Tatwadarshi P. Nagarhalli, Hari Vasudevan, and Antonis Michalas. Cyber Security Threats and Challenges Facing Human Life. CRC Press LLC, 2022.
Find full textShekokar, Narendra M., Surya S. Durbha, Tatwadarshi P. Nagarhalli, Hari Vasudevan, and Antonis Michalas. Cyber Security Threats and Challenges Facing Human Life. Taylor & Francis Group, 2022.
Find full textShekokar, Narendra M., Surya S. Durbha, Tatwadarshi P. Nagarhalli, Hari Vasudevan, and Antonis Michalas. Cyber Security Threats and Challenges Facing Human Life. Taylor & Francis Group, 2022.
Find full textShekokar, Narendra M., Surya Srinivas Durbha, Tatwadarshi P. Nagarhalli, Hari Vasudevan, and Antonis Michalas. Cyber Security Threats and Challenges Facing Human Life. CRC Press LLC, 2022.
Find full textShekokar, Narendra M., Surya S. Durbha, Tatwadarshi P. Nagarhalli, Hari Vasudevan, and Antonis Michalas. Cyber Security Threats and Challenges Facing Human Life. Taylor & Francis Group, 2022.
Find full textKizza, Joseph Migga. Computer Network Security and Cyber Ethics. McFarland & Company, 2001.
Find full textCarayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer, 2016.
Find full textCarayannis, Elias G., David F. J. Campbell, and Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer London, Limited, 2014.
Find full textCyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer, 2014.
Find full textJajodia, Sushil, Peng Liu, and Cliff Wang. Theory and Models for Cyber Situation Awareness. Springer, 2017.
Find full textCyber-Conflict and Global Politics (Contemporary Security Studies). Routledge, 2008.
Find full textBird, David Anthony. Real-Time and Retrospective Analyses of Cyber Security. IGI Global, 2020.
Find full textBird, David Anthony. Real-Time and Retrospective Analyses of Cyber Security. IGI Global, 2020.
Find full textBird, David Anthony. Real-Time and Retrospective Analyses of Cyber Security. IGI Global, 2020.
Find full textBird, David Anthony. Real-Time and Retrospective Analyses of Cyber Security. IGI Global, 2020.
Find full textBird, David Anthony. Real-Time and Retrospective Analyses of Cyber Security. IGI Global, 2020.
Find full textR. E. D. Dot RED DOT PUBLICATIONS and Digital DIGITAL PUBLICATIONS. Networks and Information Systems Infrastructure Security: Economics and Social Aspects of Cyber Security. Independently Published, 2017.
Find full textComputer Network Security and Cyber Ethics, 2d edition. 2nd ed. McFarland & Company, Publishers, 2006.
Find full textM, Scott Lynn, ed. Human capital management for the USAF cyber force. Santa Monica, CA: RAND, 2010.
Find full textThe Cyber Effect. imusti, 2017.
Find full textComputer Network Security and Cyber Ethics, 4th ed. McFarland, 2014.
Find full textGlobalization, Difference, and Human Security. Taylor & Francis Group, 2013.
Find full textPasha, Mustapha Kamal. Globalization, Difference, and Human Security. Taylor & Francis Group, 2013.
Find full text