Books on the topic 'Threat of information leakage'

To see the other types of publications on this topic, follow the link: Threat of information leakage.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Threat of information leakage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Taikang, and Yongmei Li. Electromagnetic Information Leakage and Countermeasure Technique. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reinikka, Ritva. Explaining leakage of public funds. Washington, D.C: World Bank, Public Services for Human Development, Development Research Group, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reinikka, Ritva. Explaining leakage of public funds. Helsinki: United Nations University, World Institute for Development Economics Research, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yuval, Elovici, Rokach Lior, and SpringerLink (Online service), eds. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schrader, Stephan. Informal technology transfer between companies: Information leakage or know-how trading? Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hadden, Lawrence. Upper-limit indicator targeting and age-based nutritional interventions: Optimality, information and leakage. Coventry: University of Warwick, Development Economics Research Centre, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yoshihara, Toshi. Chinese information warfare: A phantom menace or emerging threat? [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. Hurlburt Field, Fla: JSOU Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anis, Mohab. Multi-threshold CMOS digital circuits: Managing leakage power. Boston, MA: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

1943-, Elmasry Mohamed I., ed. Multi-threshold CMOS digital circuits: Managing leakage power. Boston: Kluwer Academic Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Cyber threat: The rise of information geopolitics in U.S. national security. Santa Barbara, California: Praeger, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sorensen, Karen. Silencing the net: The threat to freedom of expression on-line. New York, N.Y: Human Rights Watch, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Information assurance and security technologies for risk assessment and threat management: Advances. Hershey, PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Cavelty, Myriam Dunn. Cyber-security and threat politics: US efforts to secure the information age. Milton Park, Abingdon, Oxon: Routledge, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Threat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Asimakopoulou, Eleana. Advanced ICTs for disaster management and threat detection: Collaborative and distributed frameworks. Hershey, PA: Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Norris, Carolyn, and Fidelis Edge Kanyongolo. The Gambia: Freedom of expression still under threat : the case of Citizen FM. London: Article 19, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Office, National Audit. Cabinet Office: The millennium threat, 221 days and counting : report. London: Stationery Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gup, Ted. Nation of secrets: The threat to democracy and the American way of life. New York, NY: Doubleday, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Facebook democracy: The architect of disclosure and the threat to public life. Farnham, Surrey: Ashgate Pub., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

K, Knake Robert, ed. Cyber war: The next threat to national security and what to do about it. New York: Ecco, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

K, Knake Robert, ed. Cyber war: The next threat to national security and what to do about it. New York: Ecco, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. Santa Monica, CA: RAND, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

America the vulnerable: New technology and the next threat to national security. New York: Penguin Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Fusion centres throughout Europe: All-source threat assessments in the fight against terrorism. Antwerp: Intersentia, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on National Security, Homeland Defense, and Foreign Operations. Cybersecurity: Assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

United, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. Countering the changing threat of international terrorism: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session ... June 28, 2000. Washington: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

United States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Evaluating the threat of agro-terrorism: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, May 25, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

United, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. Germs, toxins, and terror: The new threat to America : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, November 6, 2001. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Reassessing the evolving al-Qaeda threat to the homeland: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, November 19, 2009. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Countering the changing threat of international terrorism: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session on the National Commission on Terrorism's report on issues relating to efforts being made by the intelligence and law enforcement communities to counter, and U.S. policies regarding, the changing threat ... June 28, 2000. Washington: U.S. Government Printing Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

United, States Congress House Committee on Homeland Security Subcommittee on Cybersecurity Infrastructure Protection and Security Technologies. Facilitating cyber threat information sharing and partnering with the private sector to protect critical infrastructure: An assessment of DHS capabilities : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, May 16, 2013. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

The threat to Americans' personal information: A look into the security and reliability of the health exchange data hub : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, September 11, 2013. Washington: U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

United States. Government Accountability Office. Cooperative threat reduction: DOD needs more reliable data to better estimate the cost and schedule of the Shchuch'ye facility : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. [Washington, D.C..]: The Office, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

United, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Institute of Information Scientists. Irish Branch. and Library Association of Ireland. Academic and Special Libraries Section., eds. Information millennium: Threat or promise?. [Dublin?]: [LAI (ASLS)?], 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Information Management and the Biological Warfare Threat. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Outsourcing Information Technology and the Insider Threat. Storming Media, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

The Next War Zone: Confronting the Global Threat of Cyberterrorism: Confronting the Global Threat of Cyberterrorism. Citadel, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

UcedaVelez, Tony, and Marco M. Morana. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

UcedaVelez, Tony, and Marco M. Morana. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Rokach, Lior, Asaf Shabtai, and Yuval Elovici. A Survey of Data Leakage Detection and Prevention Solutions. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Application Threat Modeling. John Wiley & Sons, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chinese information warfare: A phantom menace or emerging threat? Strategic Studies Institute, U.S. Army War College, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yoshihara, Toshi. Chinese Information Warfare: A Phantom Menace Or Emerging Threat? University Press of the Pacific, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Responding to the Threat of Cyberterrorism through Information Assurance. Storming Media, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Anis, Mohab, and Mohamed Elmasry. Multi-Threshold CMOS Digital Circuits: Managing Leakage Power. Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography