Books on the topic 'Threat of information leakage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Threat of information leakage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Liu, Taikang, and Yongmei Li. Electromagnetic Information Leakage and Countermeasure Technique. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9.
Full textReinikka, Ritva. Explaining leakage of public funds. Washington, D.C: World Bank, Public Services for Human Development, Development Research Group, 2001.
Find full textReinikka, Ritva. Explaining leakage of public funds. Helsinki: United Nations University, World Institute for Development Economics Research, 2001.
Find full textBoni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.
Find full textYuval, Elovici, Rokach Lior, and SpringerLink (Online service), eds. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012.
Find full textSchrader, Stephan. Informal technology transfer between companies: Information leakage or know-how trading? Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1989.
Find full textHadden, Lawrence. Upper-limit indicator targeting and age-based nutritional interventions: Optimality, information and leakage. Coventry: University of Warwick, Development Economics Research Centre, 1991.
Find full textYoshihara, Toshi. Chinese information warfare: A phantom menace or emerging threat? [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2001.
Find full textJoint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. Hurlburt Field, Fla: JSOU Press, 2008.
Find full textAnis, Mohab. Multi-threshold CMOS digital circuits: Managing leakage power. Boston, MA: Kluwer Academic Publishers, 2004.
Find full text1943-, Elmasry Mohamed I., ed. Multi-threshold CMOS digital circuits: Managing leakage power. Boston: Kluwer Academic Publishers, 2003.
Find full textCyber threat: The rise of information geopolitics in U.S. national security. Santa Barbara, California: Praeger, 2016.
Find full textSorensen, Karen. Silencing the net: The threat to freedom of expression on-line. New York, N.Y: Human Rights Watch, 1996.
Find full textInformation assurance and security technologies for risk assessment and threat management: Advances. Hershey, PA: Information Science Reference, 2012.
Find full textCavelty, Myriam Dunn. Cyber-security and threat politics: US efforts to secure the information age. Milton Park, Abingdon, Oxon: Routledge, 2007.
Find full textThreat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.
Find full textAsimakopoulou, Eleana. Advanced ICTs for disaster management and threat detection: Collaborative and distributed frameworks. Hershey, PA: Information Science Reference, 2010.
Find full textNorris, Carolyn, and Fidelis Edge Kanyongolo. The Gambia: Freedom of expression still under threat : the case of Citizen FM. London: Article 19, 1999.
Find full textOffice, National Audit. Cabinet Office: The millennium threat, 221 days and counting : report. London: Stationery Office, 1999.
Find full textGup, Ted. Nation of secrets: The threat to democracy and the American way of life. New York, NY: Doubleday, 2007.
Find full textFacebook democracy: The architect of disclosure and the threat to public life. Farnham, Surrey: Ashgate Pub., 2012.
Find full textK, Knake Robert, ed. Cyber war: The next threat to national security and what to do about it. New York: Ecco, 2012.
Find full textK, Knake Robert, ed. Cyber war: The next threat to national security and what to do about it. New York: Ecco, 2010.
Find full text1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. Santa Monica, CA: RAND, 2004.
Find full textAmerica the vulnerable: New technology and the next threat to national security. New York: Penguin Press, 2011.
Find full textFusion centres throughout Europe: All-source threat assessments in the fight against terrorism. Antwerp: Intersentia, 2010.
Find full textUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on National Security, Homeland Defense, and Foreign Operations. Cybersecurity: Assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011. Washington: U.S. G.P.O., 2011.
Find full textUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. Countering the changing threat of international terrorism: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session ... June 28, 2000. Washington: U.S. G.P.O., 2001.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Evaluating the threat of agro-terrorism: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, May 25, 2005. Washington: U.S. G.P.O., 2005.
Find full textUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. Germs, toxins, and terror: The new threat to America : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, November 6, 2001. Washington: U.S. G.P.O., 2002.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.
Find full textReassessing the evolving al-Qaeda threat to the homeland: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, November 19, 2009. Washington: U.S. G.P.O., 2011.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Countering the changing threat of international terrorism: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session on the National Commission on Terrorism's report on issues relating to efforts being made by the intelligence and law enforcement communities to counter, and U.S. policies regarding, the changing threat ... June 28, 2000. Washington: U.S. Government Printing Office, 2001.
Find full textUnited, States Congress House Committee on Homeland Security Subcommittee on Cybersecurity Infrastructure Protection and Security Technologies. Facilitating cyber threat information sharing and partnering with the private sector to protect critical infrastructure: An assessment of DHS capabilities : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, May 16, 2013. Washington: U.S. Government Printing Office, 2013.
Find full textThe threat to Americans' personal information: A look into the security and reliability of the health exchange data hub : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, September 11, 2013. Washington: U.S. Government Printing Office, 2014.
Find full textUnited States. Government Accountability Office. Cooperative threat reduction: DOD needs more reliable data to better estimate the cost and schedule of the Shchuch'ye facility : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. [Washington, D.C..]: The Office, 2006.
Find full textUnited, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.
Find full textReassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.
Find full textInstitute of Information Scientists. Irish Branch. and Library Association of Ireland. Academic and Special Libraries Section., eds. Information millennium: Threat or promise?. [Dublin?]: [LAI (ASLS)?], 1997.
Find full textInformation Management and the Biological Warfare Threat. Storming Media, 2002.
Find full textOutsourcing Information Technology and the Insider Threat. Storming Media, 2003.
Find full textThe Next War Zone: Confronting the Global Threat of Cyberterrorism: Confronting the Global Threat of Cyberterrorism. Citadel, 2003.
Find full textUcedaVelez, Tony, and Marco M. Morana. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley & Sons, Incorporated, John, 2015.
Find full textUcedaVelez, Tony, and Marco M. Morana. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley & Sons, Incorporated, John, 2015.
Find full textRokach, Lior, Asaf Shabtai, and Yuval Elovici. A Survey of Data Leakage Detection and Prevention Solutions. Springer, 2012.
Find full textApplication Threat Modeling. John Wiley & Sons, 2013.
Find full textChinese information warfare: A phantom menace or emerging threat? Strategic Studies Institute, U.S. Army War College, 2001.
Find full textYoshihara, Toshi. Chinese Information Warfare: A Phantom Menace Or Emerging Threat? University Press of the Pacific, 2004.
Find full textResponding to the Threat of Cyberterrorism through Information Assurance. Storming Media, 1999.
Find full textAnis, Mohab, and Mohamed Elmasry. Multi-Threshold CMOS Digital Circuits: Managing Leakage Power. Springer, 2003.
Find full text