Книги з теми "Threat of information leakage"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Threat of information leakage".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Liu, Taikang, and Yongmei Li. Electromagnetic Information Leakage and Countermeasure Technique. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9.
Повний текст джерелаReinikka, Ritva. Explaining leakage of public funds. Washington, D.C: World Bank, Public Services for Human Development, Development Research Group, 2001.
Знайти повний текст джерелаReinikka, Ritva. Explaining leakage of public funds. Helsinki: United Nations University, World Institute for Development Economics Research, 2001.
Знайти повний текст джерелаBoni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.
Знайти повний текст джерелаYuval, Elovici, Rokach Lior, and SpringerLink (Online service), eds. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012.
Знайти повний текст джерелаSchrader, Stephan. Informal technology transfer between companies: Information leakage or know-how trading? Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1989.
Знайти повний текст джерелаHadden, Lawrence. Upper-limit indicator targeting and age-based nutritional interventions: Optimality, information and leakage. Coventry: University of Warwick, Development Economics Research Centre, 1991.
Знайти повний текст джерелаYoshihara, Toshi. Chinese information warfare: A phantom menace or emerging threat? [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2001.
Знайти повний текст джерелаJoint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. Hurlburt Field, Fla: JSOU Press, 2008.
Знайти повний текст джерелаAnis, Mohab. Multi-threshold CMOS digital circuits: Managing leakage power. Boston, MA: Kluwer Academic Publishers, 2004.
Знайти повний текст джерела1943-, Elmasry Mohamed I., ed. Multi-threshold CMOS digital circuits: Managing leakage power. Boston: Kluwer Academic Publishers, 2003.
Знайти повний текст джерелаCyber threat: The rise of information geopolitics in U.S. national security. Santa Barbara, California: Praeger, 2016.
Знайти повний текст джерелаSorensen, Karen. Silencing the net: The threat to freedom of expression on-line. New York, N.Y: Human Rights Watch, 1996.
Знайти повний текст джерелаInformation assurance and security technologies for risk assessment and threat management: Advances. Hershey, PA: Information Science Reference, 2012.
Знайти повний текст джерелаCavelty, Myriam Dunn. Cyber-security and threat politics: US efforts to secure the information age. Milton Park, Abingdon, Oxon: Routledge, 2007.
Знайти повний текст джерелаThreat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.
Знайти повний текст джерелаAsimakopoulou, Eleana. Advanced ICTs for disaster management and threat detection: Collaborative and distributed frameworks. Hershey, PA: Information Science Reference, 2010.
Знайти повний текст джерелаNorris, Carolyn, and Fidelis Edge Kanyongolo. The Gambia: Freedom of expression still under threat : the case of Citizen FM. London: Article 19, 1999.
Знайти повний текст джерелаOffice, National Audit. Cabinet Office: The millennium threat, 221 days and counting : report. London: Stationery Office, 1999.
Знайти повний текст джерелаGup, Ted. Nation of secrets: The threat to democracy and the American way of life. New York, NY: Doubleday, 2007.
Знайти повний текст джерелаFacebook democracy: The architect of disclosure and the threat to public life. Farnham, Surrey: Ashgate Pub., 2012.
Знайти повний текст джерелаK, Knake Robert, ed. Cyber war: The next threat to national security and what to do about it. New York: Ecco, 2012.
Знайти повний текст джерелаK, Knake Robert, ed. Cyber war: The next threat to national security and what to do about it. New York: Ecco, 2010.
Знайти повний текст джерела1939-, Anderson Robert H., United States. Advanced Research and Development Activity, and Rand Corporation, eds. Understanding the insider threat: Proceedings of a March 2004 workshop. Santa Monica, CA: RAND, 2004.
Знайти повний текст джерелаAmerica the vulnerable: New technology and the next threat to national security. New York: Penguin Press, 2011.
Знайти повний текст джерелаFusion centres throughout Europe: All-source threat assessments in the fight against terrorism. Antwerp: Intersentia, 2010.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on National Security, Homeland Defense, and Foreign Operations. Cybersecurity: Assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011. Washington: U.S. G.P.O., 2011.
Знайти повний текст джерелаUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. Countering the changing threat of international terrorism: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session ... June 28, 2000. Washington: U.S. G.P.O., 2001.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. Evaluating the threat of agro-terrorism: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, May 25, 2005. Washington: U.S. G.P.O., 2005.
Знайти повний текст джерелаUnited, States Congress Senate Committee on the Judiciary Subcommittee on Technology Terrorism and Government Information. Germs, toxins, and terror: The new threat to America : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, November 6, 2001. Washington: U.S. G.P.O., 2002.
Знайти повний текст джерелаUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.
Знайти повний текст джерелаReassessing the evolving al-Qaeda threat to the homeland: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, November 19, 2009. Washington: U.S. G.P.O., 2011.
Знайти повний текст джерелаUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Countering the changing threat of international terrorism: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session on the National Commission on Terrorism's report on issues relating to efforts being made by the intelligence and law enforcement communities to counter, and U.S. policies regarding, the changing threat ... June 28, 2000. Washington: U.S. Government Printing Office, 2001.
Знайти повний текст джерелаUnited, States Congress House Committee on Homeland Security Subcommittee on Cybersecurity Infrastructure Protection and Security Technologies. Facilitating cyber threat information sharing and partnering with the private sector to protect critical infrastructure: An assessment of DHS capabilities : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, May 16, 2013. Washington: U.S. Government Printing Office, 2013.
Знайти повний текст джерелаThe threat to Americans' personal information: A look into the security and reliability of the health exchange data hub : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, September 11, 2013. Washington: U.S. Government Printing Office, 2014.
Знайти повний текст джерелаUnited States. Government Accountability Office. Cooperative threat reduction: DOD needs more reliable data to better estimate the cost and schedule of the Shchuch'ye facility : report to the Chairman, Subcommittee on Federal Financial Management, Government Information, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. [Washington, D.C..]: The Office, 2006.
Знайти повний текст джерелаUnited, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Reassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.
Знайти повний текст джерелаReassessing the threat: The future of al Qaeda and its implications for homeland security : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, July 30, 2008. Washington: U.S. G.P.O., 2009.
Знайти повний текст джерелаInstitute of Information Scientists. Irish Branch. and Library Association of Ireland. Academic and Special Libraries Section., eds. Information millennium: Threat or promise?. [Dublin?]: [LAI (ASLS)?], 1997.
Знайти повний текст джерелаInformation Management and the Biological Warfare Threat. Storming Media, 2002.
Знайти повний текст джерелаOutsourcing Information Technology and the Insider Threat. Storming Media, 2003.
Знайти повний текст джерелаThe Next War Zone: Confronting the Global Threat of Cyberterrorism: Confronting the Global Threat of Cyberterrorism. Citadel, 2003.
Знайти повний текст джерелаUcedaVelez, Tony, and Marco M. Morana. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley & Sons, Incorporated, John, 2015.
Знайти повний текст джерелаUcedaVelez, Tony, and Marco M. Morana. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley & Sons, Incorporated, John, 2015.
Знайти повний текст джерелаRokach, Lior, Asaf Shabtai, and Yuval Elovici. A Survey of Data Leakage Detection and Prevention Solutions. Springer, 2012.
Знайти повний текст джерелаApplication Threat Modeling. John Wiley & Sons, 2013.
Знайти повний текст джерелаChinese information warfare: A phantom menace or emerging threat? Strategic Studies Institute, U.S. Army War College, 2001.
Знайти повний текст джерелаYoshihara, Toshi. Chinese Information Warfare: A Phantom Menace Or Emerging Threat? University Press of the Pacific, 2004.
Знайти повний текст джерелаResponding to the Threat of Cyberterrorism through Information Assurance. Storming Media, 1999.
Знайти повний текст джерелаAnis, Mohab, and Mohamed Elmasry. Multi-Threshold CMOS Digital Circuits: Managing Leakage Power. Springer, 2003.
Знайти повний текст джерела