Cyber Operations: A Case Study Approach

Cyber Operations: A Case Study Approach
sku: 2597056
$183.91
Shipping from: United Arab Emirates
   Description
Cyber Operations: A Case Study Approach By Couretas, Jerry M. Published by WILEY Publication Date: 2024-03-28 Subject: Computers Cybernetics, Computers Security Cryptography & Encryption, Computers Security Network Security, Computers Cybernetics, Computers Security - Cryptography & Encryption, Computers Security - Network Security, Computer Science, Coding Theory And Cryptology, Cybernetics And Systems Theory, Data Encryption, Network Security, Hc Informatik, Edv Informatik, Computers Security Cryptography & Encryption, Computers, Security, Cryptography & Encryption, Computers Cybernetics, Cybernetics, Computers Security Network Security, Network Security, Computer Science, Hc Informatik, Edv Informatik, Hc, Informatik, Edv, Informatik, Computer Security & Cryptography, Management Science Operations Research, Management Science, Operations Research, Risk, Contingency & Crisis Management, Management Science Operational Research, Operational Research, Cyber Security; Cyber Attacks; Cyber Threats; Availability Attacks; Internet Of Things; Cyber Interfaces; Automated Transportation; Voice Activated Search; Security Policy; 2016 Us Presidential Election; Dragonfly Campaign Subject Keywords: Cyber security; cyber attacks; cyber threats; availability attacks; Internet of Things; cyber interfaces; automated transportation; voice activated search; security policy; 2016 US Presidential Election; Dragonfly Campaign Genre: Computers, Security, Cryptography & Encryption, Computers, Cybernetics, Computers, Security, Network Security, Computer Science, Hc, Informatik, Edv, Informatik Target Audience: Professional and scholarly
   Price history chart & currency exchange rate

Customers also viewed