Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Cyberterrorism"'
Refine your search
Availability
Limit to records with available items
Authors
Colarik, Andrew M
edited by 3G E-learn...
Erbschloe, Michael
Goodman, Seymour E
Janczewski, Lech
Libicki, Martin C
Lin, Herbert
Longhurst, David W
Lukasik, Stephen J
Nagia, Rajan
Taylor, Robert W
Yourdon, Edward
Show more
Show less
Item types
English Books
Locations
5TH FLOOR, B WING
Topics
Computer crimes
Computer crimes - In...
Computer crimes - Un...
Computer hackers
Computer networks - ...
Computer security
Computer security - ...
Cyberterrorism
Cyberterrorism - Pre...
Information superhig...
Information superhig...
Information technolo...
Information technolo...
Information warfare
Information warfare ...
Infrastructure (Econ...
Internet - Security ...
National security
September 11 Terrori...
Show more
Show less
Your search returned 10 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managerial guide for handling cyber-terrorism and information warfare
Lech J. Janczewski and Andrew M. Colarik
by
Janczewski, Lech
Colarik, Andrew M
Publication details:
Hershey, PA
Idea Group Publishing
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 JAN
.
2.
Protecting critical infrastructures against cyber-attack
Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst
by
Lukasik, Stephen J
Goodman, Seymour E
Longhurst, David W
Publication details:
Oxford
Oxford University Press
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LUK
.
3.
The transnational dimension of cyber crime and terrorism
Rajan Nagia
by
Nagia, Rajan
Edition:
1st ed
Publication details:
New Delhi
[publisher not identified]
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 RAJ
.
4.
Toward a safer and more secure cyberspace
Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors
by
Goodman, Seymour E
Lin, Herbert
National Research Council (U.S.). Committee on Improving Cybersecurity Research in the United States
Publication details:
Washington, DC
National Academies Press
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 GOO
.
5.
Byte wars : the impact of September 11 on information technology
Ed Yourdon
by
Yourdon, Edward
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 YOU
.
6.
Conquest in cyberspace : national security and information warfare
Martin C. Libicki
by
Libicki, Martin C
Rand Corporation
Publication details:
Cambridge
Cambridge University Press
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
355.3/43 LIB
.
7.
Cyber terrorism : political and economic implications
Andrew Michael Colarik
by
Colarik, Andrew M
Publication details:
Hershey, PA
Idea Group Pub
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.325 COL
.
8.
Digital crime and digital terrorism
Robert W. Taylor ... [et al.]
by
Taylor, Robert W
Publication details:
Upper Saddle River, NJ
Pearson/Prentice Hall
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 TAY
.
9.
Implementing homeland security for enterprise IT
Michael Erbschloe
by
Erbschloe, Michael
Publication details:
Amsterdam ; Boston
Elsevier, Digital Press
2004
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 ERB, ..
.
10.
Understanding Cyberterrorism
by
edited by 3G E-learning LLC
Edition:
[1ed.]
Language:
Eng.
Publication details:
[New York]
3G E-Learning LLC
2020
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.325900 UND
.
Pages
Find us on the map
Powered by
Koha