Cyber intelligence (Computer security)
Resource Information
The concept Cyber intelligence (Computer security) represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Cyber intelligence (Computer security)
Resource Information
The concept Cyber intelligence (Computer security) represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Cyber intelligence (Computer security)
11 Items that share the Concept Cyber intelligence (Computer security)
Context
Context of Cyber intelligence (Computer security)Subject of
No resources found
No enriched resources found
- What executives get wrong about cybersecurity : if you think the biggest cybersecurity threat most businesses face is credit card theft and the most important part of the solution is better prevention technology, think again
- Cyber power : crime, conflict and security in cyberspace
- Cyber reconnaisance surveillance and defense
- Cyber security : a practitioner's guide
- Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
- Gray day : my undercover mission to expose America's first cyber spy
- Hacked : the inside story of America's struggle to secure cyberspace
- Handbook of system safety and security : cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems
- Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
- Thinking about cybersecurity : from cyber crime to cyber warfare
- Thinking about cybersecurity : from cyber crime to cyber warfare
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/QIRILtzzSdE/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/QIRILtzzSdE/">Cyber intelligence (Computer security)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Cyber intelligence (Computer security)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/QIRILtzzSdE/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/QIRILtzzSdE/">Cyber intelligence (Computer security)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>