177 results on '"Cyberterrorism--Prevention"'
Search Results
2. Cyber security: Current issues and actions
3. Hybrid threats - the new generation of threats
4. This is how they tell me the world ends: The cyberweapons arms race
5. The fix: Solving Australia's foreign affairs challenges
6. Managing third-party risk
7. A systematic literature review on the role of big data in IoT security
8. Enhancing IOT security: Proactive phishing website detection using Deep Neural Networks case study: smart home
9. Intrusion detection and prevention against cyber attacks for an energy management system
10. Security: Cyber security for electricity utilities - where to begin?
11. Sibanye cyber-attack lays risks bare
12. Building a cyber intelligence capability with the future in mind
13. The pointy end of privacy: Addressing litigation risk ahead of Privacy Act changes
14. The definitional debates on the applicability of 'jus in bello's' concept of 'damage' and 'object' in the cyber context: 'Evolutive interpretation' as a potential solution
15. A brief review on attack design and detection strategies for networked cyber-physical systems
16. AI emerges as potential cyber defence
17. Australia would benefit from us-style health information security regulation
18. Cybersecurity: The new frontier
19. Poland, Ukraine and the lessons of history
20. The cyber insurance dilemma: Investment in cyber insurance vs further investment in cyber security
21. Cyber security: Don't outsource your cyber responsibilities
22. Networking: How secure are you in a cyber world?
23. Governing cybersecurity: Critical infrastructure, spies and consumers
24. Technology: GRC: Cybersecurity governance, risk and compliance
25. Cyber threats in healthcare
26. A study on challenges of data security and data privacy in the healthcare sector: Swot analysis
27. Cyber in 2023: Evolving threats and resilience
28. Victim-blaming and image-based sexual abuse
29. It's time to check your cyber pulse
30. Cyber security: Don't risk a breach
31. Is your mining machinery at risk of a cyberattack?
32. Learnings from MediBank: Protecting your AGMs and company meetings against threats
33. The new machine age for English teachers: The pedagogical possibilities and pitfalls of artificial intelligence
34. The law of the jungle and cooperation in the Indo-Pacific
35. Enhancing cyber resilience in smartgrids
36. Online dangers
37. The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity
38. Cyber Risk Management : Prioritize Threats, Identify Vulnerabilities and Apply Controls
39. Open-Source Security Operations Center (SOC) : A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
40. Understand the Cyber Attacker Mindset : Build a Strategic Security Programme to Counteract Threats
41. Cyber Warfare : A Reference Handbook
42. Cyberwarfare and security intelligence nexus: Vision of cyberterrorism in Australia's critical infrastructure
43. Cyber Threat Intelligence
44. Handbook of Research on War Policies, Strategies, and Cyber Wars
45. Countering Cyberterrorism : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity
46. Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide
47. Digital Blood on Their Hands : The Ukraine Cyberwar Attacks
48. Improving the cyber resilience of Australia's energy sector
49. Is your salon ready for a cyberattack?
50. A Practitioner's Guide to Adapting the NIST Cybersecurity Framework
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.