Showing
1 - 2
results of
2
for search '
"Computer security"
'
Skip to content
VuFind
Login
Combined
Law Online Resources
Falvey Library
Law Library
Law Library
-- Title
-- Author
-- Subject
-- Series
-- Call Number
-- ISBN/ISSN
-- Tag
-- Browse Alphabetically: By Topic
-- Browse Alphabetically: By Author
-- Browse Alphabetically: By Title
-- Browse Alphabetically: By Call Number
-- Browse Alphabetically: By SuDoc Number
Falvey Library
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- Tag
Research Guides
Find
Advanced
Page will reload when a filter is removed.
Reset Filters
Applied Filters:
Region:
Remove Filter
Chine
Page will reload when a filter is removed.
Reset Filters
Show filters (1)
Region:
Remove Filter
Chine
Search Results - "Computer security"
Showing
1 - 2
results of
2
for search '
"Computer security"
'
, query time: 0.06s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Author
Title
1
Compelled to control : conflicting visions of the future of cyberspace /
by
Clemente, Dave
,
JSTOR Security Collection
Published:
Australian Strategic Policy Institute, International Cyber Policy Centre,
2013
Subjects:
“…Cyber intelligence (
Computer security
)…”
Get full text
Online
Book
Save to List
Saved in:
2
Near-peer advancements in space and nuclear weapons : hearing before the Subcommittee on Strategic Forces of the Committee on Armed Services, House of Representatives, One Hundred...
by
United States. Congress. House. Committee on Armed Services. Strategic Forces Subcommittee
,
JSTOR Security Collection
Published:
U.S. Government Publishing Office,
2022
Subjects:
Call Number:
KF27 .A772 2021c
Get full text
Government Document
Online
Book
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Collection
Online
2 results
2
Exclude matching results
Format
Book
2 results
2
Exclude matching results
Online
2 results
2
Exclude matching results
Government Document
1 results
1
Exclude matching results
Call Number
K - Law
1 results
1
Exclude matching results
Topic
Armes nucléaires
1 results
1
Exclude matching results
Artificial satellites
1 results
1
Exclude matching results
Aspect politique
1 results
1
Exclude matching results
Computer crimes
1 results
1
Exclude matching results
Computer security
1 results
1
Exclude matching results
Contrôle de l'espace (Science militaire)
1 results
1
Exclude matching results
Criminalité informatique
1 results
1
Exclude matching results
Cyber intelligence (Computer security)
1 results
1
Exclude matching results
Deterrence (Strategy)
1 results
1
Exclude matching results
Dissuasion (Stratégie)
1 results
1
Exclude matching results
Information
1 results
1
Exclude matching results
Information policy
1 results
1
Exclude matching results
Internet
1 results
1
Exclude matching results
National security
1 results
1
Exclude matching results
Nuclear weapons
1 results
1
Exclude matching results
Political aspects
1 results
1
Exclude matching results
Politique gouvernementale
1 results
1
Exclude matching results
Satellites artificiels
1 results
1
Exclude matching results
Space control (Military science)
1 results
1
Exclude matching results
Surveillance des menaces informatiques
1 results
1
Exclude matching results
see all…
Author
JSTOR Security Collection
2 results
2
Exclude matching results
Clemente, Dave
1 results
1
Exclude matching results
United States. Congress. House. Committee on Armed Services. Strategic Forces Subcommittee
1 results
1
Exclude matching results
Language
English
2 results
2
Exclude matching results
Genre
Audiences législatives
1 results
1
Exclude matching results
Legislative hearings
1 results
1
Exclude matching results
Region
China
2 results
2
Exclude matching results
Chine
Russia
1 results
1
Exclude matching results
Russia (Federation)
1 results
1
Exclude matching results
Russie
1 results
1
Exclude matching results
United States
1 results
1
Exclude matching results
États-Unis
1 results
1
Exclude matching results
see all…
Year of Publication
From:
To: