Examining the President's cybersecurity information-sharing proposal hearing before the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, first session, February 25, 2015.
by United States. Congress. House. Committee on Homeland Security,
Electronic Resource 2015 |
... Office. "Serial No. 114-4." Cyberterrorism United States Prevention. Cyberinfrastructure Security ... |
The perfect weapon : war, sabotage, and fear in the cyber age
by Sanger, David E.,
Print Book 2018 |
... references (pages [315]-342) and index. Cyberterrorism. Cyberterrorism Prevention. .b37863265 05-31-23 02-20 ... |
2 entries in this group
The game of lives
by Dashner, James, 1972-
Print Book 2015 |
... .... Virtual reality Fiction. Cyberterrorism Fiction. Science fiction. Video games Juvenile fiction. Virtual ... |
Black ice : the invisible threat of cyber-terrorism
by Verton, Dan.
Print Book 2003 |
... . Cyberterrorism United States. Cyberterrorism United States Prevention. .b2413823x 04-30-15 09-11-03 xa 09-11-03 m ... |
Zero days
English |
Spanish |
DVD 2017 |
... -- Theatrical trailer. Cyberterrorism. Cyberterrorism Case studies. Computer security. Malware (Computer ... |
Critical infrastructure protection DHS needs to fully address lessons learned from its first Cyber Storm exercise : report to congressional requesters
by Powner, David A.
Electronic Resource 2008 |
... ; 28 cm) text txt rdacontent computer c rdamedia online resource cr rdacarrier Cyberterrorism United ... |
iWar : war and peace in the information age
by Gertz, Bill,
Print Book 2017 |
... . Information warfare. Cyberterrorism. Cyberterrorism United States Prevention. National security United States ... |
Cyber war : the next threat to national security and what to do about it
by Clarke, Richard A. 1951-
Print Book 2010 |
... . xiv, 290 pages ; 24 cm text txt rdacontent unmediated n rdamedia volume nc rdacarrier Cyberterrorism ... |
Computer security : cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, July 26, 2000.
by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology.
Microfilm and Microfiche 2001 |
... h̲ouseh̲earings&docid=f:74152.pdf (PDF version); current access is available via PURLs. Cyberterrorism ... |
Chinese hacking impact on human rights and commercial rule of law : hearing before the Congressional-Executive Commission on China, One Hundred Thirteenth Congress, first session, June 25, 2013.
by United States. Congressional-Executive Commission on China,
Electronic Resource 2013 |
... . Includes bibliographical references. Cyberspace Security measures United States. Cyberterrorism United ... |
Assessing persistent and emerging cyber threats to the U.S. in the homeland joint hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, May 21, 2014.
by United States. Congress. House. Committee on Homeland Security. Subcommittee on Counterterrorism and Intelligence,
Electronic Resource 2014 |
... , United States Government Printing Office. "Serial no. 113-69." Cyberterrorism Risk assessment United ... |
Terrorism : reducing vulnerabilities and improving responses : U.S.-Russian workshop proceedings
Print Book 2004 |
... Congresses. Cyberterrorism United States Prevention Congresses. Cyberterrorism Russia (Federation) Prevention ... |
Homeland security the federal and New York response : field hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002.
by United States. Congress. House. Committee on Science.
Microfilm and Microfiche 2003 |
... . Cyberterrorism United States Prevention. Cyberterrorism New York (State) Prevention. Computer security United ... |
Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
by Carlin, John P., 1973-
Print Book 2018 |
... . Cyberspace operations (Military science) United States. Cyberterrorism History. Cyberspace Security measures ... |
Communist Chinese cyber-attacks, cyber-espionage, and theft of American technology hearing before the Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs, House of Representatives, One Hundred Twelfth Congress, first session, April 15, 2011.
by United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Oversight and Investigations.
Electronic Resource 2011 |
... . Includes bibliographical references (page 42). "Serial no. 112-14." Cyberterrorism China. Cyberterrorism ... |
4 entries in this group

The sentinel
by Child, Lee,
Print Book 2020 |
... rdacarrier A Jack Reacher novel Reacher, Jack (Fictitious character) Fiction. Buses Fiction. Cyberterrorism ... |

3 entries in this group

The fox
by Forsyth, Frederick, 1938-
Print Book 2018 |
... Hackers Fiction. Cyberterrorism Fiction. Thrillers (Fiction) lcgft .b38068576 05-31-23 06-27-18 (2)ya bv ... |

2 entries in this group
The eye of minds
by Dashner, James, 1972-
Print Book 2013 |
... . Virtual reality Fiction. Cyberterrorism Fiction. Terrorism Fiction. Science fiction. lcgft Young adult ... |
2 entries in this group
Dark vector : a novel from the NUMA files
by Brown, Graham, 1969-
Print Book 2022 |
... Marine Agency Fiction. Marine scientists Fiction. Pirates Fiction. Cyberterrorism Prevention Fiction ... |
2 entries in this group
The rule of thoughts
by Dashner, James, 1972-
Print Book 2014 |
... . Virtual reality Fiction. Cyberterrorism Fiction. Terrorism Fiction. Science fiction. Dashner, James, 1972 ... |