Toggle navigation
Hours
Libraries & Collections
Joyner Library
Laupus Health Sciences Library
Music Library
Digital Collections
Special Collections
Teaching Resources
The ScholarShip Institutional Repository
Country Doctor Museum
Get Help
Toggle navigation
ECU Libraries Catalog
Browse
Call Number
Title
Author
Subject
Series
Course Reserves
More
Search History
New Items
Suggest a Purchase
My Account
Search in
All Fields
Title
Author
Journal Title
Subject
Series
ISBN/ISSN
Publisher
search for
Search
Advanced Search
ECU Libraries Catalog
Toggle facets
Find materials by
Location
Joyner Library
604
Laupus Library
77
Music Library
75
Format
Book
604
Electronic
528
Print
78
Journal
3
Microform
1
Publication Date
Publication Date range begin
–
Publication Date range end
Current results range from
1997
to
2024
View distribution
Call Number
H - Social Science
11
U - Military Science
11
J - Political Science
3
K - Law
1
Collection
Joyner E-Resources
526
Laupus E-Resources
77
Joyner Federal Documents
48
Joyner Stacks
25
Joyner TRC
3
Joyner TRC Nonfiction
2
Joyner TRC Fiction
1
Language
English
604
Genre
Legislative hearings
160
Electronic books
75
Rules and practice
25
Congresses
16
Legislative materials
11
Case studies
6
History
4
Rules
3
Encyclopedias
2
Fiction
2
more
Genre
»
Era
2016
7
21st century
6
Civil War, 2011-
4
2009-2017
1
Region
United States
480
Russia (Federation)
26
China
16
Iran
8
Europe
4
Libya
4
Israel
3
Korea (North)
3
Latin America
3
Middle East
3
more
Region
»
Expand your search
Worldwide library results
Related journal articles
Interlibrary Loan Request
Search Constraints
Clear Search
You searched for:
Subject
"Cyberterrorism"
Remove constraint Subject: "Cyberterrorism"
« Previous |
1
-
20
of
604
|
Next »
Sort by Relevance
Relevance
Year DESC
Year ASC
Author
Title
Number of results to display per page
20 per page
10
per page
20
per page
50
per page
100
per page
Search Results
Cyberterrorism : understanding, assessment, and response
2014
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Inside the enemy's computer identifying cyber-attackers
by
Guitton, Clement
2017
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Countering terrorist activities in cyberspace
by
NATO Advanced Training Course on Countering ISIS Radicalization Activities Through Cyberspace in the Region of South-East Europe (2017 : Ohrid, North Macedonia)
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cybercrime : a reference handbook
by
Schell, Bernadette H. (Bernadette Hlubik), 1952-
2004
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
HV6773.S3547 2004
Cyber blockades
by
Russell, Alison Lawlor
2014
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Responses to cyber terrorism
2008
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Information sharing : practices that can benefit critical infrastructure protection
by
United States. General Accounting Office
2001
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
A history of cyber security attacks : 1980 to present
by
Middleton, Bruce, 1953-
2017
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
State-sponsored cyberspace threats : recent incidents and U.S. policy response : hearing before the Subcommittee on East Asia, the Pacific, and International Cyber Security Policy of the Committee on Foreign Relations, United States Senate, One Hundred Fifteenth Congress, first session, June 13, 2017
by
United States. Congress. Senate. Committee on Foreign Relations. Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy
2019
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Resilience and hybrid threats security and integrity for the digital world
2019
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyberspace and national security : threats, opportunities, and power in a virtual world
2012
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
HV6773.15 .C97 C93 2012
Viruses and spam
by
Day-MacLeod, Deirdre
2008
Format:
Book and Print
✔ Available
Joyner - TRC Nonfiction
Call Number:
005.8 D335V
Cyberterrorism : how real is the threat?
by
Weimann, Gabriel, 1950-
2004
Format:
Book and Electronic
✔ Available
Call Number:
Access Content Online
Networks and netwars the future of terror, crime, and militancy
2001
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Terrorist threats to the United States : hearing before the Special Oversight Panel on Terrorism of the Committee on Armed Services, House of Representatives, One Hundred Sixth Congress, second session, hearing held May 23, 2000
by
United States. Congress. House. Committee on Armed Services. Special Oversight Panel on Terrorism
2000
Format:
Book and Print
✔ Available
Joyner - Fed Docs Stacks
Call Number:
ASK AT REFERENCE DESK
Chinese state-sponsored actors exploit publicly known vulnerabilities
2020
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Understanding cyberwarfare : lessons from the Russia-Georgia war
by
White, Sarah P.
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber threats from China, Russia, and Iran : protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013
by
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
2013
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
"Hacktivists" and the Ukraine-Russia conflict : legal considerations
by
Gaffney, Jonathan M.
2022
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
CyberSkills Task Force report
by
President's Homeland Security Advisory Council (U.S.). CyberSkills Task Force
2012
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
« Previous
Next »
1
2
3
4
5
…
30
31
Expand your search
Worldwide library results
Related journal articles
Interlibrary Loan Request