Toggle navigation
Hours
Libraries & Collections
Joyner Library
Laupus Health Sciences Library
Music Library
Digital Collections
Special Collections
Teaching Resources
The ScholarShip Institutional Repository
Country Doctor Museum
Get Help
Toggle navigation
ECU Libraries Catalog
Browse
Call Number
Title
Author
Subject
Series
Course Reserves
More
Search History
New Items
Suggest a Purchase
My Account
Search in
All Fields
Title
Author
Journal Title
Subject
Series
ISBN/ISSN
Publisher
search for
Search
Advanced Search
ECU Libraries Catalog
Toggle facets
Find materials by
Location
Joyner Library
604
Laupus Library
77
Music Library
75
Format
Book
604
Electronic
528
Print
78
Journal
3
Microform
1
Publication Date
Publication Date range begin
–
Publication Date range end
Current results range from
1997
to
2024
View distribution
Call Number
H - Social Science
11
U - Military Science
11
J - Political Science
3
K - Law
1
Collection
Joyner E-Resources
526
Laupus E-Resources
77
Joyner Federal Documents
48
Joyner Stacks
25
Joyner TRC
3
Joyner TRC Nonfiction
2
Joyner TRC Fiction
1
Language
English
604
Genre
Legislative hearings
160
Electronic books
75
Rules and practice
25
Congresses
16
Legislative materials
11
Case studies
6
History
4
Rules
3
Encyclopedias
2
Fiction
2
more
Genre
»
Era
2016
7
21st century
6
Civil War, 2011-
4
2009-2017
1
Region
United States
480
Russia (Federation)
26
China
16
Iran
8
Europe
4
Libya
4
Israel
3
Korea (North)
3
Latin America
3
Middle East
3
more
Region
»
Expand your search
Worldwide library results
Related journal articles
Interlibrary Loan Request
Search Constraints
Clear Search
You searched for:
Subject
"Cyberterrorism"
Remove constraint Subject: "Cyberterrorism"
« Previous |
1
-
50
of
604
|
Next »
Sort by Relevance
Relevance
Year DESC
Year ASC
Author
Title
Number of results to display per page
50 per page
10
per page
20
per page
50
per page
100
per page
Search Results
Cyberterrorism : understanding, assessment, and response
2014
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Inside the enemy's computer identifying cyber-attackers
by
Guitton, Clement
2017
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Countering terrorist activities in cyberspace
by
NATO Advanced Training Course on Countering ISIS Radicalization Activities Through Cyberspace in the Region of South-East Europe (2017 : Ohrid, North Macedonia)
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cybercrime : a reference handbook
by
Schell, Bernadette H. (Bernadette Hlubik), 1952-
2004
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
HV6773.S3547 2004
Cyber blockades
by
Russell, Alison Lawlor
2014
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Responses to cyber terrorism
2008
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Information sharing : practices that can benefit critical infrastructure protection
by
United States. General Accounting Office
2001
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
A history of cyber security attacks : 1980 to present
by
Middleton, Bruce, 1953-
2017
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
State-sponsored cyberspace threats : recent incidents and U.S. policy response : hearing before the Subcommittee on East Asia, the Pacific, and International Cyber Security Policy of the Committee on Foreign Relations, United States Senate, One Hundred Fifteenth Congress, first session, June 13, 2017
by
United States. Congress. Senate. Committee on Foreign Relations. Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy
2019
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Resilience and hybrid threats security and integrity for the digital world
2019
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyberspace and national security : threats, opportunities, and power in a virtual world
2012
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
HV6773.15 .C97 C93 2012
Viruses and spam
by
Day-MacLeod, Deirdre
2008
Format:
Book and Print
✔ Available
Joyner - TRC Nonfiction
Call Number:
005.8 D335V
Cyberterrorism : how real is the threat?
by
Weimann, Gabriel, 1950-
2004
Format:
Book and Electronic
✔ Available
Call Number:
Access Content Online
Networks and netwars the future of terror, crime, and militancy
2001
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Terrorist threats to the United States : hearing before the Special Oversight Panel on Terrorism of the Committee on Armed Services, House of Representatives, One Hundred Sixth Congress, second session, hearing held May 23, 2000
by
United States. Congress. House. Committee on Armed Services. Special Oversight Panel on Terrorism
2000
Format:
Book and Print
✔ Available
Joyner - Fed Docs Stacks
Call Number:
ASK AT REFERENCE DESK
Chinese state-sponsored actors exploit publicly known vulnerabilities
2020
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Understanding cyberwarfare : lessons from the Russia-Georgia war
by
White, Sarah P.
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber threats from China, Russia, and Iran : protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013
by
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
2013
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
"Hacktivists" and the Ukraine-Russia conflict : legal considerations
by
Gaffney, Jonathan M.
2022
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
CyberSkills Task Force report
by
President's Homeland Security Advisory Council (U.S.). CyberSkills Task Force
2012
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Open source bibliography
1997
Format:
Book and Electronic
✔ Available
Call Number:
Access Content Online
Review of the recommendations of the Cyberspace Solarium Commission : hearing before the Subcommittee on Intelligence and Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Sixteenth Congress, second session, hearing held July 30, 2020
by
United States. Congress. House. Committee on Armed Services. Subcommittee on Intelligence and Emerging Threats and Capabilities
2021
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cybersecurity: a primer
by
Jaikaran, Chris
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cybersecurity : selected issues for the 115th Congress
by
Jaikaran, Chris
2018
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber war : the next threat to national security and what to do about it
by
Clarke, Richard A. (Richard Alan), 1951-
2010
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
HV6773.2 .C57 2010
Cybersecurity in Latin America and the Caribbean : the state of readiness for the defense of cyberspace
by
Saavedra P�erez, Boris Omar, 1945-
2015
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Deterring cybertrespass and securing cyberspace : lessons from United States border control strategies
by
Manjikian, Mary
2016
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyberspace and national security threats, opportunities, and power in a virtual world
2012
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Policing cyber hate, cyber threats and cyber terrorism
2012
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
The virtual battlefield perspectives on cyber warfare
2009
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Proceedings, WOMBAT Workshop on Information Security Threats Data Collection and Sharing WISTDCS 2008, 21-22 April 2008, Amsterdam, Netherlands
by
WOMBAT Workshop on Information Security Threats Data Collection and Sharing (2008 : Amsterdam, Netherlands)
2008
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
China's position on the Sony attack : implications for the U.S. response
by
Wilson, Jordan (Jordan C.)
2015
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cybersecurity : deterrence policy
by
Jaikaran, Chris
2022
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber incident severity schema
by
United States. President (2009-2017 : Obama)
2016
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cybersecurity : setting the rules for responsible global cyber behavior: hearing before the Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy of the Committee on Foreign Relations, United States Senate, One Hundred Fourteenth Congress, first session, May 14, 2015
by
United States. Congress. Senate. Committee on Foreign Relations. Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy
2015
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Critical infrastructure protection : DHS needs to fully address lessons learned from its first Cyber Storm exercise : report to congressional requesters
by
United States. Government Accountability Office
2008
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Computer security : cyber attacks - - war without borders hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Represenatives, 106th Congress, 2nd session, July 26, 2001
by
United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology
2001
Format:
Book and Print
✔ Available
Joyner - Fed Docs Stacks
Call Number:
Y 4.G 74/7:SE 2/18
Revolutionary risks : cyber technology and threats in the 2011 Libyan Revolution
by
Scott-Railton, John
2021
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber Risk, Intellectual Property Theft and Cyberwarfare : Asia, Europe and the USA
by
Taplin, Ruth
2020
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber crime and cyber terrorism investigator's handbook
by
Akhgar, Babak
2014
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber mobs destructive online communities
by
Krumsiek, Allison
2018
First Edition
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
The global cyber-vulnerability report
2015
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Early warning
by
Walsh, Michael, 1949-
2010
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyberspace and the "First Battle" in 21st-century war
by
Miller, Robert A.
2009
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyber security : a crisis of prioritization
2005
Format:
Book and Electronic
✔ Available
Call Number:
Access Content Online
Toward deterrence in the cyber dimension : report to the President's Commission on Critical Infrastructure Protection
1997
Format:
Book and Electronic
✔ Available
Call Number:
Access Content Online
The perfect weapon : war, sabotage, and fear in the cyber age
by
Sanger, David E.
2019
Format:
Book and Print
✔ Available
Joyner - General Stacks
Call Number:
HV6773.15.C97 S36 2019
Assessing persistent and emerging cyber threats to the U.S. in the homeland : joint hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, second session, May 21, 2014
by
United States. Congress. House. Committee on Homeland Security. Subcommittee on Counterterrorism and Intelligence
2014
Format:
Electronic and Book
✔ Available
Call Number:
Multiple Online Resources Available
Worldwide threats : hearing before the Committee on Armed Services, United States Senate, One Hundred Fourteenth Congress, first session, February 26, 2015
by
United States. Congress. Senate. Committee on Armed Services
2016
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
Cyberterrorism
2022
1 Edition
Format:
Electronic and Book
✔ Available
Call Number:
Access Content Online
« Previous
Next »
1
2
3
4
5
…
12
13
Expand your search
Worldwide library results
Related journal articles
Interlibrary Loan Request