Search results for: Lin, Herbert
Showing 1 - 20 results of 35
Refine Results
-
1
Cyber threats and nuclear weapons
Authors: Lin, Herbert
Published: Stanford University Press, 2021Physical Description: xiii, 200 pages : illustrations (black & white) ; 22 cmHoldings: Loading…
Book Loading… -
2
Cyber threats and nuclear weapons
Authors: Lin, Herbert
Published: Stanford University Press, 2021Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2021 (Ebook Central @ Proquest)
EBSCO eBooks: 2021 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2021 (EBSCO)
eBook Public Library Collection (EBSCOhost) – North America: 2021 (EBSCO)
Electronic eBook -
3
Youth, pornography and the Internet
Published: National Academy Press, 2002Other Authors:Physical Description: xxviii, 450 pages ; 23 cm, Available also online.Holdings: Loading…
Book Loading… -
4
Youth, pornography and the Internet
Published: National Academy Press, 2002Other Authors:Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2002 (Ebook Central @ Proquest)
National Academies Press: 2002 (National Academies Press)
EBSCO eBooks: 2002 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2002 (EBSCO)
Electronic eBook -
5
Cryptography's role in securing the information society
Published: National Academy Press, 1996Other Authors:Physical Description: xxx, 688 pages : illustrations ; 24 cmHoldings: Loading…
Book Loading… -
6
Cryptography's role in securing the information society
Published: National Academy Press, 1996Other Authors:Physical Description: xxx, 688 pages ; 24 cmHoldings: Loading…An electronic book accessible through the World Wide Web; click for information (Bibliographic record display) (EBSCO)
Read this eBook – MSU authorized users <br /> MSU single-user access only (EBSCO)
Electronic eBook -
7
Catalyzing inquiry at the interface of computing and biology
Published: National Academies Press, 2005Other Authors:Physical Description: xx, 443 pages : illustrations ; 29 cm, Also issued online.Holdings: Loading…
Electronic Book Loading… -
8
Catalyzing inquiry at the interface of computing and biology
Published: National Academies Press, 2005Other Authors:Physical Description: 1 electronic text (xx, 443 pages) : PDF, illustrations, Also issued in print.Holdings: Loading…Connect to online resource - All users (National Academies Press)
Electronic eBook -
9
Toward a safer and more secure cyberspace
Published: National Academies Press, 2007Other Authors:Physical Description: xx, 307 pages ; 23 cm, Also issued online.Holdings: Loading…
Book Loading… -
10
Computational technology for effective health care : immediate steps and strategic directions
Published: National Academies Press, 2009Other Authors:Physical Description: xvi, 103 pages : illustrations ; 23 cm, Also available in Open Book format via the National Academies Press home page.Holdings: Loading…
Book Loading… -
11
Catalyzing inquiry at the interface of computing and biology
Published: National Academies Press, 2005Other Authors:Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2006 (Ebook Central @ Proquest)
National Academies Press: 2005 (National Academies Press)
EBSCO eBooks: 2005 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2005 (EBSCO)
Electronic eBook -
12
Cryptography's role in securing the information society Kenneth W. Dam and Herbert S. Lin, editors.
Published: National Academy Press, 1996Other Authors:Holdings: Loading…ProQuest Ebook Central - Academic Complete: 1996 (Ebook Central @ Proquest)
National Academies Press: 1996 (National Academies Press)
EBSCO eBooks: 1996 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 1996 (EBSCO)
Electronic eBook -
13
Computational technology for effective health care immediate steps and strategic directions
Published: National Academies Press, 2009Other Authors:Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2009 (Ebook Central @ Proquest)
National Academies Press: 2009 (National Academies Press)
EBSCO eBooks: 2009 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2009 (EBSCO)
Electronic eBook -
14
Toward a safer and more secure cyberspace
Published: National Academies Press, 2007Other Authors:Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2007 (Ebook Central @ Proquest)
National Academies Press: 2007 (National Academies Press)
EBSCO eBooks: 2007 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2007 (EBSCO)
Electronic eBook -
15
Bytes, bombs, and spies : the strategic dimensions of offensive cyber operations
Published: Brookings Institution Press, 2018Other Authors: “…Lin, Herbert…”
Physical Description: xiii, 424 pages : illustrations ; 23 cmHoldings: Loading…
Book Loading… -
16
Bytes, bombs, and spies the strategic dimensions of offensive cyber operations
Published: Brookings Institution Press, 2018Other Authors: “…Lin, Herbert…”
Holdings: Loading…EBSCO eBooks: 2018 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2018 (EBSCO)
Electronic eBook -
17
A review of the FBI's trilogy information technology modernization program
Published: 2004Other Authors:Holdings: Loading…ProQuest Ebook Central - Academic Complete: 2004 (Ebook Central @ Proquest)
National Academies Press: 2004 (National Academies Press)
EBSCO eBooks: 2004 (EBSCO)
eBook Academic Collection (EBSCOhost) – North America: 2004 (EBSCO)
Electronic eBook -
18
Rights and responsibilities of participants in networked communities
Published: National Academy Press, 1994Other Authors:Physical Description: xi, 160 pages ; 23 cmHoldings: Loading…
Book Loading… -
19
Asking the right questions about electronic voting
Published: National Academies Press, 2006Other Authors:Physical Description: xiv, 148 pages ; 23 cm, Also issued online.Holdings: Loading…
Book Loading… -
20
Asking the right questions about electronic voting
Published: National Academies Press, 2006Other Authors:Physical Description: 1 electronic text (xiv, 148 pages) : GIF, PDF, illustrations, Also issued in print.Holdings: Loading…Connect to online resource - All users (National Academies Press)
Electronic eBook
Related Subjects
Security measures
Computer security
Computer networks
Data processing
Information technology
Prevention
Privacy, Right of
Technological innovations
Cyberspace operations (Military science)
Cyberterrorism
Government policy
Telecommunication systems
Bioinformatics
Computational biology
Cryptography
Elections
Electronic voting
Information warfare
Internet
Law and legislation
Voting
Armed Forces
Biology
Command and control systems
Computer crimes
Cyber intelligence (Computer security)
Data protection
Intellectual property
Internet and teenagers
Internet in espionage