Cyberinfrastructure -- United States. : The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation / Julie E. Mehan, Waylon Krush. [O'Reilly electronic resource]
Here are entered works on tracking, analyzing, and countering digital security threats. Works on the collection and processing, for subsequent intelligence purposes, of information derived primarily from electronic signals that do not contain speech or text are entered under Electronic intelligence.
Cyberpunk culture. : Twentieth-Century literary criticism. Volume 106 [Gale Peterson's electronic resource] / Linda Pavlovski and Scott T. Darga, editors.
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction. --subdivision Security measures under names of individual and types of computers, networks, and systems, e.g. IBM computers--Security measures
Cyberspace -- Government policy -- China. : 21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Communist policy regarding information warfare through the broad range of military, civilian and commercially supported cyberattack threat vectors / William T. Hagestad II. [O'Reilly electronic resource]