Threats

Threats: Intimidation and Its Discontents  eBooks & eLearning

Posted by l3ivo at March 19, 2023
Threats: Intimidation and Its Discontents

David P. Barash, "Threats: Intimidation and Its Discontents"
English | 2020 | ISBN: 0190055294 | 216 pages | EPUB | 0.9 MB

Vigilant Leadership: Identifying Threats & Weak Signals  eBooks & eLearning

Posted by at March 18, 2025
Vigilant Leadership: Identifying Threats & Weak Signals

Vigilant Leadership: Identifying Threats & Weak Signals
2025-03-02
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English (US) | Size: 3.11 GB | Duration: 5h 33m

Vigilant Leader: Methods for Identifying Threats & Sensing Weak Signals to Prepare for Future Challenges in Business
Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture

Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture by Brett Crawley
English | August 9, 2024 | ISBN: 1804618977 | True PDF | 256 pages | 8.2 MB
"Computer Security Threats" ed. by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés

"Computer Security Threats" ed. by Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernández-Caramés
ITExLi | 2020 | ISBN: 1838802401 9781838802400 1838802398 9781838802394 1839623810 9781839623813 | 105 pages | PDF | 5 MB

This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world.
Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies

Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies (Springer Optimization and Its Applications) by Konstantinos P. Balomenos, Antonios Fytopoulos, Panos M. Pardalos
English | December 27, 2023 | ISBN: 3031395417 | 553 pages | MOBI | 19 Mb

Cybersecurity Threats, Malware Trends, and Strategies  eBooks & eLearning

Posted by Free butterfly at Nov. 13, 2023
Cybersecurity Threats, Malware Trends, and Strategies

Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization, 2nd Edition by Tim Rains, Timothy Youngblood CISSP
English | January 25, 2023 | ISBN: 1804613673 | 584 pages | EPUB | 17 Mb

Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies  eBooks & eLearning

Posted by Free butterfly at Aug. 27, 2024
Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies

Handbook for Management of Threats: Security and Defense, Resilience and Optimal Strategies (Springer Optimization and Its Applications) by Konstantinos P. Balomenos, Antonios Fytopoulos, Panos M. Pardalos
English | December 27, 2023 | ISBN: 3031395417 | 553 pages | MOBI | 19 Mb
Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture

Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture by Brett Crawley
English | August 9, 2024 | ISBN: 1804618977 | True PDF | 256 pages | 8.2 MB

Cyber Resilience: Strengthening Defenses Against Future Threats  eBooks & eLearning

Posted by at Dec. 15, 2024
Cyber Resilience: Strengthening Defenses Against Future Threats

Cyber Resilience: Strengthening Defenses Against Future Threats by Isaac Hungbeme
English | July 25, 2024 | ISBN: N/A | ASIN: B0DB84QJNG | 52 pages | EPUB | 0.16 Mb

EW 104: Electronic Warfare Against a New Generation of Threats (EW100)  eBooks & eLearning

Posted by AlenMiler at Oct. 19, 2015
EW 104: Electronic Warfare Against a New Generation of Threats (EW100)

EW 104: Electronic Warfare Against a New Generation of Threats (EW100) by David L. Adamy
English | 31 Jan. 2015 | ISBN: 1608078698 | 554 Pages | True AZW3 (Kindle)/(EPUB/PDF conv) | 60.08 MB

The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats.