Sold Out
Book Categories |
Executive Summary | 1 | |
1 | Background and Introduction | 10 |
2 | Types of Threats Associated with Information Technology Infrastructure | 15 |
3 | Investing in Information Technology Research | 28 |
4 | What Can Be Done Now? | 97 |
5 | Rationalizing the Future Research Agenda | 106 |
App | Biographies of Committee and Staff Members | 115 |
What is CSTB? | 127 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation technology for counterterrorism
X
This Item is in Your InventoryInformation technology for counterterrorism
X
You must be logged in to review the productsX
X
X
Add Information technology for counterterrorism, Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate anothe, Information technology for counterterrorism to the inventory that you are selling on WonderClubX
X
Add Information technology for counterterrorism, Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate anothe, Information technology for counterterrorism to your collection on WonderClub |