Please use this identifier to cite or link to this item:
http://rguir.inflibnet.ac.in:8080/jspui/handle/123456789/13922
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Johnson, Thomas A. | - |
dc.date.accessioned | 2022-12-07T05:36:11Z | - |
dc.date.available | 2022-12-07T05:36:11Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | CYBER-SECURITY. | en_US |
dc.identifier.isbn | 978-1-4822-3923-2 | - |
dc.identifier.uri | http://rguir.inflibnet.ac.in:8080/jspui/handle/123456789/13922 | - |
dc.language.iso | en | en_US |
dc.publisher | CRC Press Taylor & Francis Group. | en_US |
dc.title | CYBER-SECURITY: | en_US |
dc.title.alternative | businessProtecting Critical Infrastructuresfrom Cyber Attack and Cyber Warfare. | en_US |
dc.type | Book | en_US |
Appears in Collections: | Law |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cybersecurity.pdf Restricted Access | 17.83 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.