Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Alternate Subjects (1-24 of 24)
Cyberterrorism
1
Electronic Book
 

Anti-Semitism across borders : hearing before the Subcommittee on Africa, Global health, Global Huma


United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, author.
Washington : U.S. Government Publishing Office, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.F 76/1:115-10    ---  Available
2
Electronic Book
 

Blackhatonomics : an inside look at the economics of cybercrime


Gragido, Will.
Amsterdam : Syngress, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
3
Print Material
 

Botnet road map status update.



[Washington, D.C.] : The Departments of Commerce and Homeland Security, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 1.2:B 65/2    ---  Available
4
Electronic Book
 

Brandishing cyberattack capabilities


Libicki, Martin C., author.
Santa Monica, CA : RAND Corporation, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
5
Electronic Book
 

China's evolving approach to "integrated strategic deterrence"


Chase, Michael, author.
Santa Monica, Calif. : RAND, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
6
Print Material
 

China's position on the Sony attack : implications for the U.S. response


Wilson, Jordan (Jordan C.), author.
[Washington, D.C.] : U.S.-China Economic and Security Review Commission, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 3.2:C 44/SO 4    ---  Available
7
Electronic Book
 

Chinese state-sponsored actors exploit publicly known vulnerabilities.



[Fort Meade, MD] : National Security Agency, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:V 97    ---  Available
8
Electronic Book
 

Colonial Pipeline : the DarkSide strikes


Parfomak, Paul W., author.
[Washington, D.C.] : Congressional Research Service, 2021- 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
9
Print Material
 

Continuation of the national emergency with respect to specified harmful foreign activities of the G


United States. President (2021- : Biden), author.
Washington : U.S. Government Publishing Office, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/7:117-112    ---  Available
10
Electronic Book
 

Continuation of the national emergency with respect to specified harmful foreign activities of the G


United States. President (2021- : Biden), author.
Washington : U.S. Government Publishing Office, 2023. 2023

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
11
Electronic Book
 

Critical infrastructure policy : information sharing and disclosure requirements after the Colonial


Humphreys, Brian E., author.
[Washington, D.C.] : Congressional Research Service, 2021- 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
12
Electronic Book
 

Cyber incident severity schema.


United States. President (2009-2017 : Obama), author.
[Washington, D.C.] : [The White House], [2016?] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  PR 44.2:C 99/SCHEMA    ---  Available
13
Print Material
 

Cybercrime : an overview of the Federal Computer Fraud and Abuse Statute and related federal crimina


Doyle, Charles, author.
[Washington, D.C.] : Congressional Research Service, 2019- 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.23:97-1025/    ---  Available
14
Electronic Book
 

Cyberspace : malevolent actors, criminal opportunities, and strategic competition



Carlisle Barracks, PA : Strategic Studies Institute and U.S. Army War College Press, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146:C 99/7    ---  Available
15
Print Material
 

Cyberwarfare and cyberterrorism : in brief


Theohary, Catherine A., author.
[Washington, D.C.] : Congressional Research Service, [2018?]- 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.23:R 43955/    ---  Available
16
Electronic Book
 

Department of Justice efforts to counter ransomware


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2021- 2021

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
17
Electronic Book
 

Directing the Secretary of Homeland Security to transmit certain documents to the House of Represent


United States. Congress. House. Committee on Homeland Security, author.
[Washington, D.C.] : [U.S. Government Publishing Office], 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/8:115-89    ---  Available
18
Print Material
 

Fact sheet, presidential policy directive on United States cyber incident coordination.


United States. Office of the White House Press Secretary, author.
[Washington, D.C.] : The White House, Office of the Press Secretary, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  PREX 1.24:C 99/2    ---  Available
19
Electronic Book
 

Getting to Yes with China in Cyberspace


Harold, Scott Warren, author.
Santa Monica, Calif. : RAND, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
20
Electronic Book
 

Hacking a terror network : the silent threat of covert channels


Rogers, Russ.
Rockland, Mass. : Syngress Pub., ©2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
21
Electronic Book
 

Implementing homeland security for enterprise IT


Erbschloe, Michael.
Boston : Digital Press, 2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
22
Electronic Book
 

Introduction to cyber-warfare : a multidisciplinary approach


Shakarian, Paulo.
Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013] 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
23
Print Material
 

Iranian offensive cyberattack capabilities


Theohary, Catherine A., author.
[Washington, D.C.] : Congressional Research Service, 2020- 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.24:IF 11406/    ---  Available
24
Print Material
 

Legality in cyberspace : an adversary view


Giles, Keir, author.
Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146/3:L 52    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only