Your search returned 4 results.

1.
Business as war : battling for competitive advantage / Kenneth Allard.

by Allard, Kenneth.

Publication details: J. Wiley 2004Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HD57.7 All. (1).

2.
Cybervetting : internet searches for vetting, investigations, and open-source intelligence / Edward J. Appel

by Appel, Edward J.

Edition: 2nd ed.Publication details: CRC Press 2015Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5549.5 E429App (1).

3.
Industrial espionage : developing a counterespionage program / Daniel J. Benny

by Benny, Daniel J.

Publication details: CRC Press 2014Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HD 38.7 Ben (1).

4.
Cognitive hack : the new battleground in cybersecurity... the human mind / James Bone

by Bone, James.

Publication details: CRC Press 2017Availability: Items available for loan: ELM LIBRARY (ELM)Call number: HF 5548.37 Bon (1).

Copyright © 2023 HELP Learning Resource Centre. All Rights Reserved.

Powered by Koha