Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Engineering & Technology Reference

Online ISSN 2056-4007

Information & Communications - Cyber Security

Request a FREE trial for your organisation

Start benefitting from this growing collection of authoritative reference work and register for a multi-user trial today.

Bespoke usage reports will allow you to monitor activity and engagement throughout your trial period.

Request a trial          Further enquiries

Show / Hide details

article(s) for this sub sector [ see all Information & Communications]

1 - 20 of 75 items found

  • Sort by: Newest first
Items per page 20 | 50 | 100

Filter by publication date:

  • 2014 10 [1] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 201410
  • 2014 11 [4] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 201411
  • 2014 12 [4] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 201412
  • 2014 8 [2] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 20148
  • 2015 1 [1] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 20151
  • 2015 11 [1] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 201511
  • 2015 12 [3] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 201512
  • 2015 3 [1] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 20153
  • 2015 4 [1] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 20154
  • 2015 5 [2] http://pub2web.metastore.ingenta.com/ns/yearMonthOfPublication 20155
  • Cyber security for smart grid components
  • Securing ICS – going beyond IT
  • Cyber Security for Cloud and the Internet of Things: How Can it be Achieved?
  • Cybersecurity Competences – Research, Development and Innovation Perspective
  • Application of defence in depth and diversity
  • Integrating IEC 62443 cyber security with existing industrial process and functional safety management systems
  • Wireless communications cyber security
  • Sybil attack
  • Multi-factor authentication protection – locking down networks with better security procedures
  • Indian offshore wind: ambitions, opportunities and challenges
  • WaveDrive: a systems approach to optimising a linear generator for Trident Energy
  • Trends in cyber security of industrial control systems
  • Real-time network visibility and operationalising threat intelligence for cybersecurity breach detection
  • Ransomware – your money, or you'll never see your company's data again
  • Blockchain – risk and reward
  • Security Transformation; SOC Programme Management
  • Who's attacking your industrial control systems?: Part 1
  • Ethical hacking: protecting connected vehicles
  • Cyber security architectures for ICS/supervisory control and data acquisition environments
  • Secure Systems Development
1 2 3 4 | Next >
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address