Your search returned 15 results.

Sort
Results
1.
An advanced model of hacking / Lara Rennie and Malcolm Shore by
Material type: Text Text
Publication details: 2007
In: Security Journal Vol 20 No 4, 2007, pp.236-251 (48)
Availability: Items available for reference: Mindef Library & Info Centre: Not for loan (1)Call number: MISCELLANEOUS.

2.
I-way robbery: crime on the Internet by
Material type: Text Text
Publication details: Boston, Mass.: Butterworth-Heinemann, 1999
Availability: Items available for loan: Pusat Pendidikan Sekuriti (1)Call number: 364.168 BON.

3.
The hacker and the state: cyber attacks and the new normal of geopolitics / Ben Buchanan. by
Material type: Text Text
Publication details: Cambridge : Harvard Univ Press, 2020
Availability: Items available for loan: Pusat Pendidikan Sekuriti (1)Call number: 005.8 BUC.

4.
Cyberwars in the Middle East / Ahmed Al-Rawi. by
Material type: Text Text
Publication details: New Brunswick: Rutgers University Press, 2021
Availability: Items available for loan: Mindef Library & Info Centre (1)Call number: 355.4 AHM.

5.
Masters of deception: the gang that ruled cyberspace by
Material type: Text Text
Publication details: New York: Harper Perennial, 1996
Availability: Items available for loan: Pusat Pendidikan Sekuriti (1)Call number: 364.168 SLA.

6.
Like war : the weaponization of social media / by P. W. Singer and Emerson T. Brooking by
Material type: Text Text
Publication details: Boston : Houghton Mifflin Harcourt, 2018
Availability: Items available for loan: Sultan Haji Hassanal Bolkiah - Institute of Defence and Strategic Studies Library (1)Call number: 302.231 SIN.

7.
A world without trust: the insidious cyberthreat/ Jacquelyn Schneider by
Material type: Text Text
Publication details: 2022
In: Foreign Affairs Vol. 101, No. 1, January/February 2022, pp. 22-31 (76)
Online access:
Availability: Items available for reference: Mindef Library & Info Centre: Not for loan (1)Call number: CYBERSECURITY.

8.
50 shades of hacking: how IT and cybersecurity industry actors perceive good, bad, and former hackers/ Leonie Maria Tanczer by
Material type: Text Text
Publication details: 2020
In: Contemporary Security Policy : Vol. 41, No 1, January 2020, pp.108-128 (104)
Online access:
Availability: Items available for reference: Mindef Library & Info Centre: Not for loan (1)Call number: CYBER.

9.
LikeWar : the weaponization of social media / P.W. Singer and Emerson T. Brooking. by
Material type: Text Text
Publication details: Boston : Houghton Mifflin Harcourt, 2018
Availability: Items available for loan: Mindef Library & Info Centre (1)Call number: 302.231 SIN.

10.
Cybersecurity law / Jeff Kosseff. by
Material type: Text Text
Publication details: Hoboken, NJ: John Wiley & Sons, 2017
Availability: Items available for loan: Sultan Haji Hassanal Bolkiah - Institute of Defence and Strategic Studies Library (1)Call number: 343.730999 KOS.

11.
Hacking the bomb: cyber threats and nuclear weapons / Andrew Futter by
Material type: Text Text
Publication details: Washington, DC : Georgetown University Press, 2018
Availability: Items available for loan: Mindef Library & Info Centre (1)Call number: 355.825119 FUT.

12.
Fighting computer crime: a new framework for protecting information by
Material type: Text Text
Publication details: New York: John Wiley, 1998
Availability: Items available for loan: Pusat Pendidikan Sekuriti (1)Call number: 364.168 PAR.

13.
Anthropology of an idea: hacktivism by
Material type: Text Text
Publication details: 2013
In: Foreign Policy May/June 2013, pp.24-25 (66)
Availability: Items available for reference: Mindef Library & Info Centre: Not for loan (1)Call number: MISCELLANEOUS.

14.
We are anonymous : inside the hacker world of lulzsec, anonymous, and the global cyber insurgency / Parmy Olson by
Material type: Text Text
Publication details: New York: Little Brown and Company , 2012
Availability: Items available for loan: Pusat Pendidikan Sekuriti (1)Call number: 364.168 OLS. Sultan Haji Hassanal Bolkiah - Institute of Defence and Strategic Studies Library (1)Call number: 364.168 OLS.

15.
Exploring the intersections of technology, crime and terror/ Thomas J. Holt by
Material type: Text Text
Publication details: 2012
In: Terrorism and Political Violence Vol.24 No.2 April-June 2012, pp.337-354 (116)
Availability: Items available for reference: Mindef Library & Info Centre: Not for loan (1)Call number: TERRORISM.

Pages