Search Results - "Voeller, John G"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Communications and Information Infrastructure Security by Voeller, John G

    Published 2014
    “…Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies…”
    Get full text
    eBook
  2. 2

    Transportation security by Voeller, John G

    Published 2014
    “…Transportation Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to security challenge…”
    Get full text
    eBook
  3. 3

    Food safety and food security by Voeller, John G

    Published 2014
    “…Food Safety and Food Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to processing…”
    Get full text
    eBook
  4. 4

    Cyber security by Voeller, John G

    Published 2014
    “…Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and…”
    Get full text
    eBook
  5. 5

    Transportation Security by John G. Voeller, John G. Voeller

    Published 2014
    “…Transportation Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to security challenge…”
    Get full text
    eBook
  6. 6

    Water safety and water infrastructure security by Voeller, John G

    Published 2014
    “…Water Safety and Water Infrastructure Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics…”
    Get full text
    eBook
  7. 7

    Cybersecurity: managing systems, conducting testing, and investigating intrusions by Voeller, John G

    Published 16-01-2014
    “…Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and…”
    Get full text
    eBook
  8. 8
  9. 9

    Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Mowbray, Thomas J

    Published 2013
    “…A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It…”
    Get full text
    eBook
  10. 10

    The Era of Insufficient Plenty by Voeller, John G.

    “…This article discusses the problem of insufficiency, recognizing limitations, and responding to the challenges posed by diminishing natural resources. Most of…”
    Get full text
    Magazine Article
  11. 11