1
Cyberwarfare [E-Book] : Threats to Critical Infrastructure	 /
Table of Contents: ... and legacy systems -- Chapter 4 - Hacking the human -- Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers -- Conclusion. ....

Full text 
2
Nuclear Security [E-Book] : The Nexus Among Science, Technology and Policy /
3
Intelligence and Security Informatics [E-Book] : Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings /
Table of Contents: ...Information sharing and data/text mining -- Terrorism informatics -- Network-based data analytics.- Information access and security....

Full text 
4
The case for international sharing of scientific data : a focus on developing countries : proceedings of a symposium [E-Book] /
Table of Contents: ...-sharing policy of the world meterological organization: the case for international sharing of scientific data -- Discussion of part two by symposium participants -- Developing the rice genome in China -- Data sharing in astronomy -- Sharing engineering data...

Full text 
5
The Semantic Web – ISWC 2012 [E-Book]: 11th International Semantic Web Conference, Boston, MA, USA, November 11-15, 2012, Proceedings, Part II /
6
The Semantic Web – ISWC 2012 [E-Book]: 11th International Semantic Web Conference, Boston, MA, USA, November 11-15, 2012, Proceedings, Part I /
7
Catastrophic Risks and Insurance [E-Book] /
2005
Table of Contents: ..., Including Terrorism -- The Turkish Catastrophe Insurance Pool TCIP and Compulsory Earthquake Insurance Scheme -- Natural Disasters and Disaster Relief Policy in China -- Disaster Management in India -- Management of Extraordinary Risks Including Terrorism...

Full text