Showing
1 - 9
results of
9
for search '
Mehan, Julie E.,
'
Skip to content
PipelineMT
Athletics
A-Z
Directory
MTSU Email
Search MTSU
James E. Walker Library
Your Account
Log Out
Login
0
items
(Full)
Libraries Catalog
Toggle Navigation
Search
Regular Search
Advanced Search
Search History
Browse
Course Reserves
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
0
items
(Full)
Your Account
Log Out
Login
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Browse Alphabetically: By Title
Browse Alphabetically: By Author
Browse Alphabetically: By Topic
Browse Alphabetically: By LC Call Number
Browse Alphabetically: By Dewey Call Number
Find
Advanced
Ask Us!
Toggle Chat Widget
Call Us:
615-898-2817
Send an Email
reference@mtsu.libanswers.com
Search FAQs
Author
Mehan, Julie E.,
Showing
1 - 9
results of
9
for search '
Mehan, Julie E.,
'
, query time: 0.03s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Add to Book Bag
Select result number 1
1
Insider threat : a guide to understanding, detecting, and defending against the enemy from within /
by
Mehan
,
Julie
E
.
Published 2016
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 2
2
Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment /
by
Mehan
,
Julie
E
.
Published 2014
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 3
3
Cyberwar, cyberterror, cybercrime : a guide to the role of standards in an environment of change and danger /
by
Mehan
,
Julie
E
.
Published 2008
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 4
4
Insider threat : a guide to understanding, detecting, and defending against the enemy from within /
by
Mehan
,
Julie
E
.
Published 2016
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 5
5
Artificial intelligence : ethical, social, and security impacts for the present and the future /
by
Mehan
,
Julie
E
.
Published 2022
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 6
6
CyberWar, CyberTerror, CyberCrime.
by
Mehan
,
Julie
E
.
Published 2008
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 7
7
Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment /
by
Mehan
,
Julie
E
.
Published 2014
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 8
8
Artificial intelligence : ethical, social, and security impacts for the present and the future /
by
Mehan
,
Julie
E
.
Published 2022
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select result number 9
9
The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation /
by
Mehan
,
Julie
E
.
,
Krush, Waylon.
Published 2009
Call Number:
Loading...
Located:
Loading...
CONNECT
CONNECT
CONNECT
CONNECT
eBook
Add to Book Bag
Remove from Book Bag
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Add to Book Bag
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer networks
Computer security
Security measures
Artificial intelligence
Computer crimes
Cyberterrorism
Electronics in military engineering
Hacking
Internal security
Internet
Moral and ethical aspects
National security
Prevention
Quality control
Social aspects
Standards
Accreditation
Certification
Cyberinfrastructure
Information technology
Management
Walker Library is a
selective depository library.
Middle Tennessee State University © 2023
Nondiscrimination Policy
Terms
Privacy Statement
Intranet
Login to LibApps
Loading...