Library
Access the GCA library from here. You can think of this as like walking into your very own library in any university.
2018-DNI Worldwide Threat Assessment ATA---Unclassified-SSCI.pdf
Allen and Overy Report .pdf
APT28 Hack group Centre of Storm .pdf
ASEAN_1116_ezine_pp16 copy.pdf
ASEAN_1116_ezine_pp16.pdf
Authentication Essay by Patrick McDaniel Penn State University 2006.pdf
Beaver A_Step_by_Step_Guide_to_Security_Risk_Assessments.pdf
Brzil Power Grid 1807-1775-jistm-14-03-385.pdf
can Internet ever be destroyed Live Science.docx
China_Monitor_20_Cyber_Security-National_Security_Approaches.pdf
Cisco Annual Cyber Sec Report 2018.pdf
CISSP Guide ISc2.pdf
Comp Week APT_eBook 2017.pdf
CPNI Embedding-Security-Behaviours-Using-5Es.pdf
CW 2017 Security_Analytics_Cyber_Defence_Arsenals.pdf
Cyber crime NCSC - understanding the online business model.pdf
Cyber extortion fin10.pdf
Cyber sec plant floors Industry control sys.pdf
Cyber threat intelligence .pdf
Cyber Video Shelf.pdf
Cyber War and the future of Cyber Security.pdf
Cyber_Security_Breaches_Survey_2017_main_report_PUBLIC.pdf
Cyber_Security_in_the_Middle_East 2017 Comp Weekly.pdf
Cyber_security_in_the_Nordics Comp Week 2017.pdf
DEMOS Resilient_Nation_-_web-1.pdf
Disaster Recovery and BC TechTarget 2017.pdf
Disaster Recovery Plan Checklist Template Deloitte .pdf
DR Planning and Virtualisation Comp Week 2017 .pdf
Encrypt and Cloud ANZ_1017CW ezine_14pp.pdf
Encrytion and Cyber forensics scheier info sec 2017.pdf
End Point Protection TechTarget 2017.pdf
ENISA Threat Landscape 2017 .pdf
Essay referencing_2012 guide copy.pdf
Essay referencing_2012 guide.pdf
EU GDPR APAC-guide-data-protection-GDPR CW2017 .pdf
EU GDPR Article 29 Working Party Guidelines .pdf
EU GDPR Jargon_buster CW .pdf
EU GDPR Oracle 2017 .pdf
Example Risk Assessment Conical Roofs.docx
Example Risk Assessment Conical Roofs.pdf
Fireeye Mandiant cyber threat trends M Trends 2017.pdf
Flashpoint_BRI_Decision_Report_2017Midyear_Edition.pdf
Foreing Ministries wp-operation-ke3chang.pdf
Gangte How to become a Hacker.docx
Gangte Top 10 Best Hacking Tools.docx
GCA Our Fav Cyber Threat Intelligence Sources.pdf
GDPR-and-Charity-Data-Manifesto.pdf
Glossary of Cyber Security terms from NIST DHS.docx
Glossary of Cyber Security terms from NIST DHS.pdf
Handbook for Computer Sec Incident Response Teams CSIRTs 20013 Carnegie Mellon.pdf
Healthcare IT News Article Davis.docx
helpful-guide-to-essay-writing Anglia Ruskin University UK.pdf
HJS-Mend-Report 2017 .pdf
How Does a Virus Infect Your Computer.docx
How Does the Internet Work Rus Shuler 2002 Stanford University.docx
How the GDPR will protect individuals Luke Irwin.docx
How to write reports Plymouth University.pdf
How will each EU member state enforce the GDPR.docx
How_to_implement_NIST_Cyber_Security_Framework_using_ISO_27001_EN.pdf
ICANN Internet Corp Assigned Names and Numbers.docx
Insider Risk Mitigation Maturity Matrix Chris-Hurran-UCL-2016.pdf
Investigation-WannaCry-cyber-attack-and-the-NHS.pdf
IoT security Fortinet .pdf
Ireland Info Commissioner The GDPR and You.pdf
ISC2 Ind Control Vuln 2018.pdf
iso27001-2013.pdf
ITGP Tips-for-penetration-tests.pdf
ITGP Why_pen_testing_is_a_must 20 reasons.pdf
JBC_Harrop Matteson_Cyber Resilience Paper.pdf
Kevin Beaver Step_by_Step_Guide_to_Security_Risk_Assessments.pdf
Krebs on Security Who hacked Ashley Madison.docx
M3 W2 B IoT article What IOT Needs Freescale EU.docx
Mandiant cyber threat trends M Trends 2015.pdf
MBCF_Business_Impact_Analysis_Template (2).pdf
Microsoft-Cybersecurity-Norms Proposals 2016 .pdf
Microsoft-Cybersecurity-Norms_vFinal.pdf
Mitel History of Communication.docx
national Risk Register 2015.pdf
national_cyber_security_strategy_2016.pdf
NCA and NCSC Cyber Threat to Business.pdf
Netherlands National security assessment 2017.pdf
NIST 800 37 Rev 2 May 2018.pdf
NIST 800 53 Revision 5 August 2017 .pdf
NIST 800-30r1 Guide for Conducting Risk Assessments .pdf
NIST 800-160 Systems Security Engineering March 2018.pdf
NIST cybersecurity-framework-021214 Risk Assessments .pdf
NIST cybersecurity-framework-021214.pdf
nistir8200-draft standard IoT Feb 2018.pdf
nistir8202-draft Blockchain.pdf
nistir8202-draft.pdf
nistspecialpublication800-30r1 (1).pdf
No Test Today image.png
North Korea Lazarus copy.docx
North Korea Lazarus.docx
ONS 2018 England and Wales Fraud and Ecrime overview.docx
op_kellermann_peter-the-great-vs-sun-tzu.pdf
OSAC - Russia 2018 Crime Safety Report- Moscow.pdf
Our Fav Cyber Threat Intelligence Sources.docx
pecb-iso-27001-lead-auditor-exam-preparation-guide.pdf
Python Prog librarybook-core-modules.pdf
Quantum Computing and Cryptography Sophie Still 2012.pdf
RansomWare Two_Quick_Data_Protection_Steps techTarget.pdf
Recommended Books.pdf
Reduce the Risk of Password Breaches TechTarget 2017.pdf
Regulations 4 Major Cyber Regulations .pdf
Richard Bingley podcast 20 minutes The Basics.m4a
ROI Demonstrate ROI Business Case for investing in cyber TechTarget.pdf
Role Based Access Controls ferraiolo-kuhn-92.pdf
SANS Understanding Security OSI Model.pdf
Security Audit Checklist Template UTAH.pdf
SSO Single Sign On in the Cloud and Mobile Era.pdf
Storage and Private_Cloud_Environment.pdf
TechTarget Network Security 101 2017.pdf
The Increasing Effect of Geopolitics on Cybersecurity SecurityWeek 3 10 17.docx
The Increasing Effect of Geopolitics on Cybersecurity SecurityWeek 3 10 17.docx.url
Threat-Assessment-Template Saskatchewan Canada.pdf
UK skills feficit Technology_and_Digital_Skills_Infographic Comp week 2017 .pdf
UK_National_Risk_Register_2017.pdf
UKSP Hacking Groups to Watch Out for.docx
Understanding Encryption Heres The Key B Proffitt.docx
Walt Howe A brief history of the Internet 2016.docx
WiFi Access Points and SSIDs Michael McNamee 2011.docx
Wired Burgess What is GDPR 7 03 2018.docx
ZD NET 20 11 2017 Your biggest threat inside accidents.docx