語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Threat mitigation and detection of c...
~
Korstanje, Maximiliano.
Threat mitigation and detection of cyber warfare and terrorism activities /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Threat mitigation and detection of cyber warfare and terrorism activities // Maximiliano E. Korstanje, [editor].
其他作者:
Korstanje, Maximiliano.
出版者:
Hershey, PA :Information Science Reference, : c2017.,
面頁冊數:
xx, 314 p. :ill., maps ; : 27 cm.;
附註:
"Premier reference source"--Cover.
標題:
Internet - Political aspects. -
ISBN:
9781522519386 :
Threat mitigation and detection of cyber warfare and terrorism activities /
Threat mitigation and detection of cyber warfare and terrorism activities /
Maximiliano E. Korstanje, [editor]. - Hershey, PA :Information Science Reference,c2017. - xx, 314 p. :ill., maps ;27 cm. - Advances in information security, privacy, and ethics (AISPE) book series,1948-9730.
"Premier reference source"--Cover.
Includes bibliographical references (p. 271-305) and index.
Cyber security in global times -- A simple solution to prevent parameter tampering in web applications -- Cyber security centres for threat detection and mitigation -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (East Ukraine) in period 2014-2015 -- : the meaning of security and cyber risk -- Analysis of cyber-attacks against the transportation sector -- English speaking countries and the culture of fear: understanding technology and terrorism -- Trolls just want to have fun - electronic aggression within the context of e-participation and other: online political behaviour in the United Kingdom -- The risk, the real, and the imposibility of life : examining the matrix -- Cyberterrorism and civil riots -- OSNs as cyberterrorist weapons against the general public -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign -- The roots of terror: the lesser evil doctrine under criticism.
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--
ISBN: 9781522519386 :NT5710
LCCN: 2016048907Subjects--Topical Terms:
556332
Internet
--Political aspects.
LC Class. No.: U163 / .T49 2017
Dewey Class. No.: 363.325
Threat mitigation and detection of cyber warfare and terrorism activities /
LDR
:02349cam a2200253 a 4500
001
878020
005
20171201083315.0
008
171215s2017 pauab b 001 0 eng
010
$a
2016048907
020
$a
9781522519386 :
$c
NT5710
020
$a
9781522519393 (ebk.)
035
$a
00044364
040
$a
DLC
$b
eng
$c
DLC
$d
DLC
$d
NFU
041
0
$a
eng
042
$a
pcc
050
0 0
$a
U163
$b
.T49 2017
082
0 0
$a
363.325
$2
23
245
0 0
$a
Threat mitigation and detection of cyber warfare and terrorism activities /
$c
Maximiliano E. Korstanje, [editor].
260
$a
Hershey, PA :
$b
Information Science Reference,
$c
c2017.
300
$a
xx, 314 p. :
$b
ill., maps ;
$c
27 cm.
490
0
$a
Advances in information security, privacy, and ethics (AISPE) book series,
$x
1948-9730
500
$a
"Premier reference source"--Cover.
504
$a
Includes bibliographical references (p. 271-305) and index.
505
0
$a
Cyber security in global times -- A simple solution to prevent parameter tampering in web applications -- Cyber security centres for threat detection and mitigation -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (East Ukraine) in period 2014-2015 -- : the meaning of security and cyber risk -- Analysis of cyber-attacks against the transportation sector -- English speaking countries and the culture of fear: understanding technology and terrorism -- Trolls just want to have fun - electronic aggression within the context of e-participation and other: online political behaviour in the United Kingdom -- The risk, the real, and the imposibility of life : examining the matrix -- Cyberterrorism and civil riots -- OSNs as cyberterrorist weapons against the general public -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign -- The roots of terror: the lesser evil doctrine under criticism.
520
$a
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--
$c
Provided by publisher.
650
0
$a
Internet
$x
Political aspects.
$3
556332
650
0
$a
Computer crimes
$x
Prevention.
$3
641804
650
0
$a
Cyberterrorism
$x
Prevention.
$3
659766
650
0
$a
Cyberspace
$x
Security measures.
$3
805403
650
0
$a
Information warfare
$x
Prevention.
$3
1129541
700
1
$a
Korstanje, Maximiliano.
$3
1129540
筆 0 讀者評論
全部
圖書館3F 書庫
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
E044364
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
363.325 T531 2017
一般使用(Normal)
在架
0
預約
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入