Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Threat mitigation and detection of c...
~
Korstanje, Maximiliano.
Threat mitigation and detection of cyber warfare and terrorism activities /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Threat mitigation and detection of cyber warfare and terrorism activities // Maximiliano E. Korstanje, [editor].
other author:
Korstanje, Maximiliano.
Published:
Hershey, PA :Information Science Reference, : c2017.,
Description:
xx, 314 p. :ill., maps ; : 27 cm.;
Notes:
"Premier reference source"--Cover.
Subject:
Internet - Political aspects. -
ISBN:
9781522519386 :
Threat mitigation and detection of cyber warfare and terrorism activities /
Threat mitigation and detection of cyber warfare and terrorism activities /
Maximiliano E. Korstanje, [editor]. - Hershey, PA :Information Science Reference,c2017. - xx, 314 p. :ill., maps ;27 cm. - Advances in information security, privacy, and ethics (AISPE) book series,1948-9730.
"Premier reference source"--Cover.
Includes bibliographical references (p. 271-305) and index.
Cyber security in global times -- A simple solution to prevent parameter tampering in web applications -- Cyber security centres for threat detection and mitigation -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (East Ukraine) in period 2014-2015 -- : the meaning of security and cyber risk -- Analysis of cyber-attacks against the transportation sector -- English speaking countries and the culture of fear: understanding technology and terrorism -- Trolls just want to have fun - electronic aggression within the context of e-participation and other: online political behaviour in the United Kingdom -- The risk, the real, and the imposibility of life : examining the matrix -- Cyberterrorism and civil riots -- OSNs as cyberterrorist weapons against the general public -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign -- The roots of terror: the lesser evil doctrine under criticism.
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--
ISBN: 9781522519386 :NT5710
LCCN: 2016048907Subjects--Topical Terms:
556332
Internet
--Political aspects.
LC Class. No.: U163 / .T49 2017
Dewey Class. No.: 363.325
Threat mitigation and detection of cyber warfare and terrorism activities /
LDR
:02349cam a2200253 a 4500
001
878020
005
20171201083315.0
008
171215s2017 pauab b 001 0 eng
010
$a
2016048907
020
$a
9781522519386 :
$c
NT5710
020
$a
9781522519393 (ebk.)
035
$a
00044364
040
$a
DLC
$b
eng
$c
DLC
$d
DLC
$d
NFU
041
0
$a
eng
042
$a
pcc
050
0 0
$a
U163
$b
.T49 2017
082
0 0
$a
363.325
$2
23
245
0 0
$a
Threat mitigation and detection of cyber warfare and terrorism activities /
$c
Maximiliano E. Korstanje, [editor].
260
$a
Hershey, PA :
$b
Information Science Reference,
$c
c2017.
300
$a
xx, 314 p. :
$b
ill., maps ;
$c
27 cm.
490
0
$a
Advances in information security, privacy, and ethics (AISPE) book series,
$x
1948-9730
500
$a
"Premier reference source"--Cover.
504
$a
Includes bibliographical references (p. 271-305) and index.
505
0
$a
Cyber security in global times -- A simple solution to prevent parameter tampering in web applications -- Cyber security centres for threat detection and mitigation -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (East Ukraine) in period 2014-2015 -- : the meaning of security and cyber risk -- Analysis of cyber-attacks against the transportation sector -- English speaking countries and the culture of fear: understanding technology and terrorism -- Trolls just want to have fun - electronic aggression within the context of e-participation and other: online political behaviour in the United Kingdom -- The risk, the real, and the imposibility of life : examining the matrix -- Cyberterrorism and civil riots -- OSNs as cyberterrorist weapons against the general public -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign -- The roots of terror: the lesser evil doctrine under criticism.
520
$a
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--
$c
Provided by publisher.
650
0
$a
Internet
$x
Political aspects.
$3
556332
650
0
$a
Computer crimes
$x
Prevention.
$3
641804
650
0
$a
Cyberterrorism
$x
Prevention.
$3
659766
650
0
$a
Cyberspace
$x
Security measures.
$3
805403
650
0
$a
Information warfare
$x
Prevention.
$3
1129541
700
1
$a
Korstanje, Maximiliano.
$3
1129540
based on 0 review(s)
ALL
圖書館3F 書庫
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
E044364
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
363.325 T531 2017
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login