Cyber warfare and terrorism concepts, methodologies, tools, and applications

"This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--

Saved in:
Bibliographic Details
Corporate Author: Information Resources Management Association (Editor)
Format: Book
Language:English
Published: Hershey, PA IGI Global Disseminator of Knowedge 2020
Series:Critical Explorations
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 91385
003 MY-KLNDU
005 20241220003236.0
008 220815 20202020xxu b 001 0 eng d
020 |a 9781799824664 (hbk) 
039 9 |a 202301271054  |b hainim  |y 202208150915  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a HV 6773.15.C97  |b C95 2020 
090 |a HV 6773.15.C97  |b C95 2020 
245 1 0 |a Cyber warfare and terrorism  |b concepts, methodologies, tools, and applications  |c Information Resources Management Association, USA 
264 1 |a Hershey, PA  |b IGI Global Disseminator of Knowedge  |c 2020 
264 4 |a © 2020 
300 |a 1-3 volumes  |b illustrations  |c 29 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Critical Explorations 
504 |a Includes bibliographical references and index 
520 |a "This book explores the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--  |c Provided by publisher 
592 |a IV-101733  |b 07/10/2022  |c RM4436.00  |h YUHA Associates Sdn. Bhd 
650 0 |a Cyberterrorism  |x Prevention 
650 0 |a Terrorism  |x Prevention 
710 2 |a Information Resources Management Association  |e editor 
830 0 |a Critical Explorations 
999 |a vtls000103837  |c 91385  |d 91385