Developments in information security and cybernetic wars
"This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"--
Saved in:
| Other Authors: | Sarfraz, Muhammad (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
2019
|
| Series: | Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
Power and security in information age investigating the role of the state in cyberspace
Published: (2007)
Published: (2007)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019)
Published: (2019)
Developments in Information Security and Cybernetic Wars
Emerging trends in ICT security
Published: (2014)
Published: (2014)
Handbook of research on civil society and national security in the era of cyber warfare
Published: (2016)
Published: (2016)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
A history of cyber security attacks 1980 to present
by: Middleton, Bruce
Published: (2017)
by: Middleton, Bruce
Published: (2017)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Computer and information security
Published: (2016)
Published: (2016)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Managing information security
Published: (2014)
Published: (2014)
Information security culture a human firewall approach
by: Omar Zakaria
Published: (2013)
by: Omar Zakaria
Published: (2013)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Information security architecture an integrated approach to security in the organization
by: Tudor, Jan Killmeyer
Published: (2006)
by: Tudor, Jan Killmeyer
Published: (2006)
Managing cyber threats
Published: (2015)
Published: (2015)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Cybersecurity, botnets and cyberterrorism
by: Jacobson George V.
Published: (2009)
by: Jacobson George V.
Published: (2009)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Information Security Risk Management for Iso27001/Iso 27002
by: Calder, Alan
Published: (2019)
by: Calder, Alan
Published: (2019)
The virtual battlefield perspectives on cyber warfare
Published: (2009)
Published: (2009)
The use of cyberspace as a platform to conduct cyberterrorism a case study on ISIS
by: Ahmad Nizam Adnan
by: Ahmad Nizam Adnan
Spillage of information threats to Malaysia security
by: Mohd. Zaily Hatta Mohd. Jelani
by: Mohd. Zaily Hatta Mohd. Jelani
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Handbook of research on modern cryptographic solutions for computer and cyber security
Published: (2016)
Published: (2016)
Cybernetic trading strategies developing a profitable trading system with state-of-the-art technologies
by: Ruggiero
Published: (1997)
by: Ruggiero
Published: (1997)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
International relations and security in the digital age
Published: (2007)
Published: (2007)
Stealing the network the complete series collector's edition
by: Russell, Ryan
Published: (2009)
by: Russell, Ryan
Published: (2009)
Information protection playbook
Published: (2013)
Published: (2013)
Utilization of new technologies in global terror emerging research and opportunities
by: Stacey, Emily 1984
Published: (2019)
by: Stacey, Emily 1984
Published: (2019)
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020)
Published: (2020)
Similar Items
-
Cyber security and IT infrastructure protection
Published: (2014) -
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014) -
Power and security in information age investigating the role of the state in cyberspace
Published: (2007) -
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019) - Developments in Information Security and Cybernetic Wars


