語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Threat mitigation and detection of c...
~
Korstanje, Maximiliano,
Threat mitigation and detection of cyber warfare and terrorism activities
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Threat mitigation and detection of cyber warfare and terrorism activitiesMaximiliano E. Korstanje, editor.
其他作者:
Korstanje, Maximiliano,
出版者:
Hershey, Pennsylvania :IGI Global,[2017]
面頁冊數:
1 online resource (314 p.) :ill.
標題:
Information warfarePrevention.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
ISBN:
9781522519393 (ebk.)
Threat mitigation and detection of cyber warfare and terrorism activities
Threat mitigation and detection of cyber warfare and terrorism activities
[electronic resource] /Maximiliano E. Korstanje, editor. - Hershey, Pennsylvania :IGI Global,[2017] - 1 online resource (314 p.) :ill.
Includes bibliographical references and index.
A simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje.
Restricted to subscribers or individual electronic text purchasers.
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522519393 (ebk.)Subjects--Topical Terms:
777836
Information warfare
--Prevention.Subjects--Index Terms:
Big data analysis
LC Class. No.: U163 / .T49 2017e
Dewey Class. No.: 363.325
Threat mitigation and detection of cyber warfare and terrorism activities
LDR
:03228nmm a2200409 i 4500
001
510345
003
IGIG
005
19991103114738.0
006
m eo d
007
cr bn |||m|||a
008
171129s2017 paua fob 001 0 eng d
010
$z
2016048907
020
$a
9781522519393 (ebk.)
020
$a
9781522519386 (hbk.)
035
$a
(CaBNVSL)gtp00566636
035
$a
(OCoLC)966368145
035
$a
0000000282
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
U163
$b
.T49 2017e
082
0 0
$a
363.325
$2
23
245
0 0
$a
Threat mitigation and detection of cyber warfare and terrorism activities
$h
[electronic resource] /
$c
Maximiliano E. Korstanje, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2017]
300
$a
1 online resource (314 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
A simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 12/06/2016).
650
0
$a
Information warfare
$x
Prevention.
$3
777836
650
0
$a
Cyberspace
$x
Security measures.
$3
404087
650
0
$a
Cyberterrorism
$x
Prevention.
$3
274740
650
0
$a
Computer crimes
$x
Prevention.
$3
317273
650
0
$a
Internet
$x
Political aspects.
$3
287844
653
$a
Big data analysis
653
$a
Digital protests
653
$a
E-participation
653
$a
Online blogging
653
$a
Online political behavior
653
$a
Parameter tampering
653
$a
Surveillance and control
700
1
$a
Korstanje, Maximiliano,
$e
editor.
$3
752671
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000140484
電子館藏
1圖書
電子書
EB U163 T49 [2017]
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入