|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
EBSCO_ocn993432990 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170711s2017 ne ob 101 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d IOSPR
|d IDEBK
|d EBLCP
|d BTCTA
|d OCLCF
|d OCLCQ
|d MERUC
|d N$T
|d YDX
|d UAB
|d OCLCQ
|d AGLDB
|d IGB
|d INT
|d AUW
|d BTN
|d MHW
|d INTCL
|d SNK
|d OTZ
|d OCLCQ
|d G3B
|d S8I
|d S8J
|d OCLCQ
|d S9I
|d STF
|d D6H
|d M8D
|d OCLCQ
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 993687651
|
020 |
|
|
|a 9781614997658
|q (electronic bk.)
|
020 |
|
|
|a 1614997659
|q (electronic bk.)
|
020 |
|
|
|z 9781614997641
|q (print)
|
029 |
1 |
|
|a AU@
|b 000062353688
|
035 |
|
|
|a (OCoLC)993432990
|z (OCoLC)993687651
|
050 |
|
4 |
|a HV6431
|
072 |
|
7 |
|a BUS
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 363.325
|2 23
|
049 |
|
|
|a UAMI
|
111 |
2 |
|
|a NATO Advanced Research Workshop on Terrorists' Use of the Internet
|d (2016 :
|c Dublin, Ireland)
|
245 |
1 |
0 |
|a Terrorists' use of the internet :
|b assessment and response /
|c edited by Maura Conway, Lee Jarvis, Orla Lehane, Stuart Macdonald and Lella Nouri.
|
264 |
|
1 |
|a Amsterdam, Netherlands :
|b IOS Press,
|c 2017.
|
300 |
|
|
|a 1 online resource (393 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a NATO science for peace and security series, E, Human and societal dynamics ;
|v vol. 136
|
500 |
|
|
|a "Proceedings of the NATO Advanced Research Workshop on Terrorists' Use of the Internet, Dublin, Ireland, 27-29 June 2016."
|
500 |
|
|
|a International conference proceedings.
|
504 |
|
|
|a Includes bibliographical references and indexes.
|
588 |
0 |
|
|a Online resource; title from PDF title page (IOS Press, viewed July 11, 2017).
|
505 |
0 |
|
|a Title Page; Preface; The Cyberterrorism Project; Contents; Terrorist Use of the Internet and Cyberspace: Issues and Responses; Cyberterrorism and Critical Infrastructure Protection; Cyberterrorism: A Challenge for External and Internal Security; Preliminary Analysis of Cyberterrorism Threats to Internet of Things (IoT) Applications; Critical Infrastructure Cyber-Security Risk Management; The Terrorist -- Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists; Cyber-Enabled Terrorist Financing; Online Terrorist Financing.
|
505 |
8 |
|
|a Cybercrime-Funded Terrorism and the Threats Posed by Future Technologies: Appealing Economics and TargetsJihadi Online Propaganda: Purposes and Effects; Between the Arab Revolutions and the Islamic State's Caliphate: al-Qaeda Leaders' Online Propaganda 2012-2014; Radicalisers as Regulators: An Examination of Dabiq Magazine; The Role of Discourse Analysis in Terrorism Studies: Comparing Inspire and Dabiq; Learning from ISIS's Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq; Online Jihadi Instructional Content: The Role of Magazines; Online Counterterrorism.
|
505 |
8 |
|
|a Public Actors, Private Actors, and Cooperative ApproachesHard and Soft Power Approaches to Countering Online Extremism; Anglosphere Approaches to Counter-Terrorism in Cyberspace; Prosecuting Terrorist Activity in Canada; An Efficient Response to ISIS in Cyberspace: Public-Private Partnership; Prevention, Anti-Radicalisation and the Role of Social Media: A View from Germany; Online CVE Strategies; Counter-Terrorism Strategic Communications: Back to the Future -- Lessons from Past and Present; Interrupting Engagement with Online Extremist Content: Utilising ""Noisy"" Foreign Fighters.
|
505 |
8 |
|
|a Interpreting Public Reactions to Terrorist Events Using Open Source Network AnalysisSurveillance; Reframing 'Mass Surveillance'; Beyond Big Data: Surveillance, Metadata and Technology-Enabled Intelligence Opportunities in Counter-Terrorism; National Security, Terrorism and the Legality of Secret Surveillance: The Case of France; Innovative Approaches/Responses; Internet Forensics as a Tool for Responding to Cyber-Fronts; (En)gendering Cyberterrorism in the UK News Media: A Discursive Analysis; Predicting the Emergence of Self-Radicalisation Through Social Media: A Complex Systems Approach.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Internet and terrorism
|v Congresses.
|
650 |
|
0 |
|a Terrorism
|x Prevention
|v Congresses.
|
650 |
|
6 |
|a Internet et terrorisme
|v Congrès.
|
650 |
|
6 |
|a Terrorisme
|x Prévention
|v Congrès.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Infrastructure.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Internet and terrorism
|2 fast
|
650 |
|
7 |
|a Terrorism
|x Prevention
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Conway, Maura,
|e editor.
|
700 |
1 |
|
|a Jarvis, Lee,
|d 1979-
|e editor.
|
700 |
1 |
|
|a Lehane, Orla,
|e editor.
|
700 |
1 |
|
|a Macdonald, Stuart,
|e editor.
|
700 |
1 |
|
|a Nouri, Lella,
|e editor.
|
830 |
|
0 |
|a NATO science for peace and security series.
|n E,
|p Human and societal dynamics ;
|v vol. 136.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1549272
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37537326
|
938 |
|
|
|a Baker and Taylor
|b BTCP
|n BK0021159547
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4908228
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1549272
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis38464106
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14681535
|
994 |
|
|
|a 92
|b IZTAP
|