|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn957700652 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
160917s2015 ne o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCO
|d OCLCQ
|d DEBBG
|d MERUC
|d OCLCQ
|d ZCU
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OCL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781614995289
|
020 |
|
|
|a 1614995281
|
029 |
1 |
|
|a DEBBG
|b BV044061803
|
035 |
|
|
|a (OCoLC)957700652
|
050 |
|
4 |
|a TK5105.59
|b .T477 2015
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ogun, M. N.
|
245 |
1 |
0 |
|a Terrorist Use of Cyberspace and Cyber Terrorism.
|
260 |
|
|
|a Amsterdam :
|b IOS Press,
|c 2015.
|
300 |
|
|
|a 1 online resource (223 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a NATO Science for Peace and Security Series - D: Information and Communication Security ;
|v v. 42
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity.
|
505 |
8 |
|
|a Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization.
|
505 |
8 |
|
|a Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Congresses.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention
|v Congresses.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Congrès.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|x Prevention
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Ogun, M.N.
|t Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses.
|d Amsterdam : IOS Press, ©2015
|z 9781614995272
|
830 |
|
0 |
|a NATO science for peace and security series.
|n Sub-series D,
|p Information and communication security.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4659193
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4659193
|
994 |
|
|
|a 92
|b IZTAP
|