عرض عادي

Cyber warfare and cyber terrorism / [edited by] Lech J. Janczewski, Andrew M. Colarik.

المساهم (المساهمين):نوع المادة : نصنصالناشر:Hershey, PA ; London : Information Science Reference, [2008]تاريخ حقوق النشر: copyright 2008وصف:xxx, 532 pages : illustrations ; 29 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 1591409918 (hbk)
  • 9781591409915 (hbk)
الموضوع:تصنيف مكتبة الكونجرس:
  • U163 C946 2008
موارد على الانترنت:
المحتويات:
Section I: Terms, concepts, and definitions -- Section II: Dynamic aspects of cyber warfare and cyber terrorism -- Section III: Human aspects of cyber warfare and cyber terrorism -- Section IV: Technical apsects of handling cyber attacks -- Section V: Identification, authorization, and access control -- Section VI: Business continuity -- Section VII: Cyber warfare and cyber terrorism: national and international responses -- Epilogue -- Glossary -- Compilation of references -- About the editors.
ملخص:"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
المراجع المراجع UAE Federation Library | مكتبة اتحاد الإمارات Reference Collection | مجموعات المراجع U163 C946 2008 (إستعراض الرف(يفتح أدناه)) C.1 لا يعار 30010000308424
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 C946 2008 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000254091

"Premier reference source"--Cover.

"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.

Includes bibliographical references (pages 483-527) and index.

Section I: Terms, concepts, and definitions -- Section II: Dynamic aspects of cyber warfare and cyber terrorism -- Section III: Human aspects of cyber warfare and cyber terrorism -- Section IV: Technical apsects of handling cyber attacks -- Section V: Identification, authorization, and access control -- Section VI: Business continuity -- Section VII: Cyber warfare and cyber terrorism: national and international responses -- Epilogue -- Glossary -- Compilation of references -- About the editors.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة