Terrorist use of cyberspace and cyber terrorism : new challenges and reponses / edited by Mehmet Nesip Ogun.
Material type: TextSeries: NATO science for peace and security series. Sub-series D, Information and communication security ; ; v. 42.Publisher: Amsterdam, Netherlands ; Washington, DC : IOS Press, [2015]Distributor: Fairfax, VA : IOS Press, Inc.Copyright date: ©2015Description: 1 online resource (x, 213 pages) : illustrationsContent type:- text
- computer
- online resource
- 9781614995289
- 1614995281
- Cyberterrorism -- Prevention -- Congresses
- Computer networks -- Security measures -- Congresses
- Computer security -- Congresses
- Information networks -- Security measures -- Congresses
- Data protection -- Congresses
- Terrorism -- Prevention -- Congresses
- National security -- Congresses
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Sécurité informatique -- Congrès
- Réseaux d'information -- Sécurité -- Mesures -- Congrès
- Protection de l'information (Informatique) -- Congrès
- Terrorisme -- Prévention -- Congrès
- SOCIAL SCIENCE -- Criminology
- Computer networks -- Security measures
- Computer security
- Cyberterrorism -- Prevention
- Data protection
- Information networks -- Security measures
- National security
- Terrorism -- Prevention
- 364.16/8 23
- HV6431 .N38375 2014eb
Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Electronic-Books | OPJGU Sonepat- Campus | E-Books EBSCO | Available |
"Proceedings of the NATO Advanced Training Course (ATC) on terrorist use of the internet, Ohrid, former Yugoslav Republic of Macedonia, 8-12 December 2014"--Title page verso.
"This publication is supported by: The NATO Science for Peace and Security Programme"--Cover.
Includes bibliographical references and indexes.
Print version record.
TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity
Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide
There are no comments on this title.