Threat mitigation and detection of cyber warfare and terrorism activities:
"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillan...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global, Disseminator of Knowledge
[2017]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... |
Beschreibung: | xx, 314 Seiten Illustrationen, Diagramme, Karten |
ISBN: | 9781522519386 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043988144 | ||
003 | DE-604 | ||
005 | 20170302 | ||
007 | t | ||
008 | 170109s2017 xxua||| |||| 00||| eng d | ||
010 | |a 016048907 | ||
020 | |a 9781522519386 |c hbk. |9 978-1-5225-1938-6 | ||
035 | |a (OCoLC)973160572 | ||
035 | |a (DE-599)BVBBV043988144 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 363.325 |2 23 | |
245 | 1 | 0 | |a Threat mitigation and detection of cyber warfare and terrorism activities |c Maximiliano E. Korstanje [editor] |
264 | 1 | |a Hershey, PA |b IGI Global, Disseminator of Knowledge |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a xx, 314 Seiten |b Illustrationen, Diagramme, Karten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
490 | 0 | |a Premier reference source | |
520 | |a "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... | ||
650 | 4 | |a Politik | |
650 | 4 | |a Information warfare |x Prevention | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Internet |x Political aspects | |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberterrorismus |0 (DE-588)1118882725 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Cyberterrorismus |0 (DE-588)1118882725 |D s |
689 | 0 | 2 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Korstanje, Maximiliano |d 1976- |0 (DE-588)1123743908 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-5225-1939-3 |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029396420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029396420 | ||
942 | 1 | 1 | |c 302.2 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804176959694962688 |
---|---|
adam_text | THREAT MITIGATION AND DETECTION OF CYBER WARFARE AND TERRORISM
ACTIVITIES
/
: 2017
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CYBER SECURITY IN GLOBAL TIMES
A SIMPLE SOLUTION TO PREVENT PARAMETER TAMPERING IN WEB APPLICATIONS
CYBER SECURITY CENTRES FOR THREAT DETECTION AND MITIGATION
METHODS AND TOOLS OF BIG DATA ANALYSIS FOR TERRORISTIC BEHAVIOR STUDY
AND THREAT IDENTIFICATION: ILLEGAL ARMED GROUPS DURING THE CONFLICT IN
DONBAS REGION (EAST UKRAINE) IN PERIOD 2014-2015
: THE MEANING OF SECURITY AND CYBER RISK
ANALYSIS OF CYBER-ATTACKS AGAINST THE TRANSPORTATION SECTOR
ENGLISH SPEAKING COUNTRIES AND THE CULTURE OF FEAR: UNDERSTANDING
TECHNOLOGY AND TERRORISM
TROLLS JUST WANT TO HAVE FUN - ELECTRONIC AGGRESSION WITHIN THE CONTEXT
OF E-PARTICIPATION AND OTHER: ONLINE POLITICAL BEHAVIOUR IN THE UNITED
KINGDOM
THE RISK, THE REAL, AND THE IMPOSIBILITY OF LIFE : EXAMINING THE MATRIX
CYBERTERRORISM AND CIVIL RIOTS
OSNS AS CYBERTERRORIST WEAPONS AGAINST THE GENERAL PUBLIC
THE FIGHT FOR CYBER THOREAU: DISTINGUISHING VIRTUAL DISOBEDIENCE FROM
DIGITAL DESTRUCTION
TWITTER USE IN STUDENT PROTESTS: THE CASE OF SOUTH AFRICA S
#FEESMUSTFALL CAMPAIGN
THE ROOTS OF TERROR: THE LESSER EVIL DOCTRINE UNDER CRITICISM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Korstanje, Maximiliano 1976- |
author2_role | edt |
author2_variant | m k mk |
author_GND | (DE-588)1123743908 |
author_facet | Korstanje, Maximiliano 1976- |
building | Verbundindex |
bvnumber | BV043988144 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)973160572 (DE-599)BVBBV043988144 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02506nam a2200553 c 4500</leader><controlfield tag="001">BV043988144</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170302 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170109s2017 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">016048907</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522519386</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-5225-1938-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)973160572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043988144</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat mitigation and detection of cyber warfare and terrorism activities</subfield><subfield code="c">Maximiliano E. Korstanje [editor]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global, Disseminator of Knowledge</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 314 Seiten</subfield><subfield code="b">Illustrationen, Diagramme, Karten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberterrorismus</subfield><subfield code="0">(DE-588)1118882725</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Korstanje, Maximiliano</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1123743908</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-5225-1939-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029396420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029396420</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043988144 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:40:28Z |
institution | BVB |
isbn | 9781522519386 |
language | English |
lccn | 016048907 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029396420 |
oclc_num | 973160572 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xx, 314 Seiten Illustrationen, Diagramme, Karten |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | IGI Global, Disseminator of Knowledge |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series Premier reference source |
spelling | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje [editor] Hershey, PA IGI Global, Disseminator of Knowledge [2017] © 2017 xx, 314 Seiten Illustrationen, Diagramme, Karten txt rdacontent n rdamedia nc rdacarrier Advances in information security, privacy, and ethics (AISPE) book series Premier reference source "This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"... Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention (DE-588)4076308-0 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberterrorismus (DE-588)1118882725 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Cyberterrorismus (DE-588)1118882725 s Prävention (DE-588)4076308-0 s DE-604 Korstanje, Maximiliano 1976- (DE-588)1123743908 edt Erscheint auch als Online-Ausgabe 978-1-5225-1939-3 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029396420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Threat mitigation and detection of cyber warfare and terrorism activities Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention (DE-588)4076308-0 gnd Information warfare (DE-588)4461975-3 gnd Cyberterrorismus (DE-588)1118882725 gnd |
subject_GND | (DE-588)4076308-0 (DE-588)4461975-3 (DE-588)1118882725 (DE-588)4143413-4 |
title | Threat mitigation and detection of cyber warfare and terrorism activities |
title_auth | Threat mitigation and detection of cyber warfare and terrorism activities |
title_exact_search | Threat mitigation and detection of cyber warfare and terrorism activities |
title_full | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje [editor] |
title_fullStr | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje [editor] |
title_full_unstemmed | Threat mitigation and detection of cyber warfare and terrorism activities Maximiliano E. Korstanje [editor] |
title_short | Threat mitigation and detection of cyber warfare and terrorism activities |
title_sort | threat mitigation and detection of cyber warfare and terrorism activities |
topic | Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention (DE-588)4076308-0 gnd Information warfare (DE-588)4461975-3 gnd Cyberterrorismus (DE-588)1118882725 gnd |
topic_facet | Politik Information warfare Prevention Cyberspace Security measures Cyberterrorism Prevention Computer crimes Prevention Internet Political aspects Prävention Information warfare Cyberterrorismus Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029396420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT korstanjemaximiliano threatmitigationanddetectionofcyberwarfareandterrorismactivities |