Listing 1 - 10 of 33 | << page >> |
Sort by
|
Choose an application
Telecommunication policy --- Telecommunication --- Cyberspace. --- Forecasting.
Choose an application
Over the course of the last year, a host of cyberattacks has been perpetrated on a number of high profile American companies. The high profile cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyberattacks are increasing, posing grave threats to the national interests of the United States. While considerable debate exists with regard to the best strategies for protecting America's various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely excha
Computer networks --- Cyberspace --- Data protection. --- Security measures.
Choose an application
Telecommunication policy --- Cyberspace --- Internet --- Government policy
Choose an application
This report provides an overview of the financial impact of cyber incidents, the coverage of cyber risk available in the insurance market, the challenges to market development and initiatives to address those challenges.
Computer insurance. --- Risk management. --- Cyberspace --- Security measures --- Management. --- Computer software insurance --- Insurance, Computer --- Insurance --- Space and time --- Computers --- Telematics --- Management
Choose an application
The content of this volume reflects theoretical and practical discussions on cultural issues influenced by increased adoption of information and communication technologies. The penetration of new forms of communication, such as online social networking, i
Cyberspace --- Online social networks. --- Computers and civilization. --- Internet --- Social aspects. --- Cyberculture --- Humanity --- Science fiction --- Online social networks --- Computers and civilization --- Social aspects
Choose an application
A collection of selected papers from the 18th WIRN workshop, the annual meeting of the Italian Neural Networks Society (SIREN). It is divided in two general subjects, 'models' and 'applications' and two specific ones, 'economy and complexity' and 'remote sensing image processing'.
Neural networks (Computer science) --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- E-books --- Réseaux neuronaux (informatique)
Choose an application
Cyberspace operations (Military science) --- Cyberterrorism --- Balance of power --- Power, Balance of --- Power politics --- International relations --- Political realism --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Political aspects --- Economic aspects --- E-books --- Economic aspects. --- Political aspects.
Choose an application
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
Computer crimes -- Prevention. --- Cyber intelligence (Computer security). --- Cyberspace -- Security measures,. --- Hackers. --- Professions -- Supply and demand. --- Computer crimes --- Cyber intelligence (Computer security) --- Cyberspace --- Professions --- Hackers --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Security measures, --- Supply and demand --- Prevention. --- Security measures. --- Supply and demand. --- Computer security. --- Computer hackers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer programmers --- Computer users --- Data protection --- Security systems --- Hacking --- Space and time --- Telematics --- E-books --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security
Choose an application
Internet in education. --- Mentoring in business. --- Mentoring in education. --- Mentoring. --- Telematics --- Social aspects. --- Mentoring --- Mentoring in business --- Mentoring in education --- CMC systems --- Computer-mediated communication --- Telecommunication --- Cyberspace --- Mentors in education --- Education --- Mentors in business --- Business --- Employees --- Mentorship --- Counseling --- Social aspects --- Coaching of --- E-books --- Internet in education
Choose an application
This book presents a comprehensive view of Internet intermediaries, their economic and social function, development and prospects, benefits and costs, and roles and responsibilities. Divided into three parts, Part I, The Economic and Social Role of Internet Intermediaries, develops a common definition and understanding of what Internet intermediaries are, of their economic function and economic models, of recent market developments, and discusses the economic and social uses that these actors satisfy. Part II, The Role of Internet Intermediaries in Advancing Public Policy Objectives, examines the roles and responsibilities of Internet intermediaries in advancing public policy objectives, as well as the costs and benefits of their involvement through a series of case studies. Part III provides a summary of an experts workshop that identified lessons learned and best practices from the experience to date of Internet intermediaries in advancing public policy objectives.
Internet -- Economic aspects. --- Internet -- Law and legislation. --- Internet -- Social aspects. --- Internet service providers -- Economic aspects. --- Internet service providers -- Law and legislation. --- Internet --- Internet service providers --- Business & Economics --- Economic History --- Economic aspects --- Social aspects --- Law and legislation --- Economic aspects. --- Social aspects. --- Law and legislation. --- IAPs (Internet service providers) --- Internet access providers --- Internet service industry --- ISPs (Internet service providers) --- Cyberspace --- DARPA Internet --- Internet (Computer network) --- Internet industry --- Wide area networks (Computer networks) --- World Wide Web
Listing 1 - 10 of 33 | << page >> |
Sort by
|