Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Divided into two sections - Strategic Viewpoints and Technical Challenges & Solutions - this book highlights the connection between computer security and national security.
Information warfare. --- Cyberterrorism. --- Computer crimes. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Military art and science --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of
Listing 1 - 1 of 1 |
Sort by
|