Listing 1 - 10 of 74 << page
of 8
>>
Sort by

Book
Responses to cyber terrorism
Author:
ISBN: 6611733582 128173358X 9786611733582 1607503115 6000005393 1433711397 9781607503118 9781433711398 9781586038366 Year: 2008 Publisher: Amsterdam, Netherlands Washington, DC IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as ""a cyber attack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal."" But the cyber world is surely remote from what is recognized as terrorism: the bloody attacks and ethnic conflicts, or, more precisely, the politically-motivated ""intention to cause death or serious bodily h


Book
Proceedings, WOMBAT Workshop on Information Security Threats Data Collection and Sharing : WISTDCS 2008, 21-22 April 2008, Amsterdam, Netherlands
Authors: ---
ISBN: 0769533477 150907757X 9781509077571 Year: 2008 Publisher: [Place of publication not identified] IEEE Computer Society


Book
ICCC : 2014 6th International Conference on Cyber Conflict : proceedings : 3-6 June 2014, Tallinn, Estonia
Authors: ---
ISBN: 994995441X 9949954401 1479951137 Year: 2014 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2012 4th International Conference on Cyber Conflict
Author:
ISBN: 9949904099 1467312703 9789949904099 Year: 2012 Publisher: [Place of publication not identified] IEEE

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyberterrorism
Author:
ISBN: 0754624269 9780754624264 Year: 2004 Publisher: Aldershot: Ashgate,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Inside the enemy's computer : identifying cyber attackers
Author:
ISBN: 0190848502 9780190848507 Year: 2017 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Attribution is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. This work examines this important topic.


Book
CyCon : 2018 10th International Conference on Cyber Conflict : CyCon X : maximising effects : 30 May-01 June 2018, Tallinn, Estonia
Authors: --- --- --- ---
ISBN: 9949990432 1538652595 Year: 2018 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Terrorist use of cyberspace and cyber terrorism
Authors: ---
ISBN: 1614995281 9781614995289 1614995273 9781614995272 Year: 2015 Publisher: Amsterdam, Netherlands Washington, DC Fairfax, VA

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyber technological paradigms and threat landscape in India
Author:
ISBN: 9811691274 9811691282 Year: 2022 Publisher: Singapore : Palgrave Macmillan,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Emerging trends in ICT security
Authors: ---
ISBN: 0124104878 0124114741 1306119960 9780124104877 9781306119962 9780124114746 Year: 2013 Publisher: Waltham, Massachusetts

Loading...
Export citation

Choose an application

Bookmark

Abstract

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a

Listing 1 - 10 of 74 << page
of 8
>>
Sort by