Threat mitigation and detection of cyber warfare and terrorism activities:

"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillan...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere beteiligte Personen: Korstanje, Maximiliano 1976- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Hershey, PA IGI Global, Disseminator of Knowledge [2017]
Schriftenreihe:Advances in information security, privacy, and ethics (AISPE) book series
Premier reference source
Schlagwörter:
Links:https://doi.org/10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1938-6
https://doi.org/10.4018/978-1-5225-1938-6
Zusammenfassung:"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"...
Umfang:1 Online-Ressource (xx, 314 Seiten) Illustrationen, Diagramme, Karten
ISBN:9781522519393
DOI:10.4018/978-1-5225-1938-6