Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities

Nonfiction, Social & Cultural Studies, Political Science, International, International Security, Computers, Networking & Communications, Computer Security
Cover of the book Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522519409
Publisher: IGI Global Publication: November 22, 2016
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781522519409
Publisher: IGI Global
Publication: November 22, 2016
Imprint: Information Science Reference
Language: English
Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.

More books from IGI Global

Cover of the book Computer Vision and Pattern Recognition in Environmental Informatics by
Cover of the book Cases on E-Readiness and Information Systems Management in Organizations by
Cover of the book Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures by
Cover of the book Governometrics and Technological Innovation for Public Policy Design and Precision by
Cover of the book Examining the Role of Environmental Change on Emerging Infectious Diseases and Pandemics by
Cover of the book Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications by
Cover of the book Conservation, Restoration, and Analysis of Architectural and Archaeological Heritage by
Cover of the book Handbook of Research on Diverse Applications of Nanotechnology in Biomedicine, Chemistry, and Engineering by
Cover of the book Handbook of Research on Multicultural Perspectives on Gender and Aging by
Cover of the book Handbook of Research on Information Security in Biomedical Signal Processing by
Cover of the book Technologies for the Treatment and Recovery of Nutrients from Industrial Wastewater by
Cover of the book Analyzing the Role of Risk Mitigation and Monitoring in Software Development by
Cover of the book Technology Optimization and Change Management for Successful Digital Supply Chains by
Cover of the book Effective Knowledge Management Systems in Modern Society by
Cover of the book Handbook of Research on Managerial Solutions in Non-Profit Organizations by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy