Academic literature on the topic 'Cyberterrorism – Fiction'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberterrorism – Fiction.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyberterrorism – Fiction"

1

Sebastian Serwiak. "Cyberterroryzm – nowe zagrożenie dla bezpieczeństwa." Archives of Criminology, no. XXVIII (January 29, 2006): 345–65. http://dx.doi.org/10.7420/ak2005-2006w.

Full text
Abstract:
The face of terrorism is changing. Even the motivations do not remain the same as 10–20 years ago. Now, we are facing the emergence of a new category of an offensive gear unknown before. Intelligent networks, telecommunications infrastructure, security procedures and computer equipment once designed and expected to serve and protect people have become terrorist weapons. States and nations are currently almost powerless against this new and destructive phenomenon. The procedures and methods of countering terrorism, which world's specialists have created and perfected over the past decades, are
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyberterrorism – Fiction"

1

Green, John M. The trusted. Pantera Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clancy, Tom. Cutting Edge. Penguin USA, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rees, Rod. The demi-monde: Spring. Jo Fletcher, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Russinovich, Mark E. Zero day. Thomas Dunne Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bailey, Jodie. Compromised identity. Harlequin Love Inspired, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coonts, Stephen. Stephen Coonts' Deep black--conspiracy. St. Martin's Paperbacks, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Coonts, Stephen. Stephen Coonts' Deep black--conspiracy. St. Martin's Paperbacks, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chapman, Jason K. The heretic. FirstPublish, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ronco, Dan. Unholy domain: A novel. Kunati, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Swift, Sue. Spy game. Five Star, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyberterrorism – Fiction"

1

"Science-fiction et cyberterrorisme." In Capture totale. MATRIX. Presses de l’Université Laval, 2023. http://dx.doi.org/10.2307/jj.130870.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Science-Fiction & Cyberterrorisme." In Capture totale. MATRIX. Les Presses de l’Université de Laval, 2006. http://dx.doi.org/10.1515/9782763713083-009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Röhrig Wolfgang and Llopis Salvador. "Cyberterrorism: A Challenge for External and Internal Security." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-765-8-25.

Full text
Abstract:
The threat of Cyberterrorism is a sub-category of the overall threat environment that can emerge from cyberspace. In consequence military commanders have to take this into account for planning and executing operations when the strategic threat assessment indicates the presence of this specific threat to the operation. The article provides a practitioner's perspective along the military Operational Planning Process (OPP) and the recent developments to integrate cyber considerations in this process along the questions “what ... if ...” a commander of an (EU-led) Crisis Manage
APA, Harvard, Vancouver, ISO, and other styles
4

Baecker, Ronald M. "Law and order, war and peace." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0011.

Full text
Abstract:
Most computers during the Second World War, such as the British code-breaking Colussus machine, had been developed for military use. The effects on law and order and war and peace of computerization, worldwide telecommunications, social media, artificial intelligence (AI), and robotics is the topic of Chapter 6. As in Chapter 5, the most compelling visions of the potential opportunities and dangers have been in science fiction and in film; we begin the chapter by reviewing some memorable examples. We then discuss how technology is used by the police, such as the use of video evidence to someti
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!