Academic literature on the topic 'Menace Internet'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Menace Internet.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Menace Internet"
Cohen, Jillian. "The Menace or Blessing of Internet Pharmacy." Journal of Pharmaceutical Marketing & Management 16, no. 3 (2005): 5–11. http://dx.doi.org/10.1300/j058v16n03_03.
Full textHu, Qing, and Tamara Dinev. "Is spyware an Internet nuisance or public menace?" Communications of the ACM 48, no. 8 (2005): 61–66. http://dx.doi.org/10.1145/1076211.1076241.
Full textLankshear, Colin, and Michele Knobel. "Memes, Macros, Meaning, and Menace: Some Trends in Internet Memes." Journal of Communication and Media Studies 4, no. 4 (2019): 43–57. http://dx.doi.org/10.18848/2470-9247/cgp/v04i04/43-57.
Full textCohen, Jillian Clare. "The Menace or Blessing of Internet Pharmacy? Some Public Policy Considerations." Journal of Pharmaceutical Marketing & Management 16, no. 3 (2004): 5–11. http://dx.doi.org/10.3109/j058v16n03_03.
Full textKumar, Shankar, Dr Nandeshwar Pd Singh, and Dr Narendra Kumar. "Mechanism, Tools and Techniques to Mitigate Distributed Denial of Service Attacks." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 855–61. http://dx.doi.org/10.22214/ijraset.2023.48675.
Full textKaur, Gurleen, Debhjit Mukherjee, Bhavika Moza, Vaishali Pahwa, Kulwinder Kaur, and Kamaljeet Kaur. "The dark web: A hidden menace or a tool for privacy protection." IP International Journal of Forensic Medicine and Toxicological Sciences 8, no. 4 (2024): 160–67. http://dx.doi.org/10.18231/j.ijfmts.2023.034.
Full textPrzyswa, Éric, and Franck Guarnieri. "Contrefaçon de médicaments sur Internet?: prévenir une menace réelle sur la santé publique." Les Tribunes de la santé 40, no. 3 (2013): 77. http://dx.doi.org/10.3917/seve.040.0077.
Full textArshinova, A. I. "Digital Inequality as Menace and Opportunity in Strategizing the Development of Educational Sphere." Economic Revival of Russia, no. 4 (78) (2023): 138–50. http://dx.doi.org/10.37930/1990-9780-2023-4-78-138-150.
Full textV, Mrs Pallavi K., Simran Banu H. Shirahatti, Soniya Devi T, Syed Owais Umair, and Syed Waseem Ahmed. "Phishing - A Common Cyber Menace to Combat." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 2307–10. http://dx.doi.org/10.22214/ijraset.2024.60283.
Full textYashlavskii, A. "The Jihadists from Europe in the Middle East: Phantom and Real Menace." World Economy and International Relations, no. 10 (2015): 18–29. http://dx.doi.org/10.20542/0131-2227-2015-10-18-29.
Full textDissertations / Theses on the topic "Menace Internet"
Mealer, Michael J. "Internet Radicalization : Actual Threat or Phantom Menace?" Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17416.
Full textVarin, Annie. "Risques technologiques et sécurité sur Internet : production d'un outil pour favoriser la prévention et fournir des pistes de solution." Mémoire, Université de Sherbrooke, 2011. http://savoirs.usherbrooke.ca/handle/11143/2674.
Full textCarvallo, Pamela. "Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL008/document.
Full textCarvallo, Pamela. "Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL008.
Full textBalduzzi, Marco. "Mesures automatisées de nouvelles menaces sur Internet." Paris, Télécom ParisTech, 2011. http://www.theses.fr/2011ENST0042.
Full textBen, Chaabene Nour El Houda. "Détection d'utilisateurs violents et de menaces dans les réseaux sociaux." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS001.
Full textWenk, Christian. "Einsatz von Internet-Technologie für Maschinenbedienoberflächen /." [Norderstedt] : Books on Demand, 2005. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014872006&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textIssoufaly, Taher. "Physical Tracking : menaces, performances et applications." Thesis, La Réunion, 2019. http://www.theses.fr/2019LARE0017/document.
Full textOgandaga, Ghislain. "Stratégies cognitives dans la recherche des informations Internet." Paris 5, 2008. http://www.theses.fr/2008PA05H026.
Full textBružaitė, Laura. "Kūrybos proveržis internete. "YouTube" fenomenas." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110802_155600-29059.
Full textBooks on the topic "Menace Internet"
Appelbaum, Jacob. Menace sur nos libertés: Comment Internet nous espionne. Comment résister. Robert Laffont, 2012.
Find full textDestouche, Grégory. Menace sur Internet: Des groupes subversifs et terroristes sur le Net. Michalon, 1999.
Find full textWautelet, M. Les cyberconflits: Internet, autoroutes de l'information et cyberespace : quelles menaces? Grip, 1998.
Find full textGuillebaud, Jean-Claude. Voulons-nous d'un monde désincarné?: Promesses et menaces de la cyberculture. Group Fides, 2013.
Find full textXavier, Raufer, and Laboratoire MINOS (Centre d'études de l'armement (France)), eds. Dictionnaire technique et critique des nouvelles menaces. Presses universitaires de France, 1998.
Find full textDes libertés numériques: Notre liberté est-elle menacée par l'Internet? Presses universitaires de France, 2008.
Find full textSteven, Heller, ed. Red scared!: The commie menace in propaganda and pop culture. Chronicle Books, 2001.
Find full textWon, Kim, ed. The Human Society and the Internet: Internet-related socio-economic issues, First International Conference Human.Society@Internet 2001, Seoul, Korea, July 4-6, 2001 : proceedings. Springer, 2001.
Find full textMalkin, Michelle. Invasion: How America still welcomes terrorists, criminals, and other foreign menaces to our shores. Regnery Pub., 2002.
Find full textBook chapters on the topic "Menace Internet"
Maurya, Sudhanshu, Shweta Arora, Kavita Ajay Joshi, et al. "To Combat the Menace of Forest Fires at Nainital and Almora District in Uttarakhand Using Internet of Things." In Cyber Technologies and Emerging Sciences. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2538-2_45.
Full textKnittl, Silvia, Valentina Neuberger, and Simon Dieterle. "Das Internet of Things – zwischen Usability und Verlust der Datensouveränität." In Faktor Mensch. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-34524-2_16.
Full textHöflich, Joachim R. "Internet und E-Mail – neue Wege schriftlicher Kommunikation?" In Der Mensch und seine Medien. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-531-18683-2_7.
Full textHöhler, Gertrud. "Interne Kommunikation als Führungsinstrument." In DIE RESSOURCE MENSCH im Mittelpunkt innovativer Unternehmensführung. Gabler Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-96421-2_15.
Full textCoy, Wolfgang. "Die Sprache(n) des Internets." In Der Mensch und seine Sprache(n). Böhlau Verlag, 2001. http://dx.doi.org/10.7767/9783205128663-010.
Full textElsdörfer, Ulrike. "Wagnis der Freiheit – Begegnung, Internationalismus und Internet: Grenzerfahrungen im interkulturellen Spiritual Care and Counselling." In Wagnis Mensch werden. Vandenhoeck & Ruprecht, 2022. http://dx.doi.org/10.13109/9783666703270.169.
Full textPallasmaa, Juhani. "Corpo, mente e immaginazione: l’essenza mentale dell’architettura." In La mente in architettura. Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-286-7.05.
Full textProdoehl, Hans Gerd. "Hit it and quit it! Das Internet als Treibhaus für die Evolution des abstrakten Menschen." In Der abstrakte Mensch. Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-13539-3_15.
Full textMühlenfeld, Hans-Ullrich. "Exkurs: Voraussetzungen zur Durchführung audiovisueller Fernkommunikation mit Hilfe des Internets." In Der Mensch in der Online-Kommunikation. Deutscher Universitätsverlag, 2004. http://dx.doi.org/10.1007/978-3-322-81327-5_5.
Full textJecker, Constanze, and Simone Huck-Sandhu. "Von der Information zur Orientierung. Zur (neuen) Rolle der internen Kommunikation in Selbstorganisationen." In Der Mensch in der Selbstorganisation. Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-27048-3_23.
Full textConference papers on the topic "Menace Internet"
Miao, Rui, Rahul Potharaju, Minlan Yu, and Navendu Jain. "The Dark Menace." In IMC '15: Internet Measurement Conference. ACM, 2015. http://dx.doi.org/10.1145/2815675.2815707.
Full textKolawole Akinyokun, Oluyomi, Boniface Kayode Alese, Samuel A. Oluwadare, Mary O Iyare, and Gabriel Babatunde Iwasokun. "Contributory Indices to Cybercrime Activities in Nigeria." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2243.
Full textAdeshina, Qozeem Adeniyi, and Baidya Nath Saha. "Using Machine Learning to Predict Distributed Denial-of-Service (DDoS) Attack." In Intelligent Computing and Technologies Conference. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.115.21.
Full textStütz, Lena, and Andreas Riener. "Let’s Chat Internal: User Acceptance of an In-Company Service Desk Chatbot." In MuC '21: Mensch und Computer 2021. ACM, 2021. http://dx.doi.org/10.1145/3473856.3474005.
Full textAli, Marlina, Johari Surif, Norasykin Mohd Zaid, Corrienna Abdul Talib, Abdul Halim Abdullah, and Nor Hasniza Ibrahim. "The Effectiveness of a Mentor-Mentee Program on Malaysian School Students' Interest in STEM." In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE). IEEE, 2018. http://dx.doi.org/10.1109/tale.2018.8615161.
Full textStojáková, Monika. "Virtuálna mena – "vakcína" pre finančný trh." In IV.SLOVENSKO-ČESKÉ DNI DAŇOVÉHO PRÁVA. Univerzita Pavla Jozefa Šafárika, 2021. http://dx.doi.org/10.33542/scd21-0043-1-25.
Full textTsai, Janet Y., Daria Kotys-Schwartz, Beverly Louie, Virginia Ferguson, and Alyssa Berg. "Comparing Mentor and Mentee Perspectives in a Research-Based Undergraduate Mentoring Program." In ASME 2012 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/imece2012-87723.
Full text"Preliminary study for catalytic gasification of water hyacinth for syngas production." In Sustainable Processes and Clean Energy Transition. Materials Research Forum LLC, 2023. http://dx.doi.org/10.21741/9781644902516-50.
Full textMohammad Iqbal, Abdul Ahad, and Ali Al-Alili. "Review of Solar Sorption Cooling Research in the MENA Region." In ASME 2016 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/imece2016-66352.
Full textPareja Aparicio, Miguel, Raúl Terol Bolinches, and Nadia Alonso López. "La utilización del podcast como herramienta pedagógica. Caso de estudio de la asignatura Teoría y Ecología de los Medios Audiovisuales." In IN-RED 2019: V Congreso de Innovación Educativa y Docencia en Red. Editorial Universitat Politècnica de València, 2019. http://dx.doi.org/10.4995/inred2019.2019.10366.
Full textReports on the topic "Menace Internet"
Espeleta Maradei, Mónica. Apuntes sobre conceptos básicos de psicoanálisis. Ediciones Universidad Cooperativa de Colombia, 2023. http://dx.doi.org/10.16925/gcnc.65.
Full textMbaye, Safiétou, Rémi Kouabenan, and Philippe Sarnin. L'explication naïve et la perception des risques comme des voies pour améliorer les pratiques de REX: des études dans l'industrie chimique et l'industrie nucléaire. Fondation pour une culture de sécurité industrielle, 2009. http://dx.doi.org/10.57071/311rex.
Full textSaudi-China Collaboration on Renewable Energy Supply Chains. King Abdullah Petroleum Studies and Research Center, 2023. http://dx.doi.org/10.30573/ks--2022-wb13.
Full text