Literatura académica sobre el tema "Cyberterrorism – Fiction"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Cyberterrorism – Fiction".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Cyberterrorism – Fiction"

1

Sebastian Serwiak. "Cyberterroryzm – nowe zagrożenie dla bezpieczeństwa." Archives of Criminology, no. XXVIII (January 29, 2006): 345–65. http://dx.doi.org/10.7420/ak2005-2006w.

Texto completo
Resumen
The face of terrorism is changing. Even the motivations do not remain the same as 10–20 years ago. Now, we are facing the emergence of a new category of an offensive gear unknown before. Intelligent networks, telecommunications infrastructure, security procedures and computer equipment once designed and expected to serve and protect people have become terrorist weapons. States and nations are currently almost powerless against this new and destructive phenomenon. The procedures and methods of countering terrorism, which world's specialists have created and perfected over the past decades, are
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Cyberterrorism – Fiction"

1

Green, John M. The trusted. Pantera Press, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Clancy, Tom. Cutting Edge. Penguin USA, Inc., 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Rees, Rod. The demi-monde: Spring. Jo Fletcher, 2012.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Russinovich, Mark E. Zero day. Thomas Dunne Books, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Bailey, Jodie. Compromised identity. Harlequin Love Inspired, 2016.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Coonts, Stephen. Stephen Coonts' Deep black--conspiracy. St. Martin's Paperbacks, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Coonts, Stephen. Stephen Coonts' Deep black--conspiracy. St. Martin's Paperbacks, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Chapman, Jason K. The heretic. FirstPublish, 2000.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ronco, Dan. Unholy domain: A novel. Kunati, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Swift, Sue. Spy game. Five Star, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Cyberterrorism – Fiction"

1

"Science-fiction et cyberterrorisme." In Capture totale. MATRIX. Presses de l’Université Laval, 2023. http://dx.doi.org/10.2307/jj.130870.10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

"Science-Fiction & Cyberterrorisme." In Capture totale. MATRIX. Les Presses de l’Université de Laval, 2006. http://dx.doi.org/10.1515/9782763713083-009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Röhrig Wolfgang and Llopis Salvador. "Cyberterrorism: A Challenge for External and Internal Security." In NATO Science for Peace and Security Series - E: Human and Societal Dynamics. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-765-8-25.

Texto completo
Resumen
The threat of Cyberterrorism is a sub-category of the overall threat environment that can emerge from cyberspace. In consequence military commanders have to take this into account for planning and executing operations when the strategic threat assessment indicates the presence of this specific threat to the operation. The article provides a practitioner's perspective along the military Operational Planning Process (OPP) and the recent developments to integrate cyber considerations in this process along the questions “what ... if ...” a commander of an (EU-led) Crisis Manage
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Baecker, Ronald M. "Law and order, war and peace." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0011.

Texto completo
Resumen
Most computers during the Second World War, such as the British code-breaking Colussus machine, had been developed for military use. The effects on law and order and war and peace of computerization, worldwide telecommunications, social media, artificial intelligence (AI), and robotics is the topic of Chapter 6. As in Chapter 5, the most compelling visions of the potential opportunities and dangers have been in science fiction and in film; we begin the chapter by reviewing some memorable examples. We then discuss how technology is used by the police, such as the use of video evidence to someti
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!