Developments in information security and cybernetic wars

"This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"--

Bibliographic Details
Other Authors: Sarfraz, Muhammad
Format: eBook
Language:English
Published: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global, [2019]
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03027cam a2200445Mi 4500
001 koha001013136
003 OCoLC
005 20250222065950.0
006 m e d
007 cr bn||||m|||a
008 190326s2019 pau fob 001 0 eng d
035 |a koha001013136 
040 |a IGIGL  |b eng  |e rda  |c IGIGL  |d N$T 
020 |a 152258305X 
020 |a 9781522583059  |q (electronic bk.) 
020 |z 9781522583042  |q hardcover 
024 7 |a 10.4018/978-1-5225-8304-2  |2 doi 
050 4 |a QA76.9.A25  |b D5135 2019e 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
245 0 0 |a Developments in information security and cybernetic wars  |c Muhammad Sarfraz, editor. 
264 1 |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)  |b IGI Global,  |c [2019] 
300 |a 1 online resource (19 PDFs (xix, 351 pages)) 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. On cyber crimes and cyber security -- Chapter 2. Artificial intelligence and big data analytics in support of cyber defense -- Chapter 3. A strategic decision-making framework in cyberspace -- Chapter 4. The opportunities for a national cyber strategy and social media in the rhizome networks -- Chapter 5. Building blocks and measurement of national cyberpower -- Chapter 6. Detecting ddos attacks on multiple network hosts: advanced pattern detection method for the identification of intelligent botnet attacks -- Chapter 7. The evolution of cyber warfare in information operations targeting Estonia, the U.S., and Ukraine -- Chapter 8. The new front line (enhanced): updating the concept of enemy in the onlife age -- Chapter 9. Big data analysis for terroristic behavior identification and study using social networks: illegal armed groups during the conflict in Donbas Region (East Ukraine) -- Chapter 10. Russian information warfare and 9/11 conspiracism: when fake news meets false prophecy -- Chapter 11. The double edge of the information sword -- Chapter 12. Positive vs. negative emotions and network size: an exploratory study of twitter users. 
520 3 |a "This book focuses on cyber warfare and terrorism using examples from around the world. It covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism"--  |c Provided by publisher. 
588 |a Description based on title screen (IGI Global, viewed 03/26/2019). 
653 7 |a COMPUTERS / Security / General  |2 bisacsh 
653 0 |a Computer security. 
653 0 |a Cyberterrorism. 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Sarfraz, Muhammad,  |9 328368 
710 2 |a IGI Global,  |e publisher.  |9 899844 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2093276.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013136 
910 |a EBSCO eBooks 
999 |c 1013136  |d 1013136 
039