The Resource Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
Resource Information
The item Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri-St. Louis Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri-St. Louis Libraries.
This item is available to borrow from 1 library branch.
- Language
- eng
- Extent
- 1 online resource (x, 213 pages)
- Note
-
- "Proceedings of the NATO Advanced Training Course (ATC) on terrorist use of the internet, Ohrid, former Yugoslav Republic of Macedonia, 8-12 December 2014"--Title page verso
- "This publication is supported by: The NATO Science for Peace and Security Programme"--Cover
- Contents
-
- TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity
- Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
- Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index
- Isbn
- 9781614995289
- Label
- Terrorist use of cyberspace and cyber terrorism : new challenges and reponses
- Title
- Terrorist use of cyberspace and cyber terrorism
- Title remainder
- new challenges and reponses
- Statement of responsibility
- edited by Mehmet Nesip Ogun
- Subject
-
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Cyberterrorism -- Prevention
- Cyberterrorism -- Prevention -- Congresses
- Data protection
- Data protection -- Congresses
- Electronic books
- Information networks -- Security measures
- Information networks -- Security measures -- Congresses
- National security
- National security -- Congresses
- SOCIAL SCIENCE -- Criminology
- Terrorism -- Prevention
- Terrorism -- Prevention -- Congresses
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Language
- eng
- Cataloging source
- N$T
- Dewey number
- 364.16/8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- HV6431
- LC item number
- .N38375 2014eb
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2014
- http://bibfra.me/vocab/lite/meetingName
- NATO Advanced Training Course (ATC) on Terrorist Use of the Internet
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Ogun, Mehmet Nesip
- NATO Science for Peace and Security Programme
- Series statement
- NATO science for peace and security series. Sub-series D, information and communication security,
- Series volume
- Vol. 42
- http://library.link/vocab/subjectName
-
- Cyberterrorism
- Computer networks
- Computer security
- Information networks
- Data protection
- Terrorism
- National security
- SOCIAL SCIENCE
- Computer networks
- Computer security
- Cyberterrorism
- Data protection
- Information networks
- National security
- Terrorism
- Label
- Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
- Note
-
- "Proceedings of the NATO Advanced Training Course (ATC) on terrorist use of the internet, Ohrid, former Yugoslav Republic of Macedonia, 8-12 December 2014"--Title page verso
- "This publication is supported by: The NATO Science for Peace and Security Programme"--Cover
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and indexes
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity
- Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
- Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index
- Control code
- 957491127
- Dimensions
- unknown
- Extent
- 1 online resource (x, 213 pages)
- File format
- unknown
- Form of item
- online
- Isbn
- 9781614995289
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)957491127
- Label
- Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
- Note
-
- "Proceedings of the NATO Advanced Training Course (ATC) on terrorist use of the internet, Ohrid, former Yugoslav Republic of Macedonia, 8-12 December 2014"--Title page verso
- "This publication is supported by: The NATO Science for Peace and Security Programme"--Cover
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and indexes
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity
- Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
- Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index
- Control code
- 957491127
- Dimensions
- unknown
- Extent
- 1 online resource (x, 213 pages)
- File format
- unknown
- Form of item
- online
- Isbn
- 9781614995289
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)957491127
Subject
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Cyberterrorism -- Prevention
- Cyberterrorism -- Prevention -- Congresses
- Data protection
- Data protection -- Congresses
- Electronic books
- Information networks -- Security measures
- Information networks -- Security measures -- Congresses
- National security
- National security -- Congresses
- SOCIAL SCIENCE -- Criminology
- Terrorism -- Prevention
- Terrorism -- Prevention -- Congresses
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/portal/Terrorist-use-of-cyberspace-and-cyber-terrorism-/cj_ZHc6b0eg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/Terrorist-use-of-cyberspace-and-cyber-terrorism-/cj_ZHc6b0eg/">Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.umsl.edu/portal/Terrorist-use-of-cyberspace-and-cyber-terrorism-/cj_ZHc6b0eg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.umsl.edu/portal/Terrorist-use-of-cyberspace-and-cyber-terrorism-/cj_ZHc6b0eg/">Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.umsl.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.umsl.edu/">University of Missouri-St. Louis Libraries</a></span></span></span></span></div>