Coverart for item
The Resource Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun

Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun

Label
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses
Title
Terrorist use of cyberspace and cyber terrorism
Title remainder
new challenges and reponses
Statement of responsibility
edited by Mehmet Nesip Ogun
Creator
Contributor
Editor
Sponsoring body
Subject
Genre
Language
eng
Member of
Cataloging source
N$T
Dewey number
364.16/8
Illustrations
illustrations
Index
index present
LC call number
HV6431
LC item number
.N38375 2014eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2014
http://bibfra.me/vocab/lite/meetingName
NATO Advanced Training Course (ATC) on Terrorist Use of the Internet
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Ogun, Mehmet Nesip
  • NATO Science for Peace and Security Programme
Series statement
NATO science for peace and security series. Sub-series D, information and communication security,
Series volume
Vol. 42
http://library.link/vocab/subjectName
  • Cyberterrorism
  • Computer networks
  • Computer security
  • Information networks
  • Data protection
  • Terrorism
  • National security
  • SOCIAL SCIENCE
  • Computer networks
  • Computer security
  • Cyberterrorism
  • Data protection
  • Information networks
  • National security
  • Terrorism
Label
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
Instantiates
Publication
Distribution
Copyright
Note
  • "Proceedings of the NATO Advanced Training Course (ATC) on terrorist use of the internet, Ohrid, former Yugoslav Republic of Macedonia, 8-12 December 2014"--Title page verso
  • "This publication is supported by: The NATO Science for Peace and Security Programme"--Cover
Antecedent source
unknown
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity
  • Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
  • Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index
Control code
957491127
Dimensions
unknown
Extent
1 online resource (x, 213 pages)
File format
unknown
Form of item
online
Isbn
9781614995289
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)957491127
Label
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses, edited by Mehmet Nesip Ogun
Publication
Distribution
Copyright
Note
  • "Proceedings of the NATO Advanced Training Course (ATC) on terrorist use of the internet, Ohrid, former Yugoslav Republic of Macedonia, 8-12 December 2014"--Title page verso
  • "This publication is supported by: The NATO Science for Peace and Security Programme"--Cover
Antecedent source
unknown
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES; Foreword; Contents; The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report; Steganography in Support of the Global Terrorism; Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries; Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals; The Use Of Cyber Space For Terrorist Purposes -- With Special Reference To The Financing Terrorist Activity
  • Conforming to al Qaeda's single narrative -- an analysis of al Shabaab's Tweets during the Westgate terrorist attackFrom Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation; How Human Issues Impact Confronting Cyber Terrorism; Human Factor Dual Role in Modern Cyberspace Social Engineering; Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization
  • Southeast European(SEE) States' International Legal Rights And Obligations In The CyberspaceCultural Aspects of Information Sharing and Collaboration; Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do); The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace; Assessing and Responding to the Cyberterrorism Threat; Subject Index; Author Index
Control code
957491127
Dimensions
unknown
Extent
1 online resource (x, 213 pages)
File format
unknown
Form of item
online
Isbn
9781614995289
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)957491127

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...