Black ice : the invisible threat of cyber-terrorism
Detalles de publicación: New York : McGraw-Hill/Osborne, 2003 Edición: 1a. edDescripción: 273 pTema(s): CIBERTERRORISMO
Contenidos:
1: Cyber-Terrorism: Fact or Fiction?
2: Black Ice: Cyber-Terrorism’s Hidden Dangers
3: Terror on a Wire: The Internet as Weapon
4: Terror in the Air: The Wireless Threat
5: Al-Qaeda: In Search of Bin Laden’s Hackers
6: Web of Terror: What al-Qaeda Knows about the U.S.
7: 9/11: The Cyber-terrorist Attack
8: Intelligence: Stopping the Next Attack
9: Dark Winter: Technology and Early Warning
10: Patriot Games: Security, Terror, Liberty
11: The War on Terror: Mobilizing for the Future
A: Critical Infrastructures
B: PDD-63 at a Glance
C: Remarks on Cyber-Terrorism
D: The Homeland Security Challenge: Source: U.S. Department of Homeland Security
Tipo de ítem | Biblioteca actual | Signatura | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|
Libro | Instituto de Investigaciones Gino Germani - CDI | 15745 - DEPÓSITO (Navegar estantería(Abre debajo)) | Disponible | 15745 |
Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
15742 - DEPÓSITO The end of work : the decline of the global labor force and the dawn of the post-market era | 15743 - DEPÓSITO The cult of information : a neo-luddite treatise on high tech, artificial intelligence and the true art of thinking | 15744 - DEPÓSITO Technological change and spatial policy | 15745 - DEPÓSITO Black ice : the invisible threat of cyber-terrorism | 15746 - DEPÓSITO The wealth of networks : how social production transforms markets and freedom | 15747 - DEPÓSITO The transnational dimension of cyber crime terrorism | 15748 - DEPÓSITO Technoscience and cyberculture |
1: Cyber-Terrorism: Fact or Fiction?
2: Black Ice: Cyber-Terrorism’s Hidden Dangers
3: Terror on a Wire: The Internet as Weapon
4: Terror in the Air: The Wireless Threat
5: Al-Qaeda: In Search of Bin Laden’s Hackers
6: Web of Terror: What al-Qaeda Knows about the U.S.
7: 9/11: The Cyber-terrorist Attack
8: Intelligence: Stopping the Next Attack
9: Dark Winter: Technology and Early Warning
10: Patriot Games: Security, Terror, Liberty
11: The War on Terror: Mobilizing for the Future
A: Critical Infrastructures
B: PDD-63 at a Glance
C: Remarks on Cyber-Terrorism
D: The Homeland Security Challenge: Source: U.S. Department of Homeland Security