1
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

2
by Jackson, Gary M.
Published 2012
John Wiley and Sons
Subjects: ...Terrorisme / Prévention / Informatique...

3
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / Terrorism / bisacsh...

4
Published 2017
Springer International Publishing
Table of Contents: ... Security Program -- Bio-risk Management Culture: Concept, Model, Assessment -- Preventing Nuclear Terrorism...

5
by Taft, Patricia, Haken, Nate
Published 2015
Springer International Publishing
...Terrorism, Security, and Computation...

6
by Subrahmanian, V.S., Ovelgonne, Michael, Dumitras, Tudor, Prakash, Aditya
Published 2015
Springer International Publishing
...Terrorism, Security, and Computation...

7
Published 2022
Springer International Publishing
Table of Contents: ... in Classification of Malicious Websites -- The Use of the Internet and the Internet of Things in Modern Terrorism...

8
by Montasari, Reza
Published 2024
Springer International Publishing
Table of Contents: .... Assessing the Effectiveness of UK Counter-Terrorism Strategies and Alternative Approaches -- 3...

9
by Lee, Newton
Published 2015
Springer International Publishing
Table of Contents: ...September 11 Attacks -- U.S. Intelligence Community -- Understanding Terrorism -- Cures...

10
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Information sharing and data/text mining -- Terrorism informatics -- Network-based data analytics...

11
by Lee, Newton
Published 2013
Springer New York
Table of Contents: ...: Causes and Cures -- Understanding Terrorism -- Cure for Terrorism -- War and Peace...

12
Published 2014
Springer International Publishing
Table of Contents: ...Digital Forensics – Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure...

13
by Papows, Jeff
Published 2011
Prentice Hall
Table of Contents: ...Converging forces -- The personal impact -- Cyber terrorism and other hidden threats -- Dealing...

14
by Schneier, Bruce
Published 2019
John Wiley & Sons, Incorporated
Table of Contents: ...Front Matter -- Crime, Terrorism, Spying, and War -- Travel and Security -- Internet of Things...

15
Published 2013
Morgan Kaufmann/Elsevier
Table of Contents: .... Mobile and cloud computing -- part 4. Cyber crime and cyber terrorism -- part 5. Focus topics : from...

16
Published 2006
Springer Berlin Heidelberg
... to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics...

17
Published 2010
Springer US
... applications. With the rise of global terrorism, the field has been given an increasing amount of attention...

18
by Katz, Sarah
Published 2023
IT Governance Publishing
... discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate...

19
by Katz, Sarah
Published 2022
IT Governance Publishing
... discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate...

20
by Wyler, Neil R.
Published 2005
Syngress Pub.
Table of Contents: .... Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know...