1
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja...

2
by Katz, Rita
Published 2022
Tantor Media, Inc.
Subjects: ...Terrorisme...

3
by Biringer, Betty E.
Published 2013
Taylor & Francis
Subjects: ...Terrorism / United States / Prevention...

4
by Schneier, Bruce
Published 2008
Wiley Pub.
Table of Contents: ...Terrorism and security -- National security policy -- Airline travel -- Privacy and surveillance...

5
by Jackson, Gary M.
Published 2012
John Wiley and Sons
Subjects: ...Terrorisme / Prévention / Informatique...

6
by Ventre, Daniel
Published 2012
ISTE
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / Terrorism / bisacsh...

7
by Uceda Vélez, Tony, Morana, Marco M.
Published 2015
John Wiley & Sons
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / Terrorism / bisacsh...

8
by Young, Carl
Published 2014
Butterworth-Heinemann
... foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful...

9
Published 2013
Morgan Kaufmann/Elsevier
Table of Contents: .... Mobile and cloud computing -- part 4. Cyber crime and cyber terrorism -- part 5. Focus topics : from...

10
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ... -- Cyber terrorism and information warfare -- Cyber detective -- Introduction to forensics...

11
by Wyler, Neil R.
Published 2005
Syngress Pub.
Table of Contents: .... Chapter 7: Disinformation Campaigns -- Chapter 8: Cyber Terrorism and Counter Intelligence Chapter 9: Know...

12
by Calder, Alan
Published 2005
IT Governance Pub.
Table of Contents: ... CRIME; CHAPTER 8 TERRORISM; CHAPTER 9 EVOLVING THREAT ENVIRONMENT; CHAPTER 10 REGULATORY COMPLIANCE...

13
by University, Stuart
Published 2005
Pearson
...Capitalism is indeed at a crossroads, facing international terrorism, worldwide environmental...

14
by Kleindorfer, Paul R.
Published 2009
Wharton School Pub.
Table of Contents: ... -- Terrorism networks / Boaz Ganor -- The itinerary of microorganisms : a network-based response to the network...

15
by Yang, Christopher C.
Published 2013
Academic Press
... Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics...

16
by Shinder, Debra Littlejohn, Tittel, Ed
Published 2002
Syngress Pub.
..."Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans...

17
by Benjamin, Henry
Published 2003
Cisco

18
by Cerra, Allison
Published 2019
Wiley
Table of Contents: ... -- The Internet of Terrorism 74 -- W.I.S.D.O.M. for the Product Developer 80 -- Chapter 5 Bridging the Gap 87...

19
by Fuchs, Christian
Published 2012
Routledge
..., economic crisis, and fear of terrorism after 9/11, both corporations and state institutions have a growing...

20
by Hassan, Nihad A., Hijazi, Rami
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
... in different scenarios such as financial, crime, and terrorism investigations as well as performing business...