1
by Bingley, Richard
Published 2024
IT Governance Publishing
... terrorism content does not require much in the way of research skills, technical ability or patience...

2
Published 2014
Elsevier
Table of Contents: ...Cyberspace : the new frontier for policing? -- Cyber terrorism -- New and emerging threats...

3
by Carr, Jeffrey
Published 2010
O'Reilly Media, Inc.
Subjects: ...Terrorisme...

4
by Carr, Jeffrey
Published 2012
O'Reilly Media
Subjects: ...Terrorisme...

5
by Bochman, Andrew A., Freeman, Sarah G.
Published 2021
CRC Press
Subjects: ...POLITICAL SCIENCE / Political Freedom & Security / Terrorism / bisacsh...

6
Published 2013
Morgan Kaufmann/Elsevier
Table of Contents: .... Mobile and cloud computing -- part 4. Cyber crime and cyber terrorism -- part 5. Focus topics : from...

7
by Katz, Sarah
Published 2023
IT Governance Publishing
... discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate...

8
by Katz, Sarah
Published 2022
IT Governance Publishing
... discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate...

9
by Cassara, John A.
Published 2016
John Wiley & Sons
Table of Contents: ... Invoices and Terror Finance; Case Study 3: TBML and Export Incentives; Case Study 4: Vehicles, TBML...

10
by Cox, Dennis W.
Published 2014
Wiley
Table of Contents: ...6.7 FCA Regulation and Money-Laundering Deterrence6.8 The Proceeds of Crime ACT 2002; 6.9 Terrorism...

11
by Shinder, Debra Littlejohn, Tittel, Ed
Published 2002
Syngress Pub.
..."Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."--Hans...

12
by Termanini, Rocky
Published 2016
Auerbach
Table of Contents: ... in the Battlefield; The Battlefield; The Appeal of Cyberterrorism; Terrorism Levels; The Most Challenging Attacks...

13
by Mehan, Julie E.
Published 2008
IT Governance
...CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile...