Search

Your search keyword '"cyber space"' showing total 40 results

Search Constraints

Start Over You searched for: Descriptor "cyber space" Remove constraint Descriptor: "cyber space" Database OAIster Remove constraint Database: OAIster
40 results on '"cyber space"'

Search Results

1. A STUDY ON EFFECTIVE COUNTERMEASURES AGAINST CYBER ATTACKS IN SOUTH KOREA

2. Hacker, Fear, and Harm: Data Breaches and National Security

3. Hacker, Fear, and Harm: Data Breaches and National Security

4. Inclusion of cyber security mechanisms in the development of the telematics system

5. 21W.785 Communicating in Cyberspace, Fall 2003

6. 21W.785 Communicating in Cyberspace, Fall 2003

7. Inclusion of cyber security mechanisms in the development of the telematics system

8. Future wars: the new centrality of intelligence and the redefinition of cyberspace

9. The Algorithm Society: Governance Without Government

10. Образовательные технологии в SMART-образовании

11. Computer-based data analysis techniques: The potential application to crime investigation in cyber space

12. Fenomena Haters Sebagai Dampak Negatif Perkembangan Media Sosial Di Indonesia [The Phenomena of Haters and the Negative Impact of Social Media Development in Indonesia]

13. Fenomena Haters Sebagai Dampak Negatif Perkembangan Media Sosial Di Indonesia [The Phenomena of Haters and the Negative Impact of Social Media Development in Indonesia]

14. Computer-based data analysis techniques: The potential application to crime investigation in cyber space

15. Cyber Defence Centre (CDC) - Umwelten, Schnittstellen und Fähigkeiten

16. La Cumbre de la OTAN en Varsovia

17. Cyber Defence Centre (CDC) - Umwelten, Schnittstellen und Fähigkeiten

18. La Cumbre de la OTAN en Varsovia

19. This title is unavailable for guests, please login to see more information.

20. Towards an analytical model for collaboration to secure cyber space

21. Towards an analytical model for collaboration to secure cyber space

22. Operational Art in Cyber Defense

23. Analysis of «incident» definitions and its interpretation in cyberspace

24. An evaluation strategy of state security level from the risk of external cyber influence

25. Non-Traditional Security Threats and Asia-Pacific Regional Cooperation

26. Addressing the spectre of cyber terrorism: a comparative perspective

27. Addressing the spectre of cyber terrorism: a comparative perspective

28. Technology Horizons: A Vision for Air Force Science and Technology 2010-30

29. Cyber Warfare: China's Strategy to Dominate in Cyber Space

30. Writing the mother, the mother writing: the space of motherhood and feminine écriture in Alien and The Matrix = Escrevendo a mãe; a escrita da mãe: o lugar da maternidade e a escritura feminine em Alien e The Matrix

31. Bullying and victimization : A study of self-reporting trends about violence at school comparing Swedish adolescents with and without disabilities

32. Cyber warfare: Armageddon in a Teacup?

33. Comunidades virtuales en tiempos de flujos: el caso de Second Life

34. Интернет комуникација и брачно посредовање

35. Computer Network Operations Methodology

36. Space, Time and Force: Relationships in Cyber Space

37. Three if by internet: exploring the utility of a hacker militia

38. The challenge of cyber power for central African countries: risks and opportunities

39. Cyber-enabled unconventional warfare: the convergence of cyberspace, social mobilization, and special warfare

40. The Crime of Defamation through the means of Information Technology in light of the Saudi Anti-Cybercrime Law: A comparative Study

Catalog

Books, media, physical & digital resources