Search

Your search keyword '"cyber space"' showing total 720 results

Search Constraints

Start Over You searched for: Descriptor "cyber space" Remove constraint Descriptor: "cyber space"
720 results on '"cyber space"'

Search Results

1. Exploration of human activity fragmentation in cyber and physical spaces using massive mobile phone data.

2. SELF-VISUALIZATION IN CYBER SPACE BETWEEN FRONT STAGE AND BACK STAGE (CASE STUDY OF INSTAGRAM ACCOUNT OWNER @KULINERCIREBON).

3. Exploration of human activity fragmentation in cyber and physical spaces using massive mobile phone data

4. Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space.

5. Characterizing temporally fragmented human activity networks in cyber space using uniform resource locator (URL) data

6. Glimpse of Cognitive Computing Towards Society 5.0

8. أثر استخدام مواقع التواصل الاجتماعي على التفاعل الاجتماعي لدى الطالب الجامعي دراسة ميدانية بكـلية العــلوم الاجتماعية والإنسانية - جامعة تيزي وزو-.

9. ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ В КІБЕРПРОСТОРІ.

10. БЕЗПЕКА ТЕХНОЛОГІЙ ФУНКЦІОНУВАННЯ ЦЕНТРУ ІНФОРМАЦІЙНОГО ЗАБЕЗПЕЧЕННЯ ЗАКЛАДУ ВИЩОЇ ОСВІТИ.

11. ISLAM, CYBERSPACE AND POST-TRUTH: EPISTEMOLOGICAL PROBLEMS IN THE DIGITAL AGE

12. VIRTUAL SPACE AND ITS ECONOMIC POWER

13. A Values-Driven Cyber-Farm of Trigram Metaverse Based on Autonomic Crowd-Dispatching

14. Preventing computer crime by knowing the legal regulations that ensure the protection of computer systems

15. Phishing Email Mitigation Technique Using Back-Propagation Neural Network for Cyber Space

16. Explanation of Cyberspace: Conceptual and Legal Frameworks

17. Presenting the architecture framework of cyber security governance in the defense organizations of the Islamic Republic of Iran

19. If I cannot move heaven, I will raise hell.

20. Preventing computer crime by knowing the legal regulations that ensure the protection of computer systems.

21. سياستكذارى جنايى در نقضى امنيت سايبرى ورهيافتهاى بيشكيرى اجتماعى

22. Digital Trends of Criminology and Criminal Justice of the 21st Century

23. Cyber Power Strategies of the Army of the Islamic Republic of Iran

24. A Survey of Network Features for Machine Learning Algorithms to Detect Network Attacks

28. Criminological Aspects of Current Cyber Security

29. 多样性病毒入侵环境下的网络空间安全态势智能估计方法.

30. Post-truth public diplomacy: a detrimental trend of cross-national communication and how open societies address it.

31. Virtual religious conflict: From cyberspace to reality

32. Peretas, Ketakutan, dan Kerugian: Pelanggaran Data dan Keamanan Nasional.

33. Kedaulatan Negara dalam Kepemilikan Data Digital: Analisis Langkah Strategis Australia Menghadapi Facebook dan Google.

36. INDUSTRY 4.0: AN OVERVIEW

37. مواجهة الحرب السيبرانية في قواعد القانون الدولي االنساني.

38. التأثري السيرباني يف األمن القومي للدول الفاعلة (الواليات املتحدة األمريكية) امنوذج.

39. Criminological Aspects of Current Cyber Security.

40. NATO in a Changing World

41. Cyber Crime Investigation and Law

42. Imperatives of Formation of the Information Society in the Context of the Modern Global Challenges

44. CYBER CRIME AND THE CHALLENGES FACED BY RESOLVING THE JURISDICTIONAL ISSUE S IN CYBER SPACE.

47. The legitimacy of the criminalization of the operation of production, distribution and publication of malware in the cyber space

48. Recognizing Cultural Consequences of the Internet of Things

49. The freedom of speech and right of access to information in the emerging system of international information security

50. Changing Metaphors in African Theologies: Influences from Digital Cultures.

Catalog

Books, media, physical & digital resources