Showing 1 - 9 of 9
This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and … terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the …
Persistent link: https://www.econbiz.de/10011725949
This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against...
Persistent link: https://www.econbiz.de/10011725950
This handbook is the comprehensive reference source for innovative knowledge on electronic surveys. It provides complete coverage of the challenges associated with the use of the Internet to develop online surveys, administer Web-based instruments, and conduct computer-mediated assessments. More...
Persistent link: https://www.econbiz.de/10011726175
1. The Myers-Briggs personality types -- 2. Enneagram personalities -- 3. Cognition, creativity and learning -- 4. The deepest inner self : a foundation for "emotional intelligence" -- 5. Areas of IT application -- 6. The emotionally intelligent IT organization -- 7. A call to action
Persistent link: https://www.econbiz.de/10011726410
"This book identifies learners' online behavior based on the theories in human psychology, defines online education phenomena as explained by the social and cognitive learning theories and principles, and interprets the complexity of cyber learning"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727472
"This book combines best practices and empirical research on social networking and other related technologies, emphasizing creative and innovative implementation across various disciplines"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728246
Information and Computer Security -- The Nature of Terrorism -- Cyber-Terrorism -- Physical Security -- Denial of Service Threat -- Web Defacements and Semantic Attacks -- DNS Attacks -- Routing Vulnerabilities -- Identity Stealing Attacks -- Identification, Authentication, and Access Control --...
Persistent link: https://www.econbiz.de/10011726388
Terroredia: exchanging terrorism oxygen for media airwaves / Mahmoud Eid -- Understanding terrorism / Mahmoud Eid -- Understanding media during times of terrorism / Robert Hackett -- Terrorism manifestations / Jonathan R. White -- Media representations of terrorism / John Downing -- Types of...
Persistent link: https://www.econbiz.de/10011727967
"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728228