Author | : Robert Mandel |
Publisher | : Georgetown University Press |
Total Pages | : 304 |
Release | : 2017-01-12 |
ISBN 10 | : 9781626164130 |
ISBN 13 | : 1626164134 |
Language | : EN, FR, DE, ES & NL |
Related Books:
Language: en
Pages: 304
Pages: 304
Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing
Language: en
Pages: 307
Pages: 307
Cyber environments have become a fundamental part of educational institutions, causing a need for understanding the impact and general principles of ethical com
Language: en
Pages: 202
Pages: 202
The United States’ national security depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national
Language: en
Pages: 182
Pages: 182
This book addresses the fact that a single individual, armed with very little capital and material resources, can achieve control and dominance over a targeted
Language: en
Pages: 293
Pages: 293
Addressing the impact of information technology on the field of criminal justice, this title looks at the larger issues related to the impact of new technology
Language: en
Pages: 186
Pages: 186
If Sun Tzu were alive today, rather than in the fifth century BC, he would be on various stages and his strategies would be all the rage for individuals and org
Language: en
Pages: 316
Pages: 316
Digital Bank tracks the innovations in banking and how the mobile internet is changing the dynamics of consumer and corporate relationships with their banks. Th
Language: en
Pages: 392
Pages: 392
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on t
Language: en
Pages: 2253
Pages: 2253
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top pr
Language: en
Pages:
Pages:
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't