1.

Record Nr.

UNISA996388668503316

Autore

Dangerfield Thomas <1650?-1685.>

Titolo

Dangerfield's ghost to Jefferys [[electronic resource]]

Pubbl/distr/stampa

[London, : s.n., 168-?]

Descrizione fisica

1 broadside

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Caption title.

Reproduction of original in the Harvard University Library.

Sommario/riassunto

eebo-0062

2.

Record Nr.

UNINA9910774602203321

Autore

Bigon Liora <1974->

Titolo

Street-naming cultures in Africa and Israel : power strategies and place-making practices / / Liora Bigon and Michel Ben Arrous

Pubbl/distr/stampa

London, England ; ; New York, New York : , : Routledge, Taylor & Francis Group, , [2022]

©2022

ISBN

1-00-317376-4

1-003-17376-4

1-000-43237-8

Descrizione fisica

1 online resource (xxvi, 236 pages) : illustrations

Collana

Routledge research in planning and urban design

Disciplina

388.411096

Soggetti

Street names - Government policy - Africa

Street names - Government policy - Israel

Street names - Social aspects - Africa

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



Nota di bibliografia

Includes bibliographical references and index.

3.

Record Nr.

UNINA9910821491503321

Autore

Andress Jason

Titolo

Cyber warfare : techniques, tactics and tools for security practitioners / / Jason Andress, Steve Winterfeld ; Lillian Ablon, technical editor

Pubbl/distr/stampa

Waltham, MA : , : Syngress, , 2014

ISBN

0-12-416633-4

Edizione

[Second edition.]

Descrizione fisica

1 online resource (xvii, 306 pages) : illustrations (some color)

Collana

Gale eBooks

Disciplina

355.3/43

Soggetti

Information warfare

Computer networks - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.

Sommario/riassunto

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the thre