04032oam 2200637 450 991015492600332120190911103516.09781522519393electronic9781522519386print10.4018/978-1-5225-1938-6(OCoLC)966368145(MiFhGG)GVRL7ZKU(EXLCZ)99434000000001826020161025h20172017 uy 0engurun|---uuuuardacontentrdamediardacarrierThreat mitigation and detection of cyber warfare and terrorism activities /Maximiliano E. Korstanje, University of Palermo, Argentina, [editor]Hershey, Pennsylvania :Information Science Reference, and imprint of IGI Global,[2017]�20171 online resource (xx, 314 pages) illustrations (some color), mapsAdvances in Library and Information Science (ALIS) Book Series1-5225-1938-6 Includes bibliographical references and index.A simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje."This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--Provided by publisher.Advances in information security, privacy, and ethics (AISPE) book series.Premier reference source.Information warfarePreventionCyberspaceSecurity measuresCyberterrorismPreventionComputer crimesPreventionInternetPolitical aspectsBig data analysisDigital protestsE-participationOnline bloggingOnline political behaviorParameter tamperingSurveillance and controlInformation warfarePrevention.CyberspaceSecurity measures.CyberterrorismPrevention.Computer crimesPrevention.InternetPolitical aspects.363.325Korstanje Maximiliano E.865627Korstanje MaximilianoMiFhGGMiFhGGBOOK9910154926003321Threat mitigation and detection of cyber warfare and terrorism activities2890774UNINA