04032oam 2200637 450 991015492600332120190911103516.09781522519393electronic9781522519386print10.4018/978-1-5225-1938-6(OCoLC)966368145(MiFhGG)GVRL7ZKU(EXLCZ)99434000000001826020161025h20172017 uy 0engurun|---uuuuardacontentrdamediardacarrierThreat mitigation and detection of cyber warfare and terrorism activities /Maximiliano E. Korstanje, University of Palermo, Argentina, [editor]Hershey, Pennsylvania :Information Science Reference, and imprint of IGI Global,[2017]�20171 online resource (xx, 314 pages) illustrations (some color), mapsAdvances in Library and Information Science (ALIS) Book Series1-5225-1938-6 Includes bibliographical references and index.A simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje."This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--Provided by publisher.Advances in information security, privacy, and ethics (AISPE) book series.Premier reference source.Information warfarePreventionCyberspaceSecurity measuresCyberterrorismPreventionComputer crimesPreventionInternetPolitical aspectsBig data analysisDigital protestsE-participationOnline bloggingOnline political behaviorParameter tamperingSurveillance and controlInformation warfarePrevention.CyberspaceSecurity measures.CyberterrorismPrevention.Computer crimesPrevention.InternetPolitical aspects.363.325Korstanje Maximiliano E.865627Korstanje MaximilianoMiFhGGMiFhGGBOOK9910154926003321Threat mitigation and detection of cyber warfare and terrorism activities2890774UNINA01327nam0 22003133i 450 NAP046327720251003044252.020090514d1998 ||||0itac50 baengsez01i xxxe z01nAnalysis and design of hybrid control systemsJ�rgen MalmborgLundDepartment of Automatic Control, Institute of Technology1998VII, 131 p.ill.23 cm.LUTFD2/TFRTDepartment of Automatic Control, Lund Institute of Technology1050001NAP04331812001 LUTFD2/TFRTDepartment of Automatic Control, Lund Institute of Technology1050Sistemi di controlloFIRCFIC080659E629.8INGEGNERIA DEI CONTROLLI AUTOMATICI14629.8Ingegneria dei controlli automatici22Malmborg, JörgenNAPV110529070770979ITIT-00000020090514IT-BN0095 NAP 01SALA DING $NAP0463277Biblioteca Centralizzata di Ateneo1 v. 01SALA DING 629.8 MAL.an 0102 0000046695 VMA A4 1 v.Y 2003021120030211 01Analysis and design of hybrid control systems1573280UNISANNIO