Journal of Information Warfare, Svazek 2,Vydání 2–3Teamlink Australia Pty Limited, 2003 |
Obsah
Improving Analysis and Accountability | 15 |
The Law and Cyber Terrorism | 27 |
The Story So Far | 33 |
Autorská práva | |
Další části 8 nejsou zobrazeny.
Další vydání - Zobrazit všechny
Běžně se vyskytující výrazy a sousloví
actions activities analysis application assessment CERT/CC Certification and Accreditation communications competitive intelligence components computer crime computer forensic Computer Science Computer Security configuration CORBA course criminal CSIRT cyber attack cyber crime cyberspace cyberterrorism cyberwarfare database deception Defence in Depth Defense denial of service described e-Democracy electronic information Email evaluate example exploit files firewall functions global hacker honeypot host implementation Information Assurance information security information systems Information Warfare International intrusion detection investigation IPsec issues IWAR laboratory Journal of Information law enforcement Linux Live Exercises military National Nessus network security operating system organisation organizations outcomes paper password policies protection protocols result risk router security incidents server specific SSAA strategies System Security Tanzania target Team terrorism terrorist testbed network threat agent University virtual vulnerabilities workstation