Sökt på: Sökresultat
totalt 10 träffar
Understanding Cyber Conflict
Cyber weapons and the possibility of cyber conflict-including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military …
Psykiatrisk sygepleje
Dette er 2. udgave af den bredt anerkendte og populære lærebog. Som noget nyt i 2. udgave har alle interessenter deltaget i tilblivelsen af bogen. Det gælder psykiatribrugere, …
Cybersecurity Dilemma
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. …
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. …
Brain structure and circuitry in body dysmorphic disorder
Georgetown Journal of International Affairs
Each spring, the Cyber Project at Georgetown University's Institute for Law, Science, and Global Security convenes a conference of leading international experts from academia, the …
Hacker and the State
"e;A must-read...It reveals important truths."e;-Vint Cerf, Internet pioneer"e;One of the finest books on information security published so far in this century-easily …
The Cybersecurity Dilemma
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. …
Handbook of Archaeological Theories
This handbook gathers original, authoritative articles from leading archaeologists to compile the latest thinking about archaeological theory. The authors provide a comprehensive …
The Hacker and the State
An Open Letters Review Best Book of the Year“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly …