Letteratura scientifica selezionata sul tema "Cybersecurity Espionage"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cybersecurity Espionage".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Cybersecurity Espionage"
Alashi, Shahad A., e Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations". Journal of Information Security and Cybercrimes Research 3, n. 1 (15 dicembre 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Testo completoHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n. 2 (30 aprile 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Testo completoRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n. 3 (1 luglio 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Testo completoSusila, Muh, e Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, n. 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Testo completoKatzan, Jr., Harry. "Cybersecurity Service Model". Journal of Service Science (JSS) 5, n. 2 (28 dicembre 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Testo completoKatzan, Harry. "Contemporary Issues in Cybersecurity". Journal of Cybersecurity Research (JCR) 1, n. 1 (21 giugno 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Testo completoCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective". Politics in Central Europe 17, n. 4 (1 dicembre 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Testo completoBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet". Perspectives on Politics 21, n. 2 (giugno 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Testo completoPatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". México y la Cuenca del Pacífico 8, n. 24 (1 settembre 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Testo completoPIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, n. 2 (8 luglio 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Testo completoTesi sul tema "Cybersecurity Espionage"
Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate". Thesis, Monterey, California: Naval Postgraduate School, 2012.
Cerca il testo completoCyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
Libri sul tema "Cybersecurity Espionage"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cyber threats from China, Russia, and Iran: Protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013. Washington: U.S. Government Printing Office, 2013.
Cerca il testo completoReveron, Derek S., Jon R. Lindsay e Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Cerca il testo completoReveron, Derek S., Jon R. Lindsay e Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Cerca il testo completoChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Cerca il testo completoChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Cerca il testo completoThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.
Cerca il testo completoThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. Sweden: 49books, 2023.
Cerca il testo completoCornish, Paul, a cura di. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.
Testo completoBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Testo completoCapitoli di libri sul tema "Cybersecurity Espionage"
Fidler, David P. "Introduction: Cybersecurity and cybersecurity law". In Cyber espionage, 2–10. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch001.
Testo completoFidler, David P. "Conclusion: Cybersecurity law in a divided world". In Cyber espionage, 142–51. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch007.
Testo completoWilliquette, Joel F. "Cybersecurity Concerns in International Business". In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 59–71. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch004.
Testo completoMingo, Horace C. "The Emerging Cybersecurity Challenges With Artificial Intelligence". In Multisector Insights in Healthcare, Social Sciences, Society, and Technology, 163–85. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3226-9.ch010.
Testo completoMingo, Horace C. "How Emerging Technologies Spawn New Social Engineering Paradigms". In Transformational Interventions for Business, Technology, and Healthcare, 31–44. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1634-4.ch003.
Testo completoLee, Jaeung, Anu Mary Eapen, Md Shamim Akbar e H. Raghav Rao. "An Exploration Regarding Issues in Insider Threat". In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 1–23. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch001.
Testo completoSaharan, Sameer, Shailja Singh, Ajay Kumar Bhandari e Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse". In Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.
Testo completoEdelman, R. David. "Defining and Studying Cyberattacks". In Rethinking Cyber Warfare, 11–52. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0003.
Testo completoAtti di convegni sul tema "Cybersecurity Espionage"
Frost, James. "Dealing with the risk of organizational espionage". In CyberSec '18: Fifth Cybersecurity Symposium. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212687.3212869.
Testo completoPärn, Erika. "Cybersecurity of Digital Twins in the Built Environment". In Construction Blockchain Conference 2021. Design Computation, 2021. http://dx.doi.org/10.47330/cbc.2021.wbnf3640.
Testo completoOnescu, Dragos ionut. "EU AND CYBER SECURITY". In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.
Testo completo