Gotowa bibliografia na temat „Cybersecurity Espionage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cybersecurity Espionage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cybersecurity Espionage"
Alashi, Shahad A., i Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations". Journal of Information Security and Cybercrimes Research 3, nr 1 (15.12.2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Pełny tekst źródłaHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, nr 2 (30.04.2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Pełny tekst źródłaRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, nr 3 (1.07.2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Pełny tekst źródłaSusila, Muh, i Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, nr 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Pełny tekst źródłaKatzan, Jr., Harry. "Cybersecurity Service Model". Journal of Service Science (JSS) 5, nr 2 (28.12.2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Pełny tekst źródłaKatzan, Harry. "Contemporary Issues in Cybersecurity". Journal of Cybersecurity Research (JCR) 1, nr 1 (21.06.2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Pełny tekst źródłaCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective". Politics in Central Europe 17, nr 4 (1.12.2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Pełny tekst źródłaBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet". Perspectives on Politics 21, nr 2 (czerwiec 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Pełny tekst źródłaPatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". México y la Cuenca del Pacífico 8, nr 24 (1.09.2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Pełny tekst źródłaPIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, nr 2 (8.07.2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Pełny tekst źródłaRozprawy doktorskie na temat "Cybersecurity Espionage"
Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate". Thesis, Monterey, California: Naval Postgraduate School, 2012.
Znajdź pełny tekst źródłaCyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
Książki na temat "Cybersecurity Espionage"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cyber threats from China, Russia, and Iran: Protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013. Washington: U.S. Government Printing Office, 2013.
Znajdź pełny tekst źródłaReveron, Derek S., Jon R. Lindsay i Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Znajdź pełny tekst źródłaReveron, Derek S., Jon R. Lindsay i Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Znajdź pełny tekst źródłaChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Znajdź pełny tekst źródłaChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Znajdź pełny tekst źródłaThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.
Znajdź pełny tekst źródłaThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. Sweden: 49books, 2023.
Znajdź pełny tekst źródłaCornish, Paul, red. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.
Pełny tekst źródłaBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Pełny tekst źródłaCzęści książek na temat "Cybersecurity Espionage"
Fidler, David P. "Introduction: Cybersecurity and cybersecurity law". W Cyber espionage, 2–10. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch001.
Pełny tekst źródłaFidler, David P. "Conclusion: Cybersecurity law in a divided world". W Cyber espionage, 142–51. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch007.
Pełny tekst źródłaWilliquette, Joel F. "Cybersecurity Concerns in International Business". W Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 59–71. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch004.
Pełny tekst źródłaMingo, Horace C. "The Emerging Cybersecurity Challenges With Artificial Intelligence". W Multisector Insights in Healthcare, Social Sciences, Society, and Technology, 163–85. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3226-9.ch010.
Pełny tekst źródłaMingo, Horace C. "How Emerging Technologies Spawn New Social Engineering Paradigms". W Transformational Interventions for Business, Technology, and Healthcare, 31–44. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1634-4.ch003.
Pełny tekst źródłaLee, Jaeung, Anu Mary Eapen, Md Shamim Akbar i H. Raghav Rao. "An Exploration Regarding Issues in Insider Threat". W Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 1–23. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch001.
Pełny tekst źródłaSaharan, Sameer, Shailja Singh, Ajay Kumar Bhandari i Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse". W Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.
Pełny tekst źródłaEdelman, R. David. "Defining and Studying Cyberattacks". W Rethinking Cyber Warfare, 11–52. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0003.
Pełny tekst źródłaStreszczenia konferencji na temat "Cybersecurity Espionage"
Frost, James. "Dealing with the risk of organizational espionage". W CyberSec '18: Fifth Cybersecurity Symposium. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212687.3212869.
Pełny tekst źródłaPärn, Erika. "Cybersecurity of Digital Twins in the Built Environment". W Construction Blockchain Conference 2021. Design Computation, 2021. http://dx.doi.org/10.47330/cbc.2021.wbnf3640.
Pełny tekst źródłaOnescu, Dragos ionut. "EU AND CYBER SECURITY". W eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.
Pełny tekst źródła