Literatura científica selecionada sobre o tema "Cybersecurity Espionage"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cybersecurity Espionage".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Cybersecurity Espionage"
Alashi, Shahad A., e Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations". Journal of Information Security and Cybercrimes Research 3, n.º 1 (15 de dezembro de 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Texto completo da fonteHimanshu. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n.º 2 (30 de abril de 2024): 18–22. http://dx.doi.org/10.36676/ijl.v2.i2.05.
Texto completo da fonteRahul Khanna. "Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights". Indian Journal of Law 2, n.º 3 (1 de julho de 2024): 15–20. http://dx.doi.org/10.36676/ijl.v2.i3.28.
Texto completo da fonteSusila, Muh, e Andi Salim. "Cyber Espionage Policy and Regulation: A Comparative Analysis of Indonesia and Germany". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 11, n.º 1 (2024): 122–44. http://dx.doi.org/10.22304/pjih.v11n1.a6.
Texto completo da fonteKatzan, Jr., Harry. "Cybersecurity Service Model". Journal of Service Science (JSS) 5, n.º 2 (28 de dezembro de 2012): 71–78. http://dx.doi.org/10.19030/jss.v5i2.7576.
Texto completo da fonteKatzan, Harry. "Contemporary Issues in Cybersecurity". Journal of Cybersecurity Research (JCR) 1, n.º 1 (21 de junho de 2016): 1–6. http://dx.doi.org/10.19030/jcr.v1i1.9745.
Texto completo da fonteCristani, Federica. "Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective". Politics in Central Europe 17, n.º 4 (1 de dezembro de 2021): 697–721. http://dx.doi.org/10.2478/pce-2021-0037.
Texto completo da fonteBeyer, Jessica L. "The Politics of Cybersecurity and the Global Internet". Perspectives on Politics 21, n.º 2 (junho de 2023): 664–68. http://dx.doi.org/10.1017/s1537592723000361.
Texto completo da fontePatiño Orozco, Germán Alejandro. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". México y la Cuenca del Pacífico 8, n.º 24 (1 de setembro de 2019): 141–44. http://dx.doi.org/10.32870/mycp.v8i24.603.
Texto completo da fontePIERȘINARU, Andreea-Maria. "Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, n.º 2 (8 de julho de 2024): 121–41. http://dx.doi.org/10.53477/2284-9378-24-24.
Texto completo da fonteTeses / dissertações sobre o assunto "Cybersecurity Espionage"
Ferguson, Cody J. "Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to Mitigate". Thesis, Monterey, California: Naval Postgraduate School, 2012.
Encontre o texto completo da fonteCyberespionage is a prolific threat that undermines the power projection capacity of the United States through reduced economic prowess and a narrowing of the technical advantage employed by the American military. International attempts to limit hostile cyber activity through the development of institutions, normative patterns of behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense (DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity derived from within the People’s Republic of China.
Livros sobre o assunto "Cybersecurity Espionage"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cyber threats from China, Russia, and Iran: Protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013. Washington: U.S. Government Printing Office, 2013.
Encontre o texto completo da fonteReveron, Derek S., Jon R. Lindsay e Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Encontre o texto completo da fonteReveron, Derek S., Jon R. Lindsay e Tai Ming Cheung. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Encontre o texto completo da fonteChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Encontre o texto completo da fonteChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford University Press, Incorporated, 2015.
Encontre o texto completo da fonteThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.
Encontre o texto completo da fonteThe Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. Sweden: 49books, 2023.
Encontre o texto completo da fonteCornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.
Texto completo da fonteBuchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.
Texto completo da fonteCapítulos de livros sobre o assunto "Cybersecurity Espionage"
Fidler, David P. "Introduction: Cybersecurity and cybersecurity law". In Cyber espionage, 2–10. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch001.
Texto completo da fonteFidler, David P. "Conclusion: Cybersecurity law in a divided world". In Cyber espionage, 142–51. Edward Elgar Publishing, 2022. http://dx.doi.org/10.4337/9781800883352.ch007.
Texto completo da fonteWilliquette, Joel F. "Cybersecurity Concerns in International Business". In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 59–71. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch004.
Texto completo da fonteMingo, Horace C. "The Emerging Cybersecurity Challenges With Artificial Intelligence". In Multisector Insights in Healthcare, Social Sciences, Society, and Technology, 163–85. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-3226-9.ch010.
Texto completo da fonteMingo, Horace C. "How Emerging Technologies Spawn New Social Engineering Paradigms". In Transformational Interventions for Business, Technology, and Healthcare, 31–44. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-1634-4.ch003.
Texto completo da fonteLee, Jaeung, Anu Mary Eapen, Md Shamim Akbar e H. Raghav Rao. "An Exploration Regarding Issues in Insider Threat". In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 1–23. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch001.
Texto completo da fonteSaharan, Sameer, Shailja Singh, Ajay Kumar Bhandari e Bhuvnesh Yadav. "The Future of Cyber-Crimes and Cyber War in the Metaverse". In Advances in Digital Crime, Forensics, and Cyber Terrorism, 126–48. IGI Global, 2023. http://dx.doi.org/10.4018/979-8-3693-0220-0.ch007.
Texto completo da fonteEdelman, R. David. "Defining and Studying Cyberattacks". In Rethinking Cyber Warfare, 11–52. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780197509715.003.0003.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Cybersecurity Espionage"
Frost, James. "Dealing with the risk of organizational espionage". In CyberSec '18: Fifth Cybersecurity Symposium. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3212687.3212869.
Texto completo da fontePärn, Erika. "Cybersecurity of Digital Twins in the Built Environment". In Construction Blockchain Conference 2021. Design Computation, 2021. http://dx.doi.org/10.47330/cbc.2021.wbnf3640.
Texto completo da fonteOnescu, Dragos ionut. "EU AND CYBER SECURITY". In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.
Texto completo da fonte