Srl | Item |
1 |
ID:
137582
|
|
|
2 |
ID:
150176
|
|
|
3 |
ID:
086786
|
|
|
Publication |
2009.
|
Summary/Abstract |
With criminals increasingly turning to cybercrime as relatively lowcost, risk-free source of financial gain, Brazil has become established as one of the its main global centres. Although it is difficult to collect reliable statistics, studies and reports published primarily by commercial anti-virus companies indicate that Brazil has been cybercrime centre for more than decade.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
098085
|
|
|
5 |
ID:
142454
|
|
|
6 |
ID:
098732
|
|
|
7 |
ID:
110920
|
|
|
Publication |
2012.
|
Summary/Abstract |
In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers. Just five months later, the antivirus software company McAfee issued a report claiming that a group of hackers had broken into the networks of 71 governments, companies, and international organizations. These attacks and the many others like them have robbed companies and governments of priceless intellectual property and crucial military secrets. And although officials have until recently been reluctant to name the culprit, most experts agree that the majority of the attacks originated in China.
|
|
|
|
|
|
|
|
|
|
8 |
ID:
142347
|
|
|
9 |
ID:
072528
|
|
|
Publication |
New Delhi, JBA Publishers, 2006.
|
Standard Number |
8189800205
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
051393 | 364.168/PAN 051393 | Main | On Shelf | General | |
|
|
|
|
10 |
ID:
047325
|
|
|
Publication |
New Delhi, Dominant Publishers and Distributors, 2001.
|
Description |
v.4 (426p.)Hardbound
|
Standard Number |
8178880326
|
|
|
|
|
|
|
Copies: C:3/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
044881 | 364.168/BAR 044881 | Main | On Shelf | General | |
044882 | 364.168/BAR 044882 | Main | On Shelf | General | |
044883 | 364.168/BAR 044883 | Main | On Shelf | General | |
|
|
|
|
11 |
ID:
130357
|
|
|
Publication |
2013.
|
Summary/Abstract |
The article discusses the developments and innovations in both cyber defence tactics and technologies in the U.S. It tackles the constant changes and dynamic war fighting environment of the country when it comes to cyber threat and exploitation. Moreover, it explores data on the changing landscape of the country's defence industry, the emergence of metadata storage technologies such as NPulse and IOVation, and aspects of cybercrime.
|
|
|
|
|
|
|
|
|
|
12 |
ID:
132478
|
|
|
Publication |
2014.
|
Summary/Abstract |
Nothing remains, neither the state nor wealth nor valour without the security provided by the armed forces. -- S H Ukraniti
Cyber space and the possibility of Cyber war, as it emerged in the late 1980s got mixed up with Information War (IW)/ Electronic War (EW). This led to numerous definitions of lW/EW/cyber war, and most definitions, instead of clarifying the issue, only created further confusion. For the purpose of this paper, the latest definition of cyber space, promulgated in the USA in 2010 being the most comprehensive, has been adopted. It defines cyber space as, "A global domain within the information environment consisting of the inter-dependent network of information technology infrastructure and resident data, including the Internet, tele-communication networks, computer systems and embedded processors and controllers." This indicates that there is a physical domain of hardware, and an information domain of software. How we deal with the information or data resident in this domain to deceive the enemy/cyber criminal becomes part of the third domain-
|
|
|
|
|
|
|
|
|
|
13 |
ID:
094636
|
|
|
14 |
ID:
125439
|
|
|
Publication |
2013.
|
Summary/Abstract |
The 21st century is rightly dubbed as an information age. Endless information is readily available made possible by interconnection of billions of computers systems globally over a backbone of networks commonly referred to as the internet the growing reliance on laptops, computer systems, ipads and smart phone to perform most of our tasks has created a parallel world the cyber world.
|
|
|
|
|
|
|
|
|
|
15 |
ID:
140094
|
|
|
16 |
ID:
098529
|
|
|
17 |
ID:
125593
|
|
|
Publication |
2013.
|
Summary/Abstract |
As a relatively new domain for potential warfare, cyberspace is increasingly part of the international security agenda. Paul Meyer examines efforts to establish cyber safety rules and outlines the challenges faced in reaching an agreement on them.
|
|
|
|
|
|
|
|
|
|
18 |
ID:
103030
|
|
|
19 |
|
20 |
ID:
112056
|
|
|