Query Result Set
Skip Navigation Links
   ActiveUsers:850Hits:18486522Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER CRIME (45) answer(s).
 
123Next
SrlItem
1
ID:   137582


Articulation of international laws governing cyber warfare / Gupta, Ashish   Article
Gupta, Ashish Article
0 Rating(s) & 0 Review(s)
        Export Export
2
ID:   150176


Attribution of malicious cyber incidents : from soup to nuts / Lin, Herbert   Journal Article
Lin, Herbert Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
3
ID:   086786


Caught in the web: Brazil continues to be a centre of cybercrime / Day, Michael   Journal Article
Day, Michael Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract With criminals increasingly turning to cybercrime as relatively lowcost, risk-free source of financial gain, Brazil has become established as one of the its main global centres. Although it is difficult to collect reliable statistics, studies and reports published primarily by commercial anti-virus companies indicate that Brazil has been cybercrime centre for more than decade.
Key Words Brazil  Cyber crime  Computer Crime  Cyber 
        Export Export
4
ID:   098085


Changing face of modern conflicts: shaping the Indian response / Davar, Kamaleshwar   Journal Article
Davar, Kamaleshwar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
5
ID:   142454


China's cyber security policy : an organisational assessment / Sharma, M K   Article
Sharma, M K Article
0 Rating(s) & 0 Review(s)
        Export Export
6
ID:   098732


China's electronic and cyber warfare capabilities / Poduval, Sanjay   Journal Article
Poduval, Sanjay Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Key Words Electronic warfare  China  Cyber crime  Cyber Warfare  Cyber War 
        Export Export
7
ID:   110920


Chinese computer games: keeping safe in cyberspace / Segal, Adam   Journal Article
Segal, Adam Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers. Just five months later, the antivirus software company McAfee issued a report claiming that a group of hackers had broken into the networks of 71 governments, companies, and international organizations. These attacks and the many others like them have robbed companies and governments of priceless intellectual property and crucial military secrets. And although officials have until recently been reluctant to name the culprit, most experts agree that the majority of the attacks originated in China.
        Export Export
8
ID:   142347


Cyber attacks via hardware exploitation : an insidious and elusive menace / Gupta, Ashish   Article
Gupta, Ashish Article
0 Rating(s) & 0 Review(s)
Key Words Internet  Cyber crime  Cyber Attack  IC  Hardware Exploitation 
        Export Export
9
ID:   072528


Cyber crimes: detention and prevention / Pandey, Ashish 2006  Book
Pandey, Ashish Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, JBA Publishers, 2006.
Standard Number 8189800205
Key Words Internet  Cyber crime  Computer Crime 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
051393364.168/PAN 051393MainOn ShelfGeneral 
10
ID:   047325


Cyber crimes: notorious asoects of the humans and the net / Barua, Yogesh; Dayal, Denzyl P 2001  Book
Barua, Yogesh Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Dominant Publishers and Distributors, 2001.
Description v.4 (426p.)Hardbound
Standard Number 8178880326
        Export Export
Copies: C:3/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
044881364.168/BAR 044881MainOn ShelfGeneral 
044882364.168/BAR 044882MainOn ShelfGeneral 
044883364.168/BAR 044883MainOn ShelfGeneral 
11
ID:   130357


Cyber defence landscape: a constantly changing and dynamic war fighting environment / Cunningham, Chase   Journal Article
Cunningham, Chase Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The article discusses the developments and innovations in both cyber defence tactics and technologies in the U.S. It tackles the constant changes and dynamic war fighting environment of the country when it comes to cyber threat and exploitation. Moreover, it explores data on the changing landscape of the country's defence industry, the emergence of metadata storage technologies such as NPulse and IOVation, and aspects of cybercrime.
        Export Export
12
ID:   132478


Cyber space: implications for national security / Tiwary, A. K   Journal Article
Tiwary, A. K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Nothing remains, neither the state nor wealth nor valour without the security provided by the armed forces. -- S H Ukraniti Cyber space and the possibility of Cyber war, as it emerged in the late 1980s got mixed up with Information War (IW)/ Electronic War (EW). This led to numerous definitions of lW/EW/cyber war, and most definitions, instead of clarifying the issue, only created further confusion. For the purpose of this paper, the latest definition of cyber space, promulgated in the USA in 2010 being the most comprehensive, has been adopted. It defines cyber space as, "A global domain within the information environment consisting of the inter-dependent network of information technology infrastructure and resident data, including the Internet, tele-communication networks, computer systems and embedded processors and controllers." This indicates that there is a physical domain of hardware, and an information domain of software. How we deal with the information or data resident in this domain to deceive the enemy/cyber criminal becomes part of the third domain-
        Export Export
13
ID:   094636


Cyber space vulnerabilities and challenges: threats to national security dynamics / Sharma, S K   Journal Article
Sharma, S K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
14
ID:   125439


Cyber warfare: China's role ad challenges to the United States / Warikoo, Arun   Journal Article
Warikoo, Arun Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The 21st century is rightly dubbed as an information age. Endless information is readily available made possible by interconnection of billions of computers systems globally over a backbone of networks commonly referred to as the internet the growing reliance on laptops, computer systems, ipads and smart phone to perform most of our tasks has created a parallel world the cyber world.
        Export Export
15
ID:   140094


Cyberattack / Hassan, Nadir   Article
Hassan, Nadir Article
0 Rating(s) & 0 Review(s)
Key Words Cyber crime  Cyberattack  ISP  Cyber Crime Bill 
        Export Export
16
ID:   098529


Defending a new domain: the pentagon's cyberstrategy / Lynn, William F   Journal Article
Lynn, William F Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Key Words Cyber crime  Cyber Warfare  America  US  Cyberstrategy  Pentagon Paper 
        Export Export
17
ID:   125593


Digital diplomacy: working towards a cyber code of conduct / Meyer, Paul   Journal Article
Meyer, Paul Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract As a relatively new domain for potential warfare, cyberspace is increasingly part of the international security agenda. Paul Meyer examines efforts to establish cyber safety rules and outlines the challenges faced in reaching an agreement on them.
        Export Export
18
ID:   103030


E-contract in cyber space: does it realy warrant the acceptance of entores case / Amani, S Z   Journal Article
Amani, S Z Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Cyber crime  Cyber Space  E-contract 
        Export Export
19
ID:   084848


eWMDs / Kelly, John J; Almann, Lauri   Journal Article
Kelly, John J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Key Words Internet  Cyber crime  Cyber Warfare  Cyber Terrorism  E- CCyber Space 
        Export Export
20
ID:   112056


Fighting the quiet WMD-cyber warfare / Oppenheimer, Andy   Journal Article
Oppenheimer, Andy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
123Next