Srl | Item |
1 |
ID:
055534
|
|
|
2 |
ID:
054174
|
|
|
3 |
ID:
166289
|
|
|
Publication |
Washington, D C, Brookings Institution Press, 2018.
|
Description |
xiii, 424p.pbk
|
Standard Number |
9780815735472
|
|
|
|
|
|
|
Copies: C:1/I:1,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location | IssuedTo | DueOn |
059656 | 355.0305/LIN 059656 | Main | Issued | General | | RF076 | 17-Jun-2023 |
|
|
|
|
4 |
ID:
133050
|
|
|
Publication |
2014.
|
Summary/Abstract |
There should be no distinction between a good and a bad terrorist which is what some countries are trying to do. The scourge will consume all unless it is ruthlessly eliminated. Countries sponsoring terrorism might realise that it is like riding a tiger that, one day, they might tall prey to. The biggest worry at these countries which have sulterecl at the hands at terrorists is that Weapons of Mass Destruction may fall into the hands at the terrorists and that catastrophic consequences would tollowi A worldwide integrated approach to tackling terrorism is, therefore, a must.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
153168
|
|
|
Publication |
New Delhi, KW Publishers Pvt Ltd, 2017.
|
Description |
xxii, 262p.hbk
|
Standard Number |
9789386288578
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
059078 | 363.325/DIL 059078 | Main | On Shelf | General | |
|
|
|
|
6 |
ID:
057243
|
|
|
7 |
ID:
055245
|
|
|
8 |
ID:
133607
|
|
|
Publication |
2014.
|
Summary/Abstract |
Cyber terrorism is a phenomenon that is gaining more and more attention. One reason for this is the concern that modern information and communications technology may be used in order to harm open societies. This concern also involves actual IT systems and the information generated being targets of advanced attacks. That way functions that are important to society could be affected. The term 'cyber terrorism' is complex. This article describes the difference between traditional and cyber terrorism. The main focus is on how the al-Qaeda terrorist network acts in cyberspace and how their change in concentration and activities has made them a clever player in an electronic Jihad.
|
|
|
|
|
|
|
|
|
|
9 |
ID:
023711
|
|
|
Publication |
Jan-March 2003.
|
Description |
69-80
|
|
|
|
|
|
|
|
|
|
10 |
ID:
133609
|
|
|
Publication |
2014.
|
Summary/Abstract |
In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security-in particular Chinese cyber espionage-was the defining issue of this unusual summit. For the US, the meeting between the two presidents was the culmination of a long campaign to pressure Beijing to reduce the scope and scale of Chinese cyber attacks on the United States.
|
|
|
|
|
|
|
|
|
|
11 |
ID:
141532
|
|
|
Publication |
New Delhi, Satyam Law International, 2013.
|
Description |
ix, 246p.: ill.pbk
|
Standard Number |
9789382823001
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
058334 | 355.033002854678/REV 058334 | Main | On Shelf | General | |
|
|
|
|
12 |
ID:
068474
|
|
|
13 |
ID:
118119
|
|
|
14 |
ID:
124104
|
|
|
Publication |
2012.
|
Summary/Abstract |
The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense against a sophisticated and constantly morphing offense. Comments on cyberspace having no boundaries and changing constantly and the need to formulate active defense are also included.
|
|
|
|
|
|
|
|
|
|
15 |
ID:
128750
|
|
|
16 |
ID:
138669
|
|
|
17 |
|
18 |
ID:
174826
|
|
|
Summary/Abstract |
Why has India developed into one of the world’s top targets and sources of cyber attacks despite possessing a strategic edge in information and communications technology (ICT)? India has one of the most competitive ICT industries and workforces, largest global sourcing and fastest growing e-commerce markets, and second largest and fastest growing internet user base, and is a leader in using ICT to provide governance services, yet its economic and political information infrastructures have been disproportionality affected by cyber attacks. This article traces the evolution of cyber threats to India’s national security and identifies drivers of the national and international policies the Indian state has adopted to address these threats in the past two decades. It finds evidence for a growing gap between the ideation and implementation of cyber security legislation and policy, which is rooted in the political constraints inherent in India’s state capacity-building efforts, reluctance to engage in multistakeholder coordination, and struggles to yield gains from its hedging diplomacy in global cyber security negotiations. For the Security Studies scholarship on the sources of cyber insecurity, these findings highlight the need to further study the links between different types of cyber capacity, state structure and political systems as well as the specific conditions under which quickly digitizing democracies can effectively translate their ICT capacities and regulations into greater cyber resilience.
|
|
|
|
|
|
|
|
|
|
19 |
ID:
110120
|
|
|
20 |
ID:
125249
|
|
|
Publication |
2013.
|
Summary/Abstract |
the national cyber security system (NCSS) of South Korea came under criticism when North Korean cyber terrorist attacked the office computers and servers of major south Korean broadcasting and financial companies on March 20, 2013. The NCSS had evolved up to that time by addressing problems, that arose from incidents dating to the January 25, 2003, internet crisis, the March 4, 2011 distributed denial of service (DDoS) crisis, and other event occurring between those attacks. The above 2013 cyber terrorism incident magnified the limits of NCSS leadership, expertise and collaborative systems, while revealing that past reform were nothing more than stopgap measures.
|
|
|
|
|
|
|
|
|
|