CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
WAR AND DEFENSE IN VIRTUAL SPACE 期刊论文
Annals: Series on Military Sciences, 2018, 卷号: Vol.10 No.1, 页码: 50-62
作者:  GheorgheBOARU
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/24
Investigation Procedures in Terrorist Electronic Crimes and it’s Challenges: A study in the Saudi legal system 期刊论文
Arab Journal of Forensic Sciences & Forensic Medicine, 2015, 卷号: Vol.1 No.1
作者:  NehadFaroukAbbasMohamed
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
IMPORTANCE AND SIGNIFICANCE OF INFORMATION SHARING IN TERRORISM FIELD. 期刊论文
Science International, 2014, 卷号: Vol.26 No.5, 页码: 1719-1725
作者:  Shibghatullah,AbdulSamad;  Yusof,Robiah;  Alaameri,Alaa;  Abaas,Thamer
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion 期刊论文
Information Systems Education Journal, 2010, 卷号: Vol.8 No.52
作者:  Peslak,AlanR.
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
Terrorism. 期刊论文
College and Research Libraries News, 2008, 卷号: Vol.69 No.6, 页码: 325-328
作者:  Collins,Kay
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/13
Revealed -- untried technology and huge cost of web surveillance plans. 期刊论文
Computer Weekly, 2008, 页码: 10
作者:  Jennings,Cath
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/13
Cyber warfare and cyber terrorism [electronic resource] 专著
:Information Science Reference, 2008
作者:  [editedby]LechJ.Janczewski,AndrewM.Colarik
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/13
Real time big data analytics for predicting terrorist incidents 会议论文
Waltham, MA, USA 【关键词】, 2016
作者:  IbrahimToure;  AryyaGangopadhyay
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
Interactive data analysis with nSpace2® 会议论文
2011
作者:  Sheffield,David;  Canfield,CaseyM.
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/04


©版权所有 ©2017 CSpace - Powered by CSpace