Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Terrorismo 334
- Terrorism 301
- Historia 218
- Prevention 129
- History 107
- Política y gobierno 78
- Cuentos de terror 61
- Politics and government 56
- Història 52
- Terrorisme 51
- Cine de terror 46
- National security 46
- Islam 43
- Política 42
- Security measures 42
- Psychological aspects 41
- Political aspects 39
- Social aspects 36
- Violence 36
- Violencia política 36
- Government policy 35
- Political Science 35
- Derecho internacional 34
- War on Terrorism, 2001-2009 34
- Historia y crítica 33
- Guerra 32
- Foreign relations 31
- Aspectos religiosos 30
- Derechos humanos 30
- International relations 30
-
881Publicado 2012Materias:Libro electrónico
-
882Publicado 2012Materias:Libro electrónico
-
883Publicado 2021Tabla de Contenidos: “…Rumor Detection and Tracing its Source to Prevent Cyber-Crimes on Social Media / Ravi Kishore Devarapalli, Anupam Biswas -- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction / Jaiprakash Narain Dwivedi -- Crime Predictive Model Using Big Data Analytics / Hemanta Kumar Bhuyan, Subhendu Kumar Pani -- The Role of Remote Sensing and GIS in Military Strategy to Prevent Terror Attacks / Sushobhan Majumdar -- Text Mining for Secure Cyber Space / Supriya Raheja, Geetika Munjal -- Analyses on Artificial Intelligence Framework to Detect Crime Pattern / R Arshath Raja, N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes / Ebrahim AM Alrahawe, Vikas T Humbe, GN Shinde -- Rule-Based Approach for Botnet Behavior Analysis / Supriya Raheja, Geetika Munjal, Jyoti Jangra, Rakesh Garg -- Securing Biometric Framework with Cryptanalysis / Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, Martin Sagayam -- The Role of Big Data Analysis in Increasing the Crime Prediction and Prevention Rates / Galal A AL-Rummana, Abdulrazzaq H A Al-Ahdal, GN Shinde -- Crime Pattern Detection Using Data Mining / Dipalika Das, Maya Nayak -- Attacks and Security Measures in Wireless Sensor Network / Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, Aditya Khamparia -- Large Sensing Data Flows Using Cryptic Techniques / Hemanta Kumar Bhuyan -- Cyber-Crime Prevention Methodology / Chandra Sekhar Biswal, Subhendu Kumar Pani…”
Libro electrónico -
884
-
885Publicado 2022Materias: “…Terrorism Prevention Periodicals…”
Seriada digital -
886por Akhgar, BabakTabla de Contenidos: “…; The Shape of the Challenge; The Size of the Challenge; The Response; Conclusion; References; Chapter 2: Definitions of Cyber Terrorism; Introduction; The Confusion About Cyber Terrorism; Cyber Terrorism Definition; Has Cyber Terrorism ever Occurred?…”
Publicado 2014
Libro electrónico -
887
-
888
-
889
-
890
-
891
-
892
-
893
-
894
-
895
-
896
-
897
-
898
-
899por Blain, Michael, 1943-2020Tabla de Contenidos: “…Introduction -- Genealogy of terrorism -- Victimage ritual -- The war on terrorism -- The dangers of security…”
Publicado 2012
Libro -
900