Details
Topical Term
Cyber intelligence (Computer security)
Use for
Cyber spying
Cyberintelligence (Computer security)
Cyberspying
Intelligence, Cyber (Computer security)
Cyberintelligence (Computer security)
Cyberspying
Intelligence, Cyber (Computer security)
Broader Term
Note
Electronic intelligence.
Related resource
Work cat.: "Cyber intelligence: setting the landscape for an emerging discipline" (INSA Cyber Intelligence White Paper), 2011.
Cyber intelligence resources: a report, ver. Feb. 2012, viewed online, Mar. 28, 2012 (Cyber intelligence is the tracking, analyzing, and countering of digital security threats)
Google search, Mar. 28, 2012 ("Cyber intelligence" = 1,490,000 results; "Cyberintelligence" = 34,600 results; "Cyber spying" = 630,000 results; "Cyberspying" = 138,000 results)
Cyber intelligence resources: a report, ver. Feb. 2012, viewed online, Mar. 28, 2012 (Cyber intelligence is the tracking, analyzing, and countering of digital security threats)
Google search, Mar. 28, 2012 ("Cyber intelligence" = 1,490,000 results; "Cyberintelligence" = 34,600 results; "Cyber spying" = 630,000 results; "Cyberspying" = 138,000 results)
Note
Here are entered works on tracking, analyzing, and countering digital security threats. Works on the collection and processing, for subsequent intelligence purposes, of information derived primarily from electronic signals that do not contain speech or text are entered under
Link to search
Record appears in
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |