Linked e-resources

Details

Introduction
Chapter 1: On Cyberwar: Theorizing cyberwarfare through attacks on critical infrastructure Reality, potential and debates
Chapter 2: Cyberwar: Attacking Critical Infrastructure
Chapter 3: Gaining Access: Attack and defense methods and legacy systems
Chapter 4 Hacking the human
Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers
Conclusion. .

Browse Subjects

Show more subjects...

Statistics

from
to
Export