EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer networks Security measures"
Narrow search

Narrow search

Year of publication
Subject
All
Computer networks--Security measures. 3 Computer networks Security measures 2 Computersicherheit 2 Botnets 1 Business enterprises--Computer networks--Security measures. 1 Business--Data processing--Security measures. 1 Cloud Computing 1 Cloud computing. 1 Commercial crimes 1 Computer crimes 1 Computer crimes. 1 Computer networks--Access control. 1 DDoS 1 Datenverarbeitung 1 Diffusion of innovations 1 Emulation 1 Information security 1 Information society--Political aspects. 1 Information technology--Social aspects. 1 Information warfare--Political aspects. 1 Informationstechnik 1 Innovation 1 Internet and terrorism. 1 Klein- und Mittelbetrieb 1 Knowledge management. 1 Malware (Computer software) 1 Management information systems. 1 Network security 1 Rechnernetz 1 Risk management. 1 Security 1 Simulation 1 Simulators 1 Social media. 1 Social networks. 1 Spam 1 Technological innovations 1 War and society. 1
more ... less ...
Online availability
All
Free 2
Type of publication
All
Book / Working Paper 6
Type of publication (narrower categories)
All
Thesis 2
Language
All
English 4 Undetermined 2
Author
All
Carafano, James Jay 1 Halpert, Ben 1 Lee, Christopher Patrick 1 Nault, Charles L. 1 Ransbotham, Samuel B. 1 Scherling, Mark 1
Published in...
All
Wiley corporate F & A 1
Source
All
USB Cologne (EcoSocSci) 4 BASE 2
Showing 1 - 6 of 6
Cover Image
Framework for botnet emulation and analysis
Lee, Christopher Patrick - 2009
Criminals use the anonymity and pervasiveness of the Internet to commit fraud, extortion, and theft. Botnets are used as the primary tool for this criminal activity. Botnets allow criminals to accumulate and covertly control multiple Internet-connected computers. They use this network of...
Persistent link: https://www.econbiz.de/10009476126
Saved in:
Cover Image
Acquisition and diffusion of technology innovation
Ransbotham, Samuel B. - 2008
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive...
Persistent link: https://www.econbiz.de/10009476042
Saved in:
Cover Image
Wiki at war : conflict in a socially networked world
Carafano, James Jay - 2012 - 1. ed.
Persistent link: https://www.econbiz.de/10009677440
Saved in:
Cover Image
Practical risk management for the CIO
Scherling, Mark - 2011
Persistent link: https://www.econbiz.de/10009172979
Saved in:
Cover Image
Auditing cloud computing : a security and privacy guide
Halpert, Ben - 2011
Persistent link: https://www.econbiz.de/10009345675
Saved in:
Cover Image
Risk free technology : how small to medium businesses can stem huge losses from poorly performing IT systems
Nault, Charles L. - 2009
Persistent link: https://www.econbiz.de/10004941474
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...