Technological Facilitation of Terrorism
暂无分享,去创建一个
JAMES DAVID BALLARD | JOSEPH G. HORNIK | DOUGLAS McKENZIE | J. D. Ballard | Joseph G. Hornik | D. McKenzie
[1] Frederic M. Thrasher,et al. The gang : a study of 1,313 gangs in Chicago. , 1936 .
[2] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[3] John Arquilla,et al. The Zapatista Social Netwar in Mexico , 1999 .
[4] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[5] Gerard Van der Leun,et al. Rules of the Net: On-Line Operating Instructions for Human Beings , 1996 .
[6] Bruce Schneier,et al. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .
[7] B. Hoffman,et al. The RAND-St. Andrews chronology of international terrorism, 1994 , 1995 .
[8] Peter J. Denning,et al. Internet Besieged: Countering Cyberspace Scofflaws , 1997 .
[9] H. Cooper. Terrorism : The Problem of Definition Revisited , 2001 .
[10] R. R. Caldwell,et al. A phantom menace? Cosmological consequences of a dark energy component with super-negative equation of state , 1999, astro-ph/9908168.
[11] P. Currie,et al. Encyclopedia of dinosaurs , 1997 .
[12] Peter Wayner. Disappearing cryptography - being and nothingness on the net , 1996 .
[13] Thomas Beth,et al. Public-Key Cryptography: State of the Art and Future Directions , 1992, Lecture Notes in Computer Science.
[14] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[15] B. Hoffman. Terrorism in the United States during 1985 , 1986 .
[16] Charles H. Shireman. : Punishment and Modern Society: A Study in Social Theory , 1991 .
[17] A. Schmid,et al. Political terrorism: A research guide to concepts, theories, data bases, and literature , 1984, American Political Science Review.
[18] Nobelstiftelsen,et al. Nobel : the man and his prizes , 1950 .
[19] Charles P. Pfleeger,et al. Security in computing , 1988 .
[20] John Arquilla,et al. COUNTERING NEW TERRORISM , 1998 .
[21] Paul Davern,et al. Steganography: Its History and Its Application to Computer Based Data Files , 1995 .
[22] Hideki Imai,et al. Public Key Cryptography , 2004, Lecture Notes in Computer Science.
[23] John Arquilla,et al. The Advent Of Netwar , 1996 .
[24] M Comay,et al. Political terrorism. , 1976, Mental health and society.
[25] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[26] Frank Tannenbaum. Crime and the community , 1938 .
[27] Gilles Brassard,et al. Modern Cryptology: A Tutorial , 1989 .
[28] J. D. Ballard. Terrorism and political policy: Crisis and *policy making indicators in the media during legislative action , 1999 .
[29] R. Crelinsten,et al. A Time of Terror: How Democratic Societies Respond to Revolutionary Violence.@@@Terrorism and Criminal Justice.@@@Repression and Repressive Violence. , 1978 .
[30] B. Werble. Outsiders Studies in the Sociology of Deviance. , 1966 .
[31] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[32] Noam Chomsky,et al. Manufacturing Consent: The Political Economy of the Mass Media , 1988 .
[33] William Warner Fowler. Terrorism Data Bases: A Comparison of Missions, Methods, and Systems, , 1981 .
[34] Jeffrey Pope,et al. State of the art and future directions , 2001 .
[35] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[36] David Garland,et al. Punishment and modern society : a study in social theory , 1991 .
[37] Bruce Hoffman,et al. The Rand‐St Andrews chronology of international terrorist incidents, 1995 , 1996 .
[38] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[39] Walter M. Lioen,et al. Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.
[40] Jonathan R. White,et al. Terrorism: An Introduction , 1990 .
[41] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[42] A. Romer,et al. The dinosaur dictionary , 1972 .
[43] M. Wieviorka. The Making of Terrorism , 1993 .
[44] Larry Scheuermann,et al. Netiquette , 2018, Internet Res..
[45] Jian Zhao,et al. In business today and tomorrow , 1998, CACM.
[46] Ross Anderson,et al. Information Hiding: an Annotated Bibliography , 1999 .