Scan barcode

42 pages • first pub 2015 (editions)
ISBN/UID: None
Format: Not specified
Language: English
Publisher: Not specified
Publication date: Not specified
Description
Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known ...
Community Reviews
Content Warnings

42 pages • first pub 2015 (editions)
ISBN/UID: None
Format: Not specified
Language: English
Publisher: Not specified
Publication date: Not specified
Description
Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known ...