Setup Menus in Admin Panel

Zdroje

Zdroj: http://www.ijeset.com/media/0002/2N12-IJESET0602134A-v6-iss2-142-153.pdf

Zdroj: https://study.com/academy/lesson/finance-crime-definition-comparisons-examples.html

Zdroj: https://www.avast.com/c-cybercrime

Zdroj: NATO science for peace and security series, 2008

Zdroj: CLARKE, Richard A. Cyber War, HarperCollins (2010) ISBN 9780061962233

Zdroj: CNN, News, 04.08.2004, available at: www.cnn.com/2004/US/08/03/terror.threat/index.html.

For an overview, see: Sieber/Brunst, Cyberterrorism – the use of the Internet for terrorist purposes, Council of Europe Publication, 2007; Gercke, Cyberterrorism, How Terrorists Use the Internet, Computer und Recht, 2007

Zdroj: EU counter-terrorism strategy

Zdroj: https://www.enisa.europa.eu/

Zdroj: https://arxiv.org/pdf/1811.06624.pdf

SEE ALL Add a note
YOU
Add your Comment