Information warfare

The age of Internet technology has introduced new types of attacks to new assets that did not exist before. Databases that represent information assets are subject to attacks that have malicious intentions, such as stealing sensitive data, deleting records or violating the integrity of the database....

Full description

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: El Sai, Mohamed (author)
Format: article
Published: 2017
Online Access:http://hdl.handle.net/10725/5130
http://dx.doi.org/10.1007/s10115-016-0940-1
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://link.springer.com/article/10.1007/s10115-016-0940-1
Tags: Add Tag
No Tags, Be the first to tag this record!