1
Stoddart, Kristan
2022
Table of Contents:
“... and legacy systems -- Chapter 4 - Hacking the human -- Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers -- Conclusion. ....”2022
Full text
2
3
Wang, G. Alan.
2013
Table of Contents:
“...Information sharing and data/text mining -- Terrorism informatics -- Network-based data analytics.-Â Information access and security....”2013
Full text
4
Table of Contents:
“...-sharing policy of the world meterological organization: the case for international sharing of scientific data -- Discussion of part two by symposium participants -- Developing the rice genome in China -- Data sharing in astronomy -- Sharing engineering data...”
Full text
Full text
5
6
7
Table of Contents:
“..., Including Terrorism -- The Turkish Catastrophe Insurance Pool TCIP and Compulsory Earthquake Insurance Scheme -- Natural Disasters and Disaster Relief Policy in China -- Disaster Management in India -- Management of Extraordinary Risks Including Terrorism...”
Full text
Full text