verdict 发表于 2025-3-25 07:21:57

http://reply.papertrans.cn/47/4657/465698/465698_21.png

娘娘腔 发表于 2025-3-25 10:58:49

http://reply.papertrans.cn/47/4657/465698/465698_22.png

interior 发表于 2025-3-25 13:42:45

Darknets as Tools for Cyber Warfare this chapter, we explain the technology behind ., a widely used Darknet client, provide an overview of common Darknet phenomena and discuss them in context of cyber warfare. Finally, we analyse these discourses within the framework of critical securitisation studies.

dysphagia 发表于 2025-3-25 17:15:08

http://reply.papertrans.cn/47/4657/465698/465698_24.png

广口瓶 发表于 2025-3-25 21:43:42

http://reply.papertrans.cn/47/4657/465698/465698_25.png

束以马具 发表于 2025-3-26 00:40:36

https://doi.org/10.1007/978-3-658-25652-4Stuxnet; Wannacry; Cyberspace; Information security; NotPetya; Cyber warfare; Information Warfare; Christia

CLAIM 发表于 2025-3-26 07:33:18

Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2019

grudging 发表于 2025-3-26 08:35:36

http://reply.papertrans.cn/47/4657/465698/465698_28.png

LIMN 发表于 2025-3-26 12:45:48

http://reply.papertrans.cn/47/4657/465698/465698_29.png

conformity 发表于 2025-3-26 17:59:44

http://reply.papertrans.cn/47/4657/465698/465698_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Technology for Peace and Security; IT Applications and Christian Reuter Textbook 20191st edition Springer Fachmedien Wiesbaden