Notifications can be turned off anytime from settings.
Item(s) Added To cart
Qty.
Something went wrong. Please refresh the page and try again.
Something went wrong. Please refresh the page and try again.
Exchange offer not applicable. New product price is lower than exchange product price
Please check the updated No Cost EMI details on the payment page
Exchange offer is not applicable with this product
Exchange Offer cannot be clubbed with Bajaj Finserv for this product
Product price & seller has been updated as per Bajaj Finserv EMI option
Please apply exchange offer again
Your item has been added to Shortlist.
View AllYour Item has been added to Shopping List
View All
No Cost EMI of Zero Emi Vendor applied on the product
You selected EMI of for monthsChangeGenerally delivered in 6 - 10 days
Item is available at . Change
You will be notified when this product will be in stock
|
Directly after 9/11, much was made of the possibilities of a large-scale cyber-terrorism attack by the media. However, several academics in the pending years published papers focusing on the terrorist groups utilize the Internet as it was designed to be; a means to communicate and collaborate, therefore the terrorists have stronger reasons to keep it up and online. Hence the apparently impending large scale cyber-terrorist attack that would cripple the internet has not materialised although Al Qaeda has taken full advantage of this fear. Cyber terrorism is typically defined as the use of the Internet as a vehicle through which to launch an attack. Terrorists could conceivably hack into electrical grids and security systems, or perhaps distribute a powerful computer virus. Al-Qaeda operatives are known to have taken training in hacking techniques, Arquilla says, but the likelihood of such a cyber attack seems fairly remote. The purpose of armed forces is to break the will of an organized opponent by violent force. Who will prevail depends to some extent on comparative recklessness. Thus, war and the preparations for it do not only go beyond civilized behaviour, but carry an inherent tendency to transcend all other rules, including the ones applying to armed conflict. The book will serve as an ultimate resource book for everyone who would like to know the wide range of prospects in the emerging applications of cyber terrorism and military.
About the author
Dr. Kapender Singh (born 1973) is presently Associate Professor in the Department of Defence Studies, C.R.M. Jat College, Hisar (Haryana). He earned his Masters degree with Gold Medal from Department of Defense & Strategic Studies, Maharshi Dayanad University, Rohtak and Ph.D. from C.C.S. University, Meerut (U.P.) in 2006 on topic Indo-U.S. Relations after the Cold War Dr. Singh is the member of various academic bodies viz. National Congress for Defense Studies, Allahabad, India Social Science Congress, Allahabad, Advance Research Institute for Defense and Security Studies, Meerut, Indian Council of World Affairs (ICWA), New Delhi. About 20 Research Papers has been published in reputed journals and edited books in his credit.In His Credit Two Edited Books Were Also Published Reseacrh Journal Sponsered By ICSSR-Suraksha Chintan. He also participated and presented research paper in various International and National Seminars, conferences and workshops. He has done Special Course in Human Rights from the Department of Gandhian University Punjab University, Chandigarh.He is Also Associated To Officer of N.S.S. and attended National and State Level Camps for which got Certificate of Appriciation from Kurukshetra University, Kurukshetra . Till now he organized 12 Blood Donation Camps including 4 Mega Blood Donation Camps for which he got Certificate of Appreciation form Mission Jan Jagriti Blood Bank New Delhi. He himself has donated blood for more than 25 times.
The images represent actual product though color of the image and product may slightly differ.
Cyber Threat In Global Perspective
Rs. 718
Register now to get updates on promotions and
coupons. Or Download App