Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare: The Constitution and Cyberspace
(eVideo)
Description
Also in this Series
More Details
Citations
(2013). Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare: The Constitution and Cyberspace . The Great Courses.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2013. Thinking About Cybersecurity: From Cyber Crime to Cyber Warfare: The Constitution and Cyberspace. The Great Courses.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Thinking About Cybersecurity: From Cyber Crime to Cyber Warfare: The Constitution and Cyberspace The Great Courses, 2013.
MLA Citation, 9th Edition (style guide)Thinking About Cybersecurity: From Cyber Crime to Cyber Warfare: The Constitution and Cyberspace The Great Courses, 2013.
Staff View
Grouping Information
Grouped Work ID | 48a07bfa-50a5-df9e-d1b4-688ff19a8c44-eng |
---|---|
Full title | thinking about cybersecurity from cyber crime to cyber warfare the constitution and cyberspace |
Author | the great courses |
Grouping Category | movie |
Last Update | 2024-05-14 22:40:34PM |
Last Indexed | 2024-05-20 23:25:40PM |
Book Cover Information
Image Source | hoopla |
---|---|
First Loaded | Sep 23, 2023 |
Last Used | Sep 23, 2023 |
Hoopla Extract Information
stdClass Object ( [year] => 2013 [fiction] => [coverImageUrl] => https://cover.hoopladigital.com/grc_9523011_270.jpeg [titleId] => 11528135 [isbn] => [rating] => TVPG [abridged] => [episode] => 11 [language] => ENGLISH [profanity] => [title] => The Constitution and Cyberspace [titleTitle] => Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare [demo] => [segments] => Array ( ) [duration] => 30m 0s [children] => [artists] => Array ( ) [genres] => Array ( [0] => Educational ) [price] => 1.49 [season] => 0 [id] => 11528139 [edited] => [kind] => TELEVISION [active] => 1 [upc] => [synopsis] => Return to American policies on cybersecurity, this time focusing on the idea of government monitoring of the Internet. Start by learning all about how on-network monitoring systems work. After that, step back and examine how government monitoring is enforced and limited-but not prohibited-by the Constitution. [url] => https://www.hoopladigital.com/title/11528135 [pa] => [series] => Great Courses [publisher] => The Great Courses [purchaseModel] => INSTANT )