As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The increasing number of Information Security related incidents, organized crimes, intelligent threats deserves much closer attention. It is important to bear in mind that effective security cannot be achieved by relying on technology alone. A tight coordination is required between the people and technology to achieve effective security. Tracking the effects of the Network Society and the Information Revolution on the intelligence agencies of highly developed states will hope to solve the problems of organized crime, intelligent, and terrorist threats. Of course, the analysis of intelligence activities is clearly vital. This study will discuss information security, cryptography, cyber-attacks and cyber threats. Also, study will describe types and forms of intelligence.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.