Using social media for global security
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Ētahi atu kaituhi: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Indianapolis, Ind. :
John WIley & Sons,
2013.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- pt. 1. Understanding the influence of social media globally
- pt. 2. Analyzing social media data to solve security problems
- pt. 3. Crowdsourcing intelligence, solutions, and influence
- pt. 4. Broadening your horizon.