Limit search to available items
995 results found. Sorted by relevance | date | title .
Book Cover
E-book

Title Handbook of information security Volume 2, Information warfare ; social, legal, and international issues ; and security foundations / Hossein Bidgoli, editor-in-chief
Published Hoboken, N.J. : John Wiley, ©2006

Copies

Description 1 online resource (xxvii, 978 pages) : illustrations
Contents Cover -- Contents -- Contributors -- Preface -- Guide to The Handbook of Information Security Guide to The Handbook of Information Security -- PART 1: Information Warfare -- Cybercrime and the U.S. Criminal Justice System -- INTRODUCTION -- DIFFERENCES FROM CIVIL JUSTICE SYSTEM -- BASIC INSTITUTIONAL STRUCTURE -- RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS -- CRIMINAL JUSTICE SYSTEM AND CYBERCRIME -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Cyberterrorism and Information Security -- INTRODUCTION -- DEFINING CYBERTERRORISM -- HOW CYBERTERRORISM OCCURS -- SPONSORS AND SUPPORT -- CONTROLLING CYBERTERRORISM -- WHO WILL WIN THE BATTLE OF CYBERTERRORISM? -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Online Stalking -- WHAT IS ONLINE STALKING? -- HOW MUCH OF A PROBLEM IS ONLINE STALKING? -- WHAT CAN YOU DO IF YOU ARE A VICTIM? -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Electronic Attacks -- INTRODUCTION -- RECONNAISSANCE PHASE -- ATTACK PHASE -- DETECTION AVOIDANCE PHASE -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Wireless Information Warfare -- INTRODUCTION -- DEFINITION OF WIRELESS INFORMATION WARFARE -- TAXONOMIES OF INFORMATION WARFARE -- TAXONOMIES OF WIRELESS NETWORKS -- UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE -- SECURE COMMUNICATIONS SYSTEM DESIGN -- OFFENSIVE INFORMATION OPERATIONS -- DEFENSIVE INFORMATION OPERATIONS -- WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL -- EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING) -- EXAMPLE DEFENSE: METHODS OF DEFENSE -- CONCLUSIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Computer Network Operations (CNO) -- INTRODUCTION -- NETWORK DEFENSE AND NETWORK ATTACK -- A MODEL OF COMPUTER NETWORK ATTACK -- TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE -- SURVIVABILITY -- DECEPTION -- DECEPTION TAXONOMY -- STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS -- IMPLEMENTING COMPUTER NETWORK OPERATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Electronic Protection -- INTRODUCTION -- ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY -- REDUCING THE THREAT OF ELECTRONIC EMANATIONS -- PROTECTING AGAINST OFFENSIVE SIGNALS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Information Assurance -- INTRODUCTION -- OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIES -- INTRUSION MASKING TECHNOLOGIES -- DEFENSE IN DEPTH TECHNOLOGIES -- CONCLUSION -- ACKNOWLEDGMENT -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- PART 2: Social and Legal Issues -- The Legal Implications of Information Security: Regulatory Compliance and Liability -- INTRODUCTION -- WHAT IS AT RISK? -- STATUTORY AND REGULATORY COMPLIANCE -- CONTRACTUAL LIABILITY -- TORT LIABILITY -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES
Summary The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare
Bibliography Includes bibliographical references and indexes
Notes Print version record
Subject Computer networks -- Security measures.
Home computer networks.
Computer networks -- Security measures
Home computer networks
Form Electronic book
Author Bidgoli, Hossein
LC no. 2005006851
ISBN 1280409398
9781280409394