Book details
Information Warfare and Security
Dorothy Elizabeth Robling Denning
No ratings yet
Buy the book
A single link, no noise.
Overview
What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary. You will find in this book: A comprehensive and coherent treatment of offensive and defensive information warfare, identifying the key actors, targets, methods, technologies, outcomes, policies, and laws; A theory of information warfare that explains and integrates within a single framework operations involving diverse actors and media; An accurate picture of the threats, illuminated by actual incidents; A description of information warfare technologies and their limitations, particularly the limitations of defensive technologies. Whatever your interest or role in the emerging field of information warfare, this book will give you the background you need to make informed judgments about potential threats and our defenses against them. 0201433036B04062001
Details
- Publisher
- ACM Press
- Published
- 1999
- Pages
- 522
- Language
- EN
- Categories
- Computers / Database Administration & Management, Computers / Security / Network Security, Computers / Networking / Vendor Specific, Computers / Security / General, Political Science / Security (National & International), Technology & Engineering / Military Science
- ISBN-13
- 9780201433036
Similar books
Based on category and author.
Mastering Blockchain
Imran Bashir
Learning SQL
Alan Beaulieu
Data Modeling Essentials
Graeme Simsion, Graham Witt
Concrete Abstractions
Max Hailperin, Barbara Kaiser, Karl Knight
Building a Scalable Data Warehouse with Data Vault 2.0
Daniel Linstedt, Michael Olschimke
A Mathematical Introduction to Logic
Herbert B. Enderton
Knowledge Based Systems for Engineers and Scientists
Adrian A. Hopgood
No ratings yet
Global Sourcebook of Address Data Management
Graham R. Rhind
No ratings yet
Cyberethics
Richard A. Spinello
No ratings yet
Modeling Count Data
Joseph M. Hilbe
No ratings yet
Random Curves
Neal Koblitz
No ratings yet