|
|
|
|
LEADER |
04088nam a2200589 a 4500 |
001 |
19121 |
003 |
IGIG |
005 |
20121117141621.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
121114s2012 pau fob 000 0 eng d |
010 |
# |
# |
|z 2012004590
|
020 |
# |
# |
|a 9781615208326 (ebook)
|
020 |
# |
# |
|z 9781615208319 (hbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-61520-831-9
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00553971
|
035 |
# |
# |
|a (OCoLC)818587628
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HV6773.15.C97
|b L39 2012e
|
082 |
0 |
4 |
|a 363.325
|2 23
|
245 |
0 |
0 |
|a Law, policy, and technology
|b cyberterrorism, information warfare, and Internet immobilization /
|c Pauline C. Reich and Eduardo Gelbstein, editors.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2012.
|
300 |
# |
# |
|a electronic texts (446 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a The security practitioners' perspective -- Economic, political and social threats in the information age -- Critical information infrastructure and cyber-terrorism -- Attackers: internal and external -- Threats, vulnerability, uncertainty and information risk -- ICT and security governance: doing the right things the right way (and well enough) -- Concerns about what will happen next: should these things keep you awake at night? -- To define or not to define: law and policy conundrums for the cybercrime, national security, international law and military law communities -- Anonymity, actual incidents, cyber attacks and digital immobilization -- Culture clashes: freedom, privacy, and government surveillance issues arising in relation to national security and internet use -- What is cyberterrorism and how real is the threat?: a review of the academic literature, 1996-2009 -- Cyber-search and cyber-seizure: policy considerations of cyber operations and fourth amendment implications -- Terrorism and the internet: do we need an international solution? -- Case study: India - terrorism and terrorist use of the internet/technology -- China's cyber tool: striving to attain electronic shi? -- The United Kingdom's centre for the protection of national infrastructure: an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructures.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed November 15, 2012).
|
650 |
# |
0 |
|a Cyberterrorism.
|
650 |
# |
0 |
|a Computer crimes.
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Cyberspace.
|
650 |
# |
0 |
|a Data protection.
|
653 |
# |
# |
|a Critical information infrastructure
|
653 |
# |
# |
|a Cyber attacks
|
653 |
# |
# |
|a Cyber-deterrence
|
653 |
# |
# |
|a Cyber-search and cyber-seizure
|
653 |
# |
# |
|a Cyberterrorism
|
653 |
# |
# |
|a Economic, political and social threats in the information age
|
653 |
# |
# |
|a ICT and security governance
|
653 |
# |
# |
|a Law and policy perspective
|
653 |
# |
# |
|a Policy considerations of cyber operations
|
653 |
# |
# |
|a Threats, vulnerability, uncertainty and information risk
|
700 |
1 |
# |
|a Gelbstein, Eduardo.
|
700 |
1 |
# |
|a Reich, Pauline C.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2012004590
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2012004590
|z 9781615208319
|z 1615208313
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-831-9
|3 Chapter PDFs via platform:
|