|
|
|
|
LEADER |
02982nam a2200481 a 4500 |
001 |
29298 |
003 |
IGIG |
005 |
20100616114525.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
100605s2006 paua fsb 001 0 eng d |
010 |
# |
# |
|z 2005034831
|
020 |
# |
# |
|a 9781599040233 (ebook)
|
020 |
# |
# |
|z 1599040212 (hardcover)
|
020 |
# |
# |
|z 9781599040219 (hardcover)
|
020 |
# |
# |
|z 9781599040233 (pbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-59904-021-9
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00541069
|
035 |
# |
# |
|a (OCoLC)707611555
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a HV6773
|b .C64 2006e
|
082 |
0 |
4 |
|a 363.325
|2 22
|
100 |
1 |
# |
|a Colarik, Andrew M.
|
245 |
1 |
0 |
|a Cyber terrorism
|b political and economic implications /
|c Andrew Michael Colarik.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2006.
|
300 |
# |
# |
|a electronic texts (xvii, 172 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references (p. 163-165) and index.
|
505 |
0 |
# |
|a 1. Introduction -- 2. The power of terrorism -- 3. Cyber terrorism evolution -- 4. Global information infrastructure -- 5. Current cyber attack methods -- 6. Attack scenarios -- 7. Thoughts for the future.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on June 5, 2010).
|
650 |
# |
0 |
|a Cyberterrorism.
|
650 |
# |
0 |
|a Computer crimes.
|
650 |
# |
0 |
|a Information superhighway
|x Economic aspects.
|
650 |
# |
0 |
|a Information warfare
|x Political aspects.
|
650 |
# |
0 |
|a Asymmetric warfare.
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2005034831
|z 9781599040219
|z 1599040212
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-021-9
|z View fulltext via EzAccess
|