|
|
|
|
LEADER |
07465cam a2200805 a 4500 |
001 |
29299 |
003 |
IGIG |
005 |
20100616114528.0 |
006 |
m eo d |
007 |
cr bn||||m|||a |
008 |
061222s2007 paua fob 001 0 eng d |
010 |
# |
# |
|z 2006102336
|
020 |
# |
# |
|a 9781591409922 (ebook)
|
020 |
# |
# |
|z 1591409918 (hardcover)
|
020 |
# |
# |
|z 9781591409915 (hardcover)
|
020 |
# |
# |
|z 9781616927493 (pbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-59140-991-5
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00541070
|
035 |
# |
# |
|a (OCoLC)537782913
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a U163
|b .C946 2007e
|
082 |
0 |
4 |
|a 355.3/43
|2 22
|
245 |
0 |
0 |
|a Cyber warfare and cyber terrorism
|c [edited by] Lech J. Janczewski, Andrew M. Colarik.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2007.
|
300 |
# |
# |
|a electronic texts (xxx, 532 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references (p. 483-527) and index.
|
505 |
0 |
# |
|a 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann --
|
505 |
0 |
# |
|a 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / André Årnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir --
|
505 |
0 |
# |
|a 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / André Årnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / Stéphane Coulondre -- 46. Cyber forensics / Stéphane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on June 5, 2010).
|
650 |
# |
0 |
|a Information warfare.
|
650 |
# |
0 |
|a Computer crimes.
|
653 |
# |
# |
|a Access control models
|
653 |
# |
# |
|a Anti-spam approaches
|
653 |
# |
# |
|a Behavioral information security
|
653 |
# |
# |
|a Bio-cyber machine gun
|
653 |
# |
# |
|a Bouncing techniques
|
653 |
# |
# |
|a Cryptography
|
653 |
# |
# |
|a Cyber forensics
|
653 |
# |
# |
|a Cyber security models
|
653 |
# |
# |
|a Cyber stalking
|
653 |
# |
# |
|a Cyber terrorism attacks
|
653 |
# |
# |
|a Cyber war defense
|
653 |
# |
# |
|a Databases
|
653 |
# |
# |
|a Data mining
|
653 |
# |
# |
|a Deception in cyber attacks
|
653 |
# |
# |
|a Denial-of-service (dos) attacks
|
653 |
# |
# |
|a Economics of cyber security
|
653 |
# |
# |
|a Electronic money management
|
653 |
# |
# |
|a Electronic surveillance and civil rights
|
653 |
# |
# |
|a Information warfare trends
|
653 |
# |
# |
|a Infrastructures of cyber warfare
|
653 |
# |
# |
|a Knowledge management
|
653 |
# |
# |
|a Malware
|
653 |
# |
# |
|a Personnel anomaly detection
|
653 |
# |
# |
|a Social engineering
|
653 |
# |
# |
|a Spam, spim and illegal advertisement
|
653 |
# |
# |
|a SQL code poisoning
|
653 |
# |
# |
|a Steganography
|
653 |
# |
# |
|a Terrorism and the internet
|
700 |
1 |
# |
|a Janczewski, Lech,
|d 1943-
|
700 |
1 |
# |
|a Colarik, Andrew M.
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2006102336
|z 9781591409915
|z 1591409918
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5
|z View fulltext via EzAccess
|