skip to content
Cyber warfare and cyber terrorism Preview this item
ClosePreview this item
Checking...

Cyber warfare and cyber terrorism

Author: Lech Janczewski; Andrew M Colarik
Publisher: Hershey : Information Science Reference, [2008] ©2008
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Cyber warfare and cyber terrorism.
Hershey : Information Science Reference, ©2008
(DLC) 2006102336
(OCoLC)77520608
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Lech Janczewski; Andrew M Colarik
ISBN: 9781591409922 1591409926 9781591409915 1591409918 1280919329 9781280919329
OCLC Number: 166150898
Language Note: Text in English.
Description: 1 online resource (xxx, 564 pages) : illustrations
Contents: Introductory chapter / Andrew M. Colarik and Lech J. Janczewski --
Section 1. Terms, concepts, and definitions --
Cyber terrorism attacks / Kevin Curran, Kevin Concannon, and Sean McKeever --
Knowledge management, terrorism, and cyber terrorism / Gil Ariely --
Ten information warfare trends / Kenneth J. Knapp and William R. Boulton --
Bits and bytes vs. bullets and bombs : a new form of warfare / John H. Nugent and Mahesh Raisinghani --
Infrastructures of cyber warfare / Robert S. Owen --
Terrorism and the Internet / M.J. Warren --
Steganography / Merrill Warkentin, Mark B. Schmidt, and Ernst Bekkering --
Cryptography / Kevin Curran, Niall Smyth, and Bryan McGrory --
A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, and Ibrahim Al Kattan --
Section 2. Dynamic aspects of cyber warfare and cyber terrorism --
An introduction to key themes in the economics of cyber security / Neil Gandal --
Role of FS-ISAC in countering cyber terrorism / Manish Gupta and H.R. Rao --
Deception in cyber attacks / Neil C. Rowe and E. John Custy --
Deception in defense of computer systems from cyber attack / Neil C. Rowe --
Ethics of cyber war attacks / Neil C. Rowe --
International outsourcing, personal data, and cyber terrorism : approaches for oversight / Kirk St. Amant --
Network-based passive information gathering / Romuald Thion --
Electronic money management in modern online business / Theodoros Tzouramanis --
The analysis of money laundering techniques / Krzysztof Woda --
Spam, spin, and illegal advertisement / Dionysios V. Politis and Konstantinos P. Theodoridis --
Malware : specialized Trojan horse / Stefan Kiltz, Andreas Lang, and Jana Dittmann --
SQL code poisoning : the most prevalent technique for attacking web powered databases / Theodoros Tzouramanis --
Section 3. Human aspects of cyber warfare and cyber terrorism --
Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meena, and Ciaran Heaney --
Social engineering / B. Bhagyavati --
Social engineering / Michael Aiello --
Behavioral information security / Isabelle J. Fagnot --
Toward a deeper understanding of personnel anomaly detection / Shuyuan Mary Ho --
Cyber stalking : a challenge for web security / Alok Mishra and Deepti Mishra --
Section 4. Technical aspects of handling cyber attacks --
Cyber security models / Norman F. Schneidewind --
Cyber war defense : systems development with integrated security / Murray E. Jennex --
Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, and Joon S. Park --
Denial-of-service (DoS) attacks : prevention, intrusion detection, and mitigation / Georg Disterer, Ame Alles, and Axel Hervatin --
Large-scale monitoring of critical digital infrastructures / André Årnes --
Public key infrastructures as a means for increasing network security / Ioannis P. Chochliouros [and others] --
Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark R. Leipnik --
Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong and Mark R. Leipnik --
Section 5. Identification, authorization, and access control --
Hacking and eavesdropping / Kevin Curran [and others] --
Access control models / Romuald Thion --
An overview of IDS using anomaly detection / Lior Rokach and Yuval Elovici --
Bio-cyber machine gun : a new mode of authentication access using visual evoked potentials / Andrews Samraj --
Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna and Richard Chbeir --
Data mining / Mark Last --
Identification and localization of digital addresses on the Internet / André Ånes --
Identification through data mining / Diego Liberati --
Section 6. Business continuity --
A model for emergency response systems / Murray E. Jennex --
Bouncing techniques / Stéphane Coulondre --
Cyber forensics / Stéphane Coulondre --
Software component survivability in information warfare / Joon S. Park and Joseph Giordano --
Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, and Jana Dittmann --
Section 7. Cyber warfare and cyber terrorism : national and international responses --
Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism : the European response / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Stergios P. Chochliouros --
EU tackles cybercrime / Sylvia Mercado Kierkegaard --
The U.S. military response to cyber warfare / Richard J. Kilroy, Jr. --
USA's view on world cyber security issues / Norman Schneidewind --
ECHELON and the NSA / D.C. Webb --
International Cybercrime Convention / Sylvia Mercado-Kierkegaard.
Responsibility: [edited by] Lech J. Janczewski, Andrew M. Colarik.
More information:

Abstract:

Provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. This work presents a discussion on primary target  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (7)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/166150898> # Cyber warfare and cyber terrorism
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "166150898" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/pau> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1110336386#Topic/history_military_biological_&_chemical_warfare> ; # HISTORY--Military--Biological & Chemical Warfare
    schema:about <http://id.worldcat.org/fast/973186> ; # Information warfare
    schema:about <http://id.worldcat.org/fast/872063> ; # Computer crimes
    schema:about <http://dewey.info/class/355.343/e22/> ;
    schema:bookFormat schema:EBook ;
    schema:datePublished "2008" ;
    schema:description "Introductory chapter / Andrew M. Colarik and Lech J. Janczewski -- Section 1. Terms, concepts, and definitions -- Cyber terrorism attacks / Kevin Curran, Kevin Concannon, and Sean McKeever -- Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- Ten information warfare trends / Kenneth J. Knapp and William R. Boulton -- Bits and bytes vs. bullets and bombs : a new form of warfare / John H. Nugent and Mahesh Raisinghani -- Infrastructures of cyber warfare / Robert S. Owen -- Terrorism and the Internet / M.J. Warren -- Steganography / Merrill Warkentin, Mark B. Schmidt, and Ernst Bekkering -- Cryptography / Kevin Curran, Niall Smyth, and Bryan McGrory -- A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, and Ibrahim Al Kattan -- Section 2. Dynamic aspects of cyber warfare and cyber terrorism -- An introduction to key themes in the economics of cyber security / Neil Gandal -- Role of FS-ISAC in countering cyber terrorism / Manish Gupta and H.R. Rao -- Deception in cyber attacks / Neil C. Rowe and E. John Custy -- Deception in defense of computer systems from cyber attack / Neil C. Rowe -- Ethics of cyber war attacks / Neil C. Rowe -- International outsourcing, personal data, and cyber terrorism : approaches for oversight / Kirk St. Amant -- Network-based passive information gathering / Romuald Thion -- Electronic money management in modern online business / Theodoros Tzouramanis -- The analysis of money laundering techniques / Krzysztof Woda -- Spam, spin, and illegal advertisement / Dionysios V. Politis and Konstantinos P. Theodoridis -- Malware : specialized Trojan horse / Stefan Kiltz, Andreas Lang, and Jana Dittmann -- SQL code poisoning : the most prevalent technique for attacking web powered databases / Theodoros Tzouramanis -- Section 3. Human aspects of cyber warfare and cyber terrorism -- Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meena, and Ciaran Heaney -- Social engineering / B. Bhagyavati -- Social engineering / Michael Aiello -- Behavioral information security / Isabelle J. Fagnot -- Toward a deeper understanding of personnel anomaly detection / Shuyuan Mary Ho -- Cyber stalking : a challenge for web security / Alok Mishra and Deepti Mishra -- Section 4. Technical aspects of handling cyber attacks -- Cyber security models / Norman F. Schneidewind -- Cyber war defense : systems development with integrated security / Murray E. Jennex -- Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, and Joon S. Park -- Denial-of-service (DoS) attacks : prevention, intrusion detection, and mitigation / Georg Disterer, Ame Alles, and Axel Hervatin -- Large-scale monitoring of critical digital infrastructures / André Årnes -- Public key infrastructures as a means for increasing network security / Ioannis P. Chochliouros [and others] -- Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark R. Leipnik -- Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong and Mark R. Leipnik -- Section 5. Identification, authorization, and access control -- Hacking and eavesdropping / Kevin Curran [and others] -- Access control models / Romuald Thion -- An overview of IDS using anomaly detection / Lior Rokach and Yuval Elovici -- Bio-cyber machine gun : a new mode of authentication access using visual evoked potentials / Andrews Samraj -- Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna and Richard Chbeir -- Data mining / Mark Last -- Identification and localization of digital addresses on the Internet / André Ånes -- Identification through data mining / Diego Liberati -- Section 6. Business continuity -- A model for emergency response systems / Murray E. Jennex -- Bouncing techniques / Stéphane Coulondre -- Cyber forensics / Stéphane Coulondre -- Software component survivability in information warfare / Joon S. Park and Joseph Giordano -- Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, and Jana Dittmann -- Section 7. Cyber warfare and cyber terrorism : national and international responses -- Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism : the European response / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Stergios P. Chochliouros -- EU tackles cybercrime / Sylvia Mercado Kierkegaard -- The U.S. military response to cyber warfare / Richard J. Kilroy, Jr. -- USA's view on world cyber security issues / Norman Schneidewind -- ECHELON and the NSA / D.C. Webb -- International Cybercrime Convention / Sylvia Mercado-Kierkegaard."@en ;
    schema:description ""This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/1110336386#Person/janczewski_lech_1943> ; # Lech Janczewski
    schema:editor <http://experiment.worldcat.org/entity/work/data/1110336386#Person/colarik_andrew_m> ; # Andrew M. Colarik
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1110336386> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/77520608> ;
    schema:name "Cyber warfare and cyber terrorism"@en ;
    schema:productID "166150898" ;
    schema:url <http://galenet.galegroup.com/servlet/eBooks?ste=22&docNum=CX2555199999&q=clintscott> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=20791> ;
    schema:url <http://www.myilibrary.com?id=91932&ref=toc> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=185368> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=301017> ;
    schema:url <http://catdir.loc.gov/catdir/toc/ecip077/2006102336.html> ;
    schema:url <http://www.infosci-books.com/content/tocVolumes.asp?ID=1839> ;
    schema:url <http://www.infosci-online.com/content/tocVolumes.asp?ID=1838> ;
    schema:url <http://galenet.galegroup.com/servlet/eBooks?ste=22&docNum=CX2555199999&q=clintmusca> ;
    schema:url <http://galenet.galegroup.com/servlet/eBooks?ste=22&docNum=CX2555199999&q=clintonccl> ;
    schema:url <http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5> ;
    schema:url <http://www.myilibrary.com?id=91932> ;
    schema:workExample <http://worldcat.org/isbn/9781591409915> ;
    schema:workExample <http://worldcat.org/isbn/9781591409922> ;
    schema:workExample <http://worldcat.org/isbn/9781280919329> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/166150898> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1110336386#Person/colarik_andrew_m> # Andrew M. Colarik
    a schema:Person ;
    schema:familyName "Colarik" ;
    schema:givenName "Andrew M." ;
    schema:name "Andrew M. Colarik" ;
    .

<http://experiment.worldcat.org/entity/work/data/1110336386#Person/janczewski_lech_1943> # Lech Janczewski
    a schema:Person ;
    schema:birthDate "1943" ;
    schema:familyName "Janczewski" ;
    schema:givenName "Lech" ;
    schema:name "Lech Janczewski" ;
    .

<http://experiment.worldcat.org/entity/work/data/1110336386#Topic/history_military_biological_&_chemical_warfare> # HISTORY--Military--Biological & Chemical Warfare
    a schema:Intangible ;
    schema:name "HISTORY--Military--Biological & Chemical Warfare"@en ;
    .

<http://galenet.galegroup.com/servlet/eBooks?ste=22&docNum=CX2555199999&q=clintmusca>
    rdfs:comment "Available for Muscatine Community College via Gale Virtual Reference Library. Click here to access" ;
    .

<http://galenet.galegroup.com/servlet/eBooks?ste=22&docNum=CX2555199999&q=clintonccl>
    rdfs:comment "Available for Clinton Community College via Gale Virtual Reference Library. Click here to access" ;
    .

<http://galenet.galegroup.com/servlet/eBooks?ste=22&docNum=CX2555199999&q=clintscott>
    rdfs:comment "Available for Scott Community College via Gale Virtual Reference Library. Click here to access" ;
    .

<http://id.worldcat.org/fast/872063> # Computer crimes
    a schema:Intangible ;
    schema:name "Computer crimes"@en ;
    .

<http://id.worldcat.org/fast/973186> # Information warfare
    a schema:Intangible ;
    schema:name "Information warfare"@en ;
    .

<http://worldcat.org/isbn/9781280919329>
    a schema:ProductModel ;
    schema:isbn "1280919329" ;
    schema:isbn "9781280919329" ;
    .

<http://worldcat.org/isbn/9781591409915>
    a schema:ProductModel ;
    schema:isbn "1591409918" ;
    schema:isbn "9781591409915" ;
    .

<http://worldcat.org/isbn/9781591409922>
    a schema:ProductModel ;
    schema:isbn "1591409926" ;
    schema:isbn "9781591409922" ;
    .

<http://www.worldcat.org/oclc/77520608>
    a schema:CreativeWork ;
    rdfs:label "Cyber warfare and cyber terrorism." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/166150898> ; # Cyber warfare and cyber terrorism
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.