Find a copy online
Links to this item
infosci-online.com via InfoSci.
services.igi-global.com Access restricted to McGill users
galenet.galegroup.com Available for Scott Community College via Gale Virtual Reference Library. Click here to access
galenet.galegroup.com Available for Clinton Community College via Gale Virtual Reference Library. Click here to access
galenet.galegroup.com Available for Muscatine Community College via Gale Virtual Reference Library. Click here to access
go.galegroup.com Gale Reference

Find a copy in the library
Finding libraries that hold this item...
Details
Genre/Form: | Electronic books |
---|---|
Additional Physical Format: | Print version: Cyber warfare and cyber terrorism. Hershey : Information Science Reference, ©2008 (DLC) 2006102336 (OCoLC)77520608 |
Material Type: | Document, Internet resource |
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Lech Janczewski; Andrew M Colarik |
ISBN: | 9781591409922 1591409926 9781591409915 1591409918 1280919329 9781280919329 |
OCLC Number: | 166150898 |
Language Note: | Text in English. |
Description: | 1 online resource (xxx, 564 pages) : illustrations |
Contents: | Introductory chapter / Andrew M. Colarik and Lech J. Janczewski -- Section 1. Terms, concepts, and definitions -- Cyber terrorism attacks / Kevin Curran, Kevin Concannon, and Sean McKeever -- Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- Ten information warfare trends / Kenneth J. Knapp and William R. Boulton -- Bits and bytes vs. bullets and bombs : a new form of warfare / John H. Nugent and Mahesh Raisinghani -- Infrastructures of cyber warfare / Robert S. Owen -- Terrorism and the Internet / M.J. Warren -- Steganography / Merrill Warkentin, Mark B. Schmidt, and Ernst Bekkering -- Cryptography / Kevin Curran, Niall Smyth, and Bryan McGrory -- A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, and Ibrahim Al Kattan -- Section 2. Dynamic aspects of cyber warfare and cyber terrorism -- An introduction to key themes in the economics of cyber security / Neil Gandal -- Role of FS-ISAC in countering cyber terrorism / Manish Gupta and H.R. Rao -- Deception in cyber attacks / Neil C. Rowe and E. John Custy -- Deception in defense of computer systems from cyber attack / Neil C. Rowe -- Ethics of cyber war attacks / Neil C. Rowe -- International outsourcing, personal data, and cyber terrorism : approaches for oversight / Kirk St. Amant -- Network-based passive information gathering / Romuald Thion -- Electronic money management in modern online business / Theodoros Tzouramanis -- The analysis of money laundering techniques / Krzysztof Woda -- Spam, spin, and illegal advertisement / Dionysios V. Politis and Konstantinos P. Theodoridis -- Malware : specialized Trojan horse / Stefan Kiltz, Andreas Lang, and Jana Dittmann -- SQL code poisoning : the most prevalent technique for attacking web powered databases / Theodoros Tzouramanis -- Section 3. Human aspects of cyber warfare and cyber terrorism -- Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meena, and Ciaran Heaney -- Social engineering / B. Bhagyavati -- Social engineering / Michael Aiello -- Behavioral information security / Isabelle J. Fagnot -- Toward a deeper understanding of personnel anomaly detection / Shuyuan Mary Ho -- Cyber stalking : a challenge for web security / Alok Mishra and Deepti Mishra -- Section 4. Technical aspects of handling cyber attacks -- Cyber security models / Norman F. Schneidewind -- Cyber war defense : systems development with integrated security / Murray E. Jennex -- Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, and Joon S. Park -- Denial-of-service (DoS) attacks : prevention, intrusion detection, and mitigation / Georg Disterer, Ame Alles, and Axel Hervatin -- Large-scale monitoring of critical digital infrastructures / André Årnes -- Public key infrastructures as a means for increasing network security / Ioannis P. Chochliouros [and others] -- Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark R. Leipnik -- Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong and Mark R. Leipnik -- Section 5. Identification, authorization, and access control -- Hacking and eavesdropping / Kevin Curran [and others] -- Access control models / Romuald Thion -- An overview of IDS using anomaly detection / Lior Rokach and Yuval Elovici -- Bio-cyber machine gun : a new mode of authentication access using visual evoked potentials / Andrews Samraj -- Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna and Richard Chbeir -- Data mining / Mark Last -- Identification and localization of digital addresses on the Internet / André Ånes -- Identification through data mining / Diego Liberati -- Section 6. Business continuity -- A model for emergency response systems / Murray E. Jennex -- Bouncing techniques / Stéphane Coulondre -- Cyber forensics / Stéphane Coulondre -- Software component survivability in information warfare / Joon S. Park and Joseph Giordano -- Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, and Jana Dittmann -- Section 7. Cyber warfare and cyber terrorism : national and international responses -- Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism : the European response / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Stergios P. Chochliouros -- EU tackles cybercrime / Sylvia Mercado Kierkegaard -- The U.S. military response to cyber warfare / Richard J. Kilroy, Jr. -- USA's view on world cyber security issues / Norman Schneidewind -- ECHELON and the NSA / D.C. Webb -- International Cybercrime Convention / Sylvia Mercado-Kierkegaard. |
Series Title: | Gale Reference. |
Responsibility: | [edited by] Lech J. Janczewski, Andrew M. Colarik. |
More information: |
Abstract:
Reviews


Tags
Similar Items
Related Subjects:(5)
- Information warfare.
- Computer crimes.
- Guerre de l'information.
- Criminalité informatique.
- HISTORY -- Military -- Biological & Chemical Warfare.
User lists with this item (7)
- Things to Check Out(3 items)
by williams32 updated 2016-02-04
- Security Cyber Space(9 items)
by ariel.moore updated 2015-05-15
- Cyber(10 items)
by lwinebrenner updated 2015-02-07
- Things to Check Out(15 items)
by csimmons007 updated 2013-06-28
- Kierkegaard 2008 I(500 items)
by irisateca updated 2012-01-31