This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to ...

Buy Now From Amazon

This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.

Similar Products

Little BrotherA Fierce Domain: Conflict in Cyberspace, 1986 to 2012No Place to HideThe Starfish and the Spider: The Unstoppable Power of Leaderless OrganizationsToxic Terror: Assessing Terrorist Use of Chemical and Biological Weapons (BCSIA Studies in International Security)Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.The Starfish and the Spider: The Unstoppable Power of Leaderless OrganizationsInformation Security Risk Analysis, Third Edition