서브메뉴
검색
Law, policy, and technology- [electronic resource] : cyberterrorism, information warfare, and Internet immobilization
Law, policy, and technology- [electronic resource] : cyberterrorism, information warfare, and Internet immobilization
- 자료유형
- 단행본
- International Standard Book Number
- 9781780348728 (electronic bk.)
- International Standard Book Number
- 178034872X (electronic bk.)
- International Standard Book Number
- 9781615208326 (electronic bk.)
- International Standard Book Number
- 1615208321 (electronic bk.)
- International Standard Book Number
- 9781615208319 (electronic bk.)
- International Standard Book Number
- 1615208313 (electronic bk.)
- Library of Congress Call Number
- HV6773.15.C97-L39 2012eb
- Dewey Decimal Classification Number
- 363.325-23
- Publication, Distribution, etc. (Imprint
- Hershey, Pa : Information Science Reference, c2012
- Physical Description
- 1 online resource : ill.
- Series Statement
- Gale virtual reference library
- Bibliography, Etc. Note
- Includes bibliographical references.
- Formatted Contents Note
- 완전내용Section 1: Setting the Scene for Cyberterrorism and Other Cyber Attacks. Chapter 1: The Security Practitioners' Perspective; Chapter 2: Economic, Political and Social Threats in the Information Age; Chapter 3 : Critical Information Infrastructure and Cyber-Terrorism; Chapter 4 : Attackers; Chapter 5: Threats, Vulnerability, Uncertainty and Information Risk; Chapter 6: ICT and Security Governance; Chapter 7: Concerns About What Will Happen Next.
- Formatted Contents Note
- 완전내용Section 2: Law and Policy Perspectives. Chapter 8: To Define or Not to Define; Chapter 9: Anonymity, Actual Incidents, Cyber Attacks and Digital Immobilization; Chapter 10: Culture Clashes; Chapter 11: What is Cyberterrorism and How Real is the Threat?; Chapter 12: Cyber-Search and Cyber-Seizure; Chapter 13: Terrorism and the Internet.
- Formatted Contents Note
- 완전내용Section 3: Case Studies. Chapter 14: Case Study; Chapter 15: China's Cyber Tool; Chapter 16: The United Kingdom's Centre for the Protection of National Infrastructure.
- Formatted Contents Note
- 완전내용G-8 initiatives -- Recent Developments -- Calls For A United Nations Treaty -- Appendix: Putting Cyberterrorism Into Context.
- Summary, Etc.
- 요약Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
- Subject Added Entry-Topical Term
- Cyberterrorism
- Subject Added Entry-Topical Term
- Computer crimes
- Subject Added Entry-Topical Term
- Computer security
- Subject Added Entry-Topical Term
- Cyberspace
- Subject Added Entry-Topical Term
- Data protection
- Subject Added Entry-Topical Term
- POLITICAL SCIENCE Political Freedom & Security Terrorism.
- Subject Added Entry-Topical Term
- Computer crimes.
- Subject Added Entry-Topical Term
- Computer security.
- Subject Added Entry-Topical Term
- Cyberspace.
- Subject Added Entry-Topical Term
- Cyberterrorism.
- Subject Added Entry-Topical Term
- Data protection.
- Added Entry-Personal Name
- Gelbstein, Eduardo.
- Added Entry-Personal Name
- Reich, Pauline C.
- Additional Physical Form Entry
- Print version. 1615208313. 9781615208319. (DLC) 2012004590
- Electronic Location and Access
- 로그인을 한후 보실 수 있는 자료입니다.
- Control Number
- joongbu:422379