본문

서브메뉴

Law, policy, and technology- [electronic resource] : cyberterrorism, information warfare, and Internet immobilization
내용보기
Law, policy, and technology- [electronic resource] : cyberterrorism, information warfare, and Internet immobilization
자료유형  
 단행본
International Standard Book Number  
9781780348728 (electronic bk.)
International Standard Book Number  
178034872X (electronic bk.)
International Standard Book Number  
9781615208326 (electronic bk.)
International Standard Book Number  
1615208321 (electronic bk.)
International Standard Book Number  
9781615208319 (electronic bk.)
International Standard Book Number  
1615208313 (electronic bk.)
Library of Congress Call Number  
HV6773.15.C97-L39 2012eb
Dewey Decimal Classification Number  
363.325-23
Publication, Distribution, etc. (Imprint  
Hershey, Pa : Information Science Reference, c2012
Physical Description  
1 online resource : ill.
Series Statement  
Gale virtual reference library
Bibliography, Etc. Note  
Includes bibliographical references.
Formatted Contents Note  
완전내용Section 1: Setting the Scene for Cyberterrorism and Other Cyber Attacks. Chapter 1: The Security Practitioners' Perspective; Chapter 2: Economic, Political and Social Threats in the Information Age; Chapter 3 : Critical Information Infrastructure and Cyber-Terrorism; Chapter 4 : Attackers; Chapter 5: Threats, Vulnerability, Uncertainty and Information Risk; Chapter 6: ICT and Security Governance; Chapter 7: Concerns About What Will Happen Next.
Formatted Contents Note  
완전내용Section 2: Law and Policy Perspectives. Chapter 8: To Define or Not to Define; Chapter 9: Anonymity, Actual Incidents, Cyber Attacks and Digital Immobilization; Chapter 10: Culture Clashes; Chapter 11: What is Cyberterrorism and How Real is the Threat?; Chapter 12: Cyber-Search and Cyber-Seizure; Chapter 13: Terrorism and the Internet.
Formatted Contents Note  
완전내용Section 3: Case Studies. Chapter 14: Case Study; Chapter 15: China's Cyber Tool; Chapter 16: The United Kingdom's Centre for the Protection of National Infrastructure.
Formatted Contents Note  
완전내용G-8 initiatives -- Recent Developments -- Calls For A United Nations Treaty -- Appendix: Putting Cyberterrorism Into Context.
Summary, Etc.  
요약Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
Subject Added Entry-Topical Term  
Cyberterrorism
Subject Added Entry-Topical Term  
Computer crimes
Subject Added Entry-Topical Term  
Computer security
Subject Added Entry-Topical Term  
Cyberspace
Subject Added Entry-Topical Term  
Data protection
Subject Added Entry-Topical Term  
POLITICAL SCIENCE Political Freedom & Security Terrorism.
Subject Added Entry-Topical Term  
Computer crimes.
Subject Added Entry-Topical Term  
Computer security.
Subject Added Entry-Topical Term  
Cyberspace.
Subject Added Entry-Topical Term  
Cyberterrorism.
Subject Added Entry-Topical Term  
Data protection.
Added Entry-Personal Name  
Gelbstein, Eduardo.
Added Entry-Personal Name  
Reich, Pauline C.
Additional Physical Form Entry  
Print version. 1615208313. 9781615208319. (DLC) 2012004590
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:422379
신착도서 더보기
최근 3년간 통계입니다.

소장정보

  • 예약
  • 캠퍼스간 도서대출
  • 서가에 없는 책 신고
  • 나의폴더
소장자료
등록번호 청구기호 소장처 대출가능여부 대출정보
EW0009434 EB   원문자료 대출가능 대출가능
마이폴더 부재도서신고

* 대출중인 자료에 한하여 예약이 가능합니다. 예약을 원하시면 예약버튼을 클릭하십시오.

해당 도서를 다른 이용자가 함께 대출한 도서

관련도서

관련 인기도서

도서위치