Handbook of information security Volume 2, Information warfare ; social, legal, and international issues ; and security foundations Volume 2, Information warfare ; social, legal, and international issues ; and security foundations /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bidgoli, Hossein (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley c2006.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627038906719
Tabla de Contenidos:
  • HANDBOOK OF INFORMATION SECURITY: Information Warfare; Social, Legal, and International Issues; and Security Foundations,Volume 2; Contents; Preface; Guide to The Handbook of Information Security Guide to The Handbook of Information Security; PART 1: Information Warfare; Cybercrime and the U. S. Criminal Justice System; INTRODUCTION; DIFFERENCES FROM CIVIL JUSTICE SYSTEM; BASIC INSTITUTIONAL STRUCTURE; RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS; CRIMINAL JUSTICE SYSTEM AND CYBERCRIME; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES
  • Cyberterrorism and Information SecurityINTRODUCTION; DEFINING CYBERTERRORISM; HOW CYBERTERRORISM OCCURS; SPONSORS AND SUPPORT; CONTROLLING CYBERTERRORISM; WHO WILL WIN THE BATTLE OF CYBERTERRORISM?; GLOSSARY; CROSS REFERENCES; REFERENCES; Online Stalking; WHAT IS ONLINE STALKING?; HOW MUCH OF A PROBLEM IS ONLINE STALKING?; WHAT CAN YOU DO IF YOU ARE A VICTIM?; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Electronic Attacks; INTRODUCTION; RECONNAISSANCE PHASE; ATTACK PHASE; DETECTION AVOIDANCE PHASE; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING
  • Wireless Information WarfareINTRODUCTION; DEFINITION OF WIRELESS INFORMATION WARFARE; TAXONOMIES OF INFORMATION WARFARE; TAXONOMIES OF WIRELESS NETWORKS; UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE; SECURE COMMUNICATIONS SYSTEM DESIGN; OFFENSIVE INFORMATION OPERATIONS; DEFENSIVE INFORMATION OPERATIONS; WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL; EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK ( VLAN HOPPING); EXAMPLE DEFENSE: METHODS OF DEFENSE; CONCLUSIONS; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Computer Network Operations (CNO); INTRODUCTION
  • NETWORK DEFENSE AND NETWORK ATTACKA MODEL OF COMPUTER NETWORK ATTACK; TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE; SURVIVABILITY; DECEPTION; DECEPTION TAXONOMY; STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS; IMPLEMENTING COMPUTER NETWORK OPERATIONS; GLOSSARY; CROSS REFERENCES; REFERENCES; Electronic Protection; INTRODUCTION; ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY; REDUCING THE THREAT OF ELECTRONIC EMANATIONS; PROTECTING AGAINST OFFENSIVE SIGNALS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Information Assurance; INTRODUCTION
  • OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIESINTRUSION MASKING TECHNOLOGIES; DEFENSE IN DEPTH TECHNOLOGIES; CONCLUSION; ACKNOWLEDGMENT; GLOSSARY; CROSS REFERENCES; REFERENCES; PART 2: Social and Legal Issues; The Legal Implications of Information Security: Regulatory Compliance and Liability; INTRODUCTION; WHAT IS AT RISK?; STATUTORY AND REGULATORY COMPLIANCE; CONTRACTUAL LIABILITY; TORT LIABILITY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Hackers, Crackers, and Computer Criminals; INTRODUCTION; DEFINITIONS AND EXAMPLES; TACTICS, TECHNOLOGIES, AND TECHNIQUES
  • THE COMMON MORALITY ON HACKING AND CRACKING