Handbook of information security Volume 2, Information warfare ; social, legal, and international issues ; and security foundations Volume 2, Information warfare ; social, legal, and international issues ; and security foundations /
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
John Wiley
c2006.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627038906719 |
Tabla de Contenidos:
- HANDBOOK OF INFORMATION SECURITY: Information Warfare; Social, Legal, and International Issues; and Security Foundations,Volume 2; Contents; Preface; Guide to The Handbook of Information Security Guide to The Handbook of Information Security; PART 1: Information Warfare; Cybercrime and the U. S. Criminal Justice System; INTRODUCTION; DIFFERENCES FROM CIVIL JUSTICE SYSTEM; BASIC INSTITUTIONAL STRUCTURE; RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS; CRIMINAL JUSTICE SYSTEM AND CYBERCRIME; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES
- Cyberterrorism and Information SecurityINTRODUCTION; DEFINING CYBERTERRORISM; HOW CYBERTERRORISM OCCURS; SPONSORS AND SUPPORT; CONTROLLING CYBERTERRORISM; WHO WILL WIN THE BATTLE OF CYBERTERRORISM?; GLOSSARY; CROSS REFERENCES; REFERENCES; Online Stalking; WHAT IS ONLINE STALKING?; HOW MUCH OF A PROBLEM IS ONLINE STALKING?; WHAT CAN YOU DO IF YOU ARE A VICTIM?; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Electronic Attacks; INTRODUCTION; RECONNAISSANCE PHASE; ATTACK PHASE; DETECTION AVOIDANCE PHASE; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING
- Wireless Information WarfareINTRODUCTION; DEFINITION OF WIRELESS INFORMATION WARFARE; TAXONOMIES OF INFORMATION WARFARE; TAXONOMIES OF WIRELESS NETWORKS; UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE; SECURE COMMUNICATIONS SYSTEM DESIGN; OFFENSIVE INFORMATION OPERATIONS; DEFENSIVE INFORMATION OPERATIONS; WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL; EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK ( VLAN HOPPING); EXAMPLE DEFENSE: METHODS OF DEFENSE; CONCLUSIONS; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Computer Network Operations (CNO); INTRODUCTION
- NETWORK DEFENSE AND NETWORK ATTACKA MODEL OF COMPUTER NETWORK ATTACK; TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE; SURVIVABILITY; DECEPTION; DECEPTION TAXONOMY; STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS; IMPLEMENTING COMPUTER NETWORK OPERATIONS; GLOSSARY; CROSS REFERENCES; REFERENCES; Electronic Protection; INTRODUCTION; ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY; REDUCING THE THREAT OF ELECTRONIC EMANATIONS; PROTECTING AGAINST OFFENSIVE SIGNALS; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Information Assurance; INTRODUCTION
- OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIESINTRUSION MASKING TECHNOLOGIES; DEFENSE IN DEPTH TECHNOLOGIES; CONCLUSION; ACKNOWLEDGMENT; GLOSSARY; CROSS REFERENCES; REFERENCES; PART 2: Social and Legal Issues; The Legal Implications of Information Security: Regulatory Compliance and Liability; INTRODUCTION; WHAT IS AT RISK?; STATUTORY AND REGULATORY COMPLIANCE; CONTRACTUAL LIABILITY; TORT LIABILITY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Hackers, Crackers, and Computer Criminals; INTRODUCTION; DEFINITIONS AND EXAMPLES; TACTICS, TECHNOLOGIES, AND TECHNIQUES
- THE COMMON MORALITY ON HACKING AND CRACKING