Cyber warfare and cyber terrorism / [edited by] Lech J. Janczewski, Andrew M. Colarik.
نوع المادة : نصالناشر:Hershey, PA ; London : Information Science Reference, [2008]تاريخ حقوق النشر: copyright 2008وصف:xxx, 532 pages : illustrations ; 29 cmنوع المحتوى:- text
- unmediated
- volume
- 1591409918 (hbk)
- 9781591409915 (hbk)
- U163 C946 2008
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
المراجع | UAE Federation Library | مكتبة اتحاد الإمارات Reference Collection | مجموعات المراجع | U163 C946 2008 (إستعراض الرف(يفتح أدناه)) | C.1 | لا يعار | 30010000308424 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | U163 C946 2008 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000254091 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: Reference Collection | مجموعات المراجع إغلاق مستعرض الرف(يخفي مستعرض الرف)
U162 S7 Strategic survey : the annual review of world affairs / | U162 S7 Strategic survey : the annual review of world affairs / | U162 W67 1998 World directory of Strategic Sudies Centres. | U163 C946 2008 Cyber warfare and cyber terrorism / | U240B431999 Encyclopedia of guerrilla warfare | U408.3 A653 2000 The 2000 guide to the evaluation of educational experiences in the Armed Services | U408.3 A653 2000 The 2000 guide to the evaluation of educational experiences in the Armed Services |
"Premier reference source"--Cover.
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.
Includes bibliographical references (pages 483-527) and index.
Section I: Terms, concepts, and definitions -- Section II: Dynamic aspects of cyber warfare and cyber terrorism -- Section III: Human aspects of cyber warfare and cyber terrorism -- Section IV: Technical apsects of handling cyber attacks -- Section V: Identification, authorization, and access control -- Section VI: Business continuity -- Section VII: Cyber warfare and cyber terrorism: national and international responses -- Epilogue -- Glossary -- Compilation of references -- About the editors.