Cargando…

Handbook of information security Volume 2, Information warfare ; social, legal, and international issues ; and security foundations /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bidgoli, Hossein
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn647806652
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 050309s2006 njua ob 001 0 eng d
010 |z  2005006851 
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d IDEBK  |d OCLCQ  |d OCLCF  |d UMI  |d DEBBG  |d OCLCO  |d OCLCQ  |d COO  |d OCLCQ  |d CEF  |d AU@  |d STF  |d VT2  |d RDF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 744646330  |a 814385698  |a 872560607  |a 1044366321  |a 1056450262  |a 1058988275  |a 1100271014  |a 1103251081  |a 1129378396 
020 |a 1280409398 
020 |a 9781280409394 
020 |z 9780471648314 
020 |z 0471648310 
029 1 |a DEBBG  |b BV042031659 
029 1 |a DEBSZ  |b 414171144 
035 |a (OCoLC)647806652  |z (OCoLC)744646330  |z (OCoLC)814385698  |z (OCoLC)872560607  |z (OCoLC)1044366321  |z (OCoLC)1056450262  |z (OCoLC)1058988275  |z (OCoLC)1100271014  |z (OCoLC)1103251081  |z (OCoLC)1129378396 
037 |a CL0500000400  |b Safari Books Online 
050 4 |a TK5105.59  |b .H352 2006eb 
072 7 |a KM  |2 bicssc 
082 0 4 |a 005.8 
049 |a UAMI 
245 0 0 |a Handbook of information security  |n Volume 2,  |p Information warfare ; social, legal, and international issues ; and security foundations /  |c Hossein Bidgoli, editor-in-chief. 
260 |a Hoboken, N.J. :  |b John Wiley,  |c ©2006. 
300 |a 1 online resource (xxvii, 978 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and indexes. 
588 0 |a Print version record. 
505 0 |a Cover -- Contents -- Contributors -- Preface -- Guide to The Handbook of Information Security Guide to The Handbook of Information Security -- PART 1: Information Warfare -- Cybercrime and the U.S. Criminal Justice System -- INTRODUCTION -- DIFFERENCES FROM CIVIL JUSTICE SYSTEM -- BASIC INSTITUTIONAL STRUCTURE -- RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS -- CRIMINAL JUSTICE SYSTEM AND CYBERCRIME -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Cyberterrorism and Information Security -- INTRODUCTION -- DEFINING CYBERTERRORISM -- HOW CYBERTERRORISM OCCURS -- SPONSORS AND SUPPORT -- CONTROLLING CYBERTERRORISM -- WHO WILL WIN THE BATTLE OF CYBERTERRORISM? -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Online Stalking -- WHAT IS ONLINE STALKING? -- HOW MUCH OF A PROBLEM IS ONLINE STALKING? -- WHAT CAN YOU DO IF YOU ARE A VICTIM? -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Electronic Attacks -- INTRODUCTION -- RECONNAISSANCE PHASE -- ATTACK PHASE -- DETECTION AVOIDANCE PHASE -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Wireless Information Warfare -- INTRODUCTION -- DEFINITION OF WIRELESS INFORMATION WARFARE -- TAXONOMIES OF INFORMATION WARFARE -- TAXONOMIES OF WIRELESS NETWORKS -- UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE -- SECURE COMMUNICATIONS SYSTEM DESIGN -- OFFENSIVE INFORMATION OPERATIONS -- DEFENSIVE INFORMATION OPERATIONS -- WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL -- EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING) -- EXAMPLE DEFENSE: METHODS OF DEFENSE -- CONCLUSIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- FURTHER READING -- Computer Network Operations (CNO) -- INTRODUCTION -- NETWORK DEFENSE AND NETWORK ATTACK -- A MODEL OF COMPUTER NETWORK ATTACK -- TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE -- SURVIVABILITY -- DECEPTION -- DECEPTION TAXONOMY -- STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS -- IMPLEMENTING COMPUTER NETWORK OPERATIONS -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Electronic Protection -- INTRODUCTION -- ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY -- REDUCING THE THREAT OF ELECTRONIC EMANATIONS -- PROTECTING AGAINST OFFENSIVE SIGNALS -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- Information Assurance -- INTRODUCTION -- OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIES -- INTRUSION MASKING TECHNOLOGIES -- DEFENSE IN DEPTH TECHNOLOGIES -- CONCLUSION -- ACKNOWLEDGMENT -- GLOSSARY -- CROSS REFERENCES -- REFERENCES -- PART 2: Social and Legal Issues -- The Legal Implications of Information Security: Regulatory Compliance and Liability -- INTRODUCTION -- WHAT IS AT RISK? -- STATUTORY AND REGULATORY COMPLIANCE -- CONTRACTUAL LIABILITY -- TORT LIABILITY -- CONCLUSION -- GLOSSARY -- CROSS REFERENCES. 
520 |a The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Home computer networks. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Réseaux locaux domestiques (Informatique) 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Home computer networks  |2 fast 
700 1 |a Bidgoli, Hossein. 
776 0 8 |i Print version:  |t Handbook of information security.  |d Hoboken, N.J. : John Wiley, ©2006  |w (DLC) 2005006851 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780471648314/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ebrary  |b EBRY  |n ebr10307435 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 40939 
994 |a 92  |b IZTAP