Handbook of information security Volume 2, Information warfare ; social, legal, and international issues ; and security foundations /
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
John Wiley,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Contents
- Contributors
- Preface
- Guide to The Handbook of Information Security Guide to The Handbook of Information Security
- PART 1: Information Warfare
- Cybercrime and the U.S. Criminal Justice System
- INTRODUCTION
- DIFFERENCES FROM CIVIL JUSTICE SYSTEM
- BASIC INSTITUTIONAL STRUCTURE
- RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS
- CRIMINAL JUSTICE SYSTEM AND CYBERCRIME
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Cyberterrorism and Information Security
- INTRODUCTION
- DEFINING CYBERTERRORISM
- HOW CYBERTERRORISM OCCURS
- SPONSORS AND SUPPORT
- CONTROLLING CYBERTERRORISM
- WHO WILL WIN THE BATTLE OF CYBERTERRORISM?
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Online Stalking
- WHAT IS ONLINE STALKING?
- HOW MUCH OF A PROBLEM IS ONLINE STALKING?
- WHAT CAN YOU DO IF YOU ARE A VICTIM?
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Electronic Attacks
- INTRODUCTION
- RECONNAISSANCE PHASE
- ATTACK PHASE
- DETECTION AVOIDANCE PHASE
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Wireless Information Warfare
- INTRODUCTION
- DEFINITION OF WIRELESS INFORMATION WARFARE
- TAXONOMIES OF INFORMATION WARFARE
- TAXONOMIES OF WIRELESS NETWORKS
- UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE
- SECURE COMMUNICATIONS SYSTEM DESIGN
- OFFENSIVE INFORMATION OPERATIONS
- DEFENSIVE INFORMATION OPERATIONS
- WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL
- EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING)
- EXAMPLE DEFENSE: METHODS OF DEFENSE
- CONCLUSIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- FURTHER READING
- Computer Network Operations (CNO)
- INTRODUCTION
- NETWORK DEFENSE AND NETWORK ATTACK
- A MODEL OF COMPUTER NETWORK ATTACK
- TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE
- SURVIVABILITY
- DECEPTION
- DECEPTION TAXONOMY
- STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS
- IMPLEMENTING COMPUTER NETWORK OPERATIONS
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Electronic Protection
- INTRODUCTION
- ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY
- REDUCING THE THREAT OF ELECTRONIC EMANATIONS
- PROTECTING AGAINST OFFENSIVE SIGNALS
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- Information Assurance
- INTRODUCTION
- OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIES
- INTRUSION MASKING TECHNOLOGIES
- DEFENSE IN DEPTH TECHNOLOGIES
- CONCLUSION
- ACKNOWLEDGMENT
- GLOSSARY
- CROSS REFERENCES
- REFERENCES
- PART 2: Social and Legal Issues
- The Legal Implications of Information Security: Regulatory Compliance and Liability
- INTRODUCTION
- WHAT IS AT RISK?
- STATUTORY AND REGULATORY COMPLIANCE
- CONTRACTUAL LIABILITY
- TORT LIABILITY
- CONCLUSION
- GLOSSARY
- CROSS REFERENCES.