Cargando…

Handbook of information security Volume 2, Information warfare ; social, legal, and international issues ; and security foundations /

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Bidgoli, Hossein
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : John Wiley, ©2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Contents
  • Contributors
  • Preface
  • Guide to The Handbook of Information Security Guide to The Handbook of Information Security
  • PART 1: Information Warfare
  • Cybercrime and the U.S. Criminal Justice System
  • INTRODUCTION
  • DIFFERENCES FROM CIVIL JUSTICE SYSTEM
  • BASIC INSTITUTIONAL STRUCTURE
  • RELATIONSHIP BETWEEN STATE AND FEDERAL CRIMINAL JUSTICE SYSTEMS
  • CRIMINAL JUSTICE SYSTEM AND CYBERCRIME
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • Cyberterrorism and Information Security
  • INTRODUCTION
  • DEFINING CYBERTERRORISM
  • HOW CYBERTERRORISM OCCURS
  • SPONSORS AND SUPPORT
  • CONTROLLING CYBERTERRORISM
  • WHO WILL WIN THE BATTLE OF CYBERTERRORISM?
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • Online Stalking
  • WHAT IS ONLINE STALKING?
  • HOW MUCH OF A PROBLEM IS ONLINE STALKING?
  • WHAT CAN YOU DO IF YOU ARE A VICTIM?
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Electronic Attacks
  • INTRODUCTION
  • RECONNAISSANCE PHASE
  • ATTACK PHASE
  • DETECTION AVOIDANCE PHASE
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Wireless Information Warfare
  • INTRODUCTION
  • DEFINITION OF WIRELESS INFORMATION WARFARE
  • TAXONOMIES OF INFORMATION WARFARE
  • TAXONOMIES OF WIRELESS NETWORKS
  • UNIQUE ASPECTS OF WIRELESS INFORMATION WARFARE
  • SECURE COMMUNICATIONS SYSTEM DESIGN
  • OFFENSIVE INFORMATION OPERATIONS
  • DEFENSIVE INFORMATION OPERATIONS
  • WIW IN PRACTICE: VULNERABILITIES OF A SUBURBAN HOSPITAL
  • EXAMPLE ATTACK: REMOTE ATTACK ON A WIRELESS NETWORK (VLAN HOPPING)
  • EXAMPLE DEFENSE: METHODS OF DEFENSE
  • CONCLUSIONS
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • FURTHER READING
  • Computer Network Operations (CNO)
  • INTRODUCTION
  • NETWORK DEFENSE AND NETWORK ATTACK
  • A MODEL OF COMPUTER NETWORK ATTACK
  • TECHNOLOGIES FOR COMPUTER NETWORK DEFENSE
  • SURVIVABILITY
  • DECEPTION
  • DECEPTION TAXONOMY
  • STRATEGIES AND POLICIES FOR COMPUTER NETWORK OPERATIONS
  • IMPLEMENTING COMPUTER NETWORK OPERATIONS
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • Electronic Protection
  • INTRODUCTION
  • ELECTRONIC EMANATIONS FROM COMPUTER TECHNOLOGY
  • REDUCING THE THREAT OF ELECTRONIC EMANATIONS
  • PROTECTING AGAINST OFFENSIVE SIGNALS
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • Information Assurance
  • INTRODUCTION
  • OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIES
  • INTRUSION MASKING TECHNOLOGIES
  • DEFENSE IN DEPTH TECHNOLOGIES
  • CONCLUSION
  • ACKNOWLEDGMENT
  • GLOSSARY
  • CROSS REFERENCES
  • REFERENCES
  • PART 2: Social and Legal Issues
  • The Legal Implications of Information Security: Regulatory Compliance and Liability
  • INTRODUCTION
  • WHAT IS AT RISK?
  • STATUTORY AND REGULATORY COMPLIANCE
  • CONTRACTUAL LIABILITY
  • TORT LIABILITY
  • CONCLUSION
  • GLOSSARY
  • CROSS REFERENCES.