Reference Hub50
Indices3
Cyber Warfare and Cyber Terrorism

Cyber Warfare and Cyber Terrorism

Copyright: © 2007 |Pages: 564
ISBN13: 9781591409915|ISBN10: 1591409918|EISBN13: 9781591409922
DOI: 10.4018/978-1-59140-991-5
Cite Book Cite Book

MLA

Janczewski, Lech, and Andrew Colarik, editors. Cyber Warfare and Cyber Terrorism. IGI Global, 2007. https://doi.org/10.4018/978-1-59140-991-5

APA

Janczewski, L. & Colarik, A. (Eds.). (2007). Cyber Warfare and Cyber Terrorism. IGI Global. https://doi.org/10.4018/978-1-59140-991-5

Chicago

Janczewski, Lech, and Andrew Colarik, eds. Cyber Warfare and Cyber Terrorism. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-991-5

Export Reference

Mendeley
Favorite Full-Book Download

Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field.

Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Introduction to Cyber Warfare and Cyber Terrorism
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Terms, Concepts, and Definitions
This content has been removed at the discretion of the publisher and the editors.
Dynamic Aspects of Cyber Warfare and Cyber Terrorism
This content has been removed at the discretion of the publisher and the editors.
Human Aspects of Cyber Warfare and Cyber Terrorism
This content has been removed at the discretion of the publisher and the editors.
Technical Aspects of Handling Cyber Attacks
This content has been removed at the discretion of the publisher and the editors.
Identification, Authorization, and Access Control
This content has been removed at the discretion of the publisher and the editors.
Chapter 6
Business Continuity  (pages 381-382)
Business Continuity
This content has been removed at the discretion of the publisher and the editors.
Chapter 7
Cyber Warfare and Cyber Terrorism
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Glossary
This content has been removed at the discretion of the publisher and the editors.
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Editors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.