Reference Hub6
Indices2
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization

Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization

Copyright: © 2012 |Pages: 496
ISBN13: 9781615208319|ISBN10: 1615208313|EISBN13: 9781615208326
DOI: 10.4018/978-1-61520-831-9
Cite Book Cite Book

MLA

Reich, Pauline C., and Eduardo Gelbstein, editors. Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization. IGI Global, 2012. https://doi.org/10.4018/978-1-61520-831-9

APA

Reich, P. & Gelbstein, E. (Eds.). (2012). Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization. IGI Global. https://doi.org/10.4018/978-1-61520-831-9

Chicago

Reich, Pauline C., and Eduardo Gelbstein, eds. Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61520-831-9

Export Reference

Mendeley
Favorite Full-Book Download

In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers.

Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Setting the Scene for Cyberterrorism and Other Cyber Attacks
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Law and Policy Perspectives
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Case Studies  (pages 376-376)
Case Studies
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.