- Shopping Bag ( 0 items )
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling Cyber-Terrorism and Information Warfare defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.
To listen to Dr. Andrew Colarik's appearance on Fox News concerning world terrorism, as well as the one hour discussion about this title on MyTechnologyLawyer.com.
"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher.
Part 2: Attacks Against Information Technology,
Chapter 4: Physical Security,
Chapter 5: Denial of Service Threat,
Chapter 6: WEB Defacements and Semantic Attacks,
Chapter 7: DNS Attacks,
Chapter 8: Routing Vulnerabilities,
Chapter 9: Identity Stealing Attacks,
Part 3: Handling Information Security Issues,
Chapter 10: Identification, Authentication and Access Control,
Chapter 11: Personnel Security,
Chapter 12: Operations Management,
Chapter 13: Information Security Policy,
Chapter 14: Business Continuity Management