Information Warfare
-10%
portes grátis
Information Warfare
Warren, Matthew; Hutchinson, William
Taylor & Francis Ltd
03/2001
226
Mole
Inglês
9780750649445
15 a 20 dias
420
Descrição não disponível.
Chapter 1 Concepts in information warfare; Chapter 2 Information as an intelligence weapon; Chapter 3 Deception; Chapter 4 Sources of threat for IT systems; Chapter 5 Attacks and retaliation; Chapter 6 Attack and defence; Chapter 7 An I-War risk analysis model; Chapter 8 Implications of I-War for information managers; Chapter 9; Chapter 10 Political activists, freedom fighters, and terrorists on the Web; Chapter 11 Perceptual intelligence and I-War; Chapter 12 The future;
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
web;sites;national;infrastructure;denial-of-service;attack;method;computer;viruses;cyber;Security Intelligence Organisation Legislation Amendment;NATO Site;UK Alliance;Real IRA;Information Warfare;Partiya Karkeren Kurdistan;Intrusion Detection Systems;Sensitive Information;Professional Computer Programmer;Australian Security Intelligence Organisation Legislation;Cyber Terrorists;DDoS Tool;IP Address Spoof;Misuse Detection;Attack Method;Risk Analysis Model;NATO;IRA;Asio Officer;Audit Records;Information Warfare Attacks;Computer Emergency Response Teams;Intelligence Service;Attack Patterns;Asio
Chapter 1 Concepts in information warfare; Chapter 2 Information as an intelligence weapon; Chapter 3 Deception; Chapter 4 Sources of threat for IT systems; Chapter 5 Attacks and retaliation; Chapter 6 Attack and defence; Chapter 7 An I-War risk analysis model; Chapter 8 Implications of I-War for information managers; Chapter 9; Chapter 10 Political activists, freedom fighters, and terrorists on the Web; Chapter 11 Perceptual intelligence and I-War; Chapter 12 The future;
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
web;sites;national;infrastructure;denial-of-service;attack;method;computer;viruses;cyber;Security Intelligence Organisation Legislation Amendment;NATO Site;UK Alliance;Real IRA;Information Warfare;Partiya Karkeren Kurdistan;Intrusion Detection Systems;Sensitive Information;Professional Computer Programmer;Australian Security Intelligence Organisation Legislation;Cyber Terrorists;DDoS Tool;IP Address Spoof;Misuse Detection;Attack Method;Risk Analysis Model;NATO;IRA;Asio Officer;Audit Records;Information Warfare Attacks;Computer Emergency Response Teams;Intelligence Service;Attack Patterns;Asio