""Table of Contents""; ""Preface""; ""Part 1 From Information Security to Cyber-Terrorism""; ""Chapter 1: Information and Computer Security""; ""Chapter 2 The Nature of Terrorism""; ""Chapter 3 Cyber-Terrorism""; ""Part 2 Attacks Against Information Technology""; ""Chapter 4 Physical Security""; ""Chapter 5 Denial of Service Threat""; ""Chapter 6 Web Defacements and Semantic Attacks""; ""Chapter 7 DNS Attacks""; ""Chapter 8 Routing Vulnerabilities""; ""Chapter 9 Identity Stealing Attacks""; ""Part 3 Handling Information Security Issues""
""Chapter 10 Identification, Authentication, and Access Control""""Chapter 11 Personnel Security""; ""Chapter 12 Operations Management""; ""Chapter 13 Information Security Policy""; ""Chapter 14 Business Continuity Management""; ""Epilogue: Thoughts for the Future""; ""About the Authors""; ""Index""
0
8
"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher.
Managerial guide for handling cyber-terrorism and information warfare.
1591405491
Computer crimes.
Cyberterrorism.
Information technology-- Management.
Information warfare.
Criminalité informatique.
Cyberterrorisme.
Guerre de l'information.
Technologie de l'information-- Gestion.
BUSINESS & ECONOMICS-- Corporate Governance.
BUSINESS & ECONOMICS-- Leadership.
BUSINESS & ECONOMICS-- Organizational Development.