Cyber warfare and cyber terrorism:
This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against atta...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2008]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-83 Volltext |
Zusammenfassung: | This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks |
Beschreibung: | Includes bibliographical references (p. 483-527) and index Angabe des Erscheinungsdatums auf der Internetseite: "© 2007" |
Beschreibung: | 1 Online-Ressource ((xxx, 532 Seiten) |
ISBN: | 9781591409922 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044251970 | ||
003 | DE-604 | ||
005 | 20211103 | ||
007 | cr|uuu---uuuuu | ||
008 | 170330s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781591409922 |9 978-1-59140-992-2 | ||
024 | 7 | |a 10.4018/978-1-59140-991-5 |2 doi | |
035 | |a (ZDB-98-IGB)978-1-59140-992-2 | ||
035 | |a (OCoLC)1028528484 | ||
035 | |a (DE-599)BVBBV044251970 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.3/43 | |
245 | 1 | 0 | |a Cyber warfare and cyber terrorism |c Lech Janczewski (University of Auckland, New Zealand), Andrew M. Colarik (AndrewColarik.com, USA) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2008] | |
264 | 4 | |c © 2008 | |
300 | |a 1 Online-Ressource ((xxx, 532 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references (p. 483-527) and index | ||
500 | |a Angabe des Erscheinungsdatums auf der Internetseite: "© 2007" | ||
505 | 8 | |a 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann -- | |
505 | 8 | |a 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / Andr e Arnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir -- | |
505 | 8 | |a 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / Andr e Arnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / St ephane Coulondre -- 46. Cyber forensics / St ephane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard | |
520 | |a This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks | ||
650 | 4 | |a Information warfare | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Attentat |0 (DE-588)4003451-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 1 | |a Attentat |0 (DE-588)4003451-3 |D s |
689 | 1 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
700 | 1 | |a Janczewski, Lech |d 1943- |0 (DE-588)173435300 |4 edt | |
700 | 1 | |a Colarik, Andrew M. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59140-991-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59140-991-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61692-749-3 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5/ |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029657047 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1810687568164945920 |
---|---|
adam_text | |
any_adam_object | |
author2 | Janczewski, Lech 1943- Colarik, Andrew M. |
author2_role | edt edt |
author2_variant | l j lj a m c am amc |
author_GND | (DE-588)173435300 |
author_facet | Janczewski, Lech 1943- Colarik, Andrew M. |
building | Verbundindex |
bvnumber | BV044251970 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
collection | ZDB-98-IGB |
contents | 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / Andr e Arnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir -- 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / Andr e Arnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / St ephane Coulondre -- 46. Cyber forensics / St ephane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard |
ctrlnum | (ZDB-98-IGB)978-1-59140-992-2 (OCoLC)1028528484 (DE-599)BVBBV044251970 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044251970</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211103</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170330s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781591409922</subfield><subfield code="9">978-1-59140-992-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59140-991-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)978-1-59140-992-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1028528484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044251970</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare and cyber terrorism</subfield><subfield code="c">Lech Janczewski (University of Auckland, New Zealand), Andrew M. Colarik (AndrewColarik.com, USA)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2008]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource ((xxx, 532 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 483-527) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Angabe des Erscheinungsdatums auf der Internetseite: "© 2007"</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / Andr e Arnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir --</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / Andr e Arnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / St ephane Coulondre -- 46. Cyber forensics / St ephane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Attentat</subfield><subfield code="0">(DE-588)4003451-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janczewski, Lech</subfield><subfield code="d">1943-</subfield><subfield code="0">(DE-588)173435300</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Colarik, Andrew M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59140-991-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59140-991-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61692-749-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5/</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029657047</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044251970 |
illustrated | Not Illustrated |
indexdate | 2024-09-20T04:23:48Z |
institution | BVB |
isbn | 9781591409922 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029657047 |
oclc_num | 1028528484 |
open_access_boolean | |
owner | DE-706 DE-83 |
owner_facet | DE-706 DE-83 |
physical | 1 Online-Ressource ((xxx, 532 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Cyber warfare and cyber terrorism Lech Janczewski (University of Auckland, New Zealand), Andrew M. Colarik (AndrewColarik.com, USA) Hershey ; New York Information Science Reference [2008] © 2008 1 Online-Ressource ((xxx, 532 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references (p. 483-527) and index Angabe des Erscheinungsdatums auf der Internetseite: "© 2007" 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / Andr e Arnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir -- 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / Andr e Arnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / St ephane Coulondre -- 46. Cyber forensics / St ephane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Attentat (DE-588)4003451-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s Terrorismus (DE-588)4059534-1 s DE-604 Attentat (DE-588)4003451-3 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 2\p DE-604 Janczewski, Lech 1943- (DE-588)173435300 edt Colarik, Andrew M. edt Erscheint auch als Druck-Ausgabe 978-1-59140-991-5 Erscheint auch als Druck-Ausgabe 1-59140-991-8 Erscheint auch als Druck-Ausgabe 978-1-61692-749-3 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5/ Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cyber warfare and cyber terrorism 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / Andr e Arnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir -- 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / Andr e Arnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / St ephane Coulondre -- 46. Cyber forensics / St ephane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4003451-3 (DE-588)4059534-1 (DE-588)4143413-4 |
title | Cyber warfare and cyber terrorism |
title_auth | Cyber warfare and cyber terrorism |
title_exact_search | Cyber warfare and cyber terrorism |
title_full | Cyber warfare and cyber terrorism Lech Janczewski (University of Auckland, New Zealand), Andrew M. Colarik (AndrewColarik.com, USA) |
title_fullStr | Cyber warfare and cyber terrorism Lech Janczewski (University of Auckland, New Zealand), Andrew M. Colarik (AndrewColarik.com, USA) |
title_full_unstemmed | Cyber warfare and cyber terrorism Lech Janczewski (University of Auckland, New Zealand), Andrew M. Colarik (AndrewColarik.com, USA) |
title_short | Cyber warfare and cyber terrorism |
title_sort | cyber warfare and cyber terrorism |
topic | Information warfare Computer crimes Information warfare (DE-588)4461975-3 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Attentat (DE-588)4003451-3 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | Information warfare Computer crimes Rechnernetz Computersicherheit Attentat Terrorismus Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5/ |
work_keys_str_mv | AT janczewskilech cyberwarfareandcyberterrorism AT colarikandrewm cyberwarfareandcyberterrorism |