Information Warfare and Security

ISBN-10: 0201433036

ISBN-13: 9780201433036

Edition: 1999

List price: $59.99 Buy it from $1.30
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures being mounted to defeat these threats. Focusing on the criminals and information terrorists whose depredations include information-based threats to nations, corporations, and individuals, Denning places cybercrime within a broader context, integrating the various kinds of information crime, and the countermeasures against it, into a methodology-based framework. Among the topics included are government use of information warfare for law enforcement investigations and for military and intelligence operations; also, the conflicts arising in the areas of free speech and encryption. The author discusses offensive information warfare, including acquisition of information, deceptive exploitation of information, and denial of access to information; and also addresses defensive information warfare, specifically, information security principles and practices. The book features coverage that is both broad and deep, illustrating cyberspace threats with real-world examples.
Used Starting from $38.49
New Starting from $56.44
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $59.99
Copyright year: 1999
Publisher: Addison Wesley Professional
Publication date: 12/10/1998
Binding: Paperback
Pages: 544
Size: 6.50" wide x 9.50" long x 1.25" tall
Weight: 1.628
Language: English

I. Introduction
Gulf WarInfowar
The Gulf War
Information Warfare
From Chicks to Chips
A Theory of Information Warfare
Information Resources
The Value of Resources
Players
The Offense
The Defense
A Dual Role
Offensive Information Warfare
Increased Availability to Offensive Player
Decreased Availability to Defensive Player
Decreased Integrity
Other Classification Schemes
Defensive Information Warfare
Types of Defense
Information Security and Information Assurance
The CIA Model and Authorization
Playgrounds to Battlegrounds
Play
Motivation
Culture
More than Childs Play
Crime
Intellectual Property Crimes
Fraud
Computer Fraud and Abuse
Fighting Crime
Individual Rights
National Security
Foreign Intelligence
War and Military Conflict
Terrorism
Netwars
Protecting National Infrastructures
Offensive Information Warfare
Open Sources
Open Source and Competitive Intelligence
Privacy
Snooping on People Through Open Sources
Web Browsing
Privacy Regulations
Piracy
Copyright Infringement
Trademark Infringement
Dark Sides
Psyops and Perception Management
Lies and Distortions
Distortion
Fabrication
Hoaxes
Social Engineering
Denouncement
Conspiracy Theories
Defamation
Harassment
Advertising
Scams
Spam Wars
Censorship
United States Restrictions
Inside the Fence
Traitors and Moles
State and Military Espionage
Economic Espionage
Corporate Espionage
Privacy Compromises
Business Relationships
Visits and Requests
Fraud and Embezzlement
Bogus Transactions
Data Diddling
Inside Sabotage
Physical Attacks
Software Attacks
Penetrating the Perimeter
Physical Break-ins and Burglaries
Search and Seizure
Dumpster Diving
Bombs
Seizing the Signals
Eavesdropping on Conversations
Cellular Intercepts
Pager Intercepts
Law Enforcement Wiretaps
Foreign Intelligence Intercepts
Deciphering the Messages
Traffic Analysis
Pen Registers and Trap and Trace
Location Tracking
Telecommunications Fraud
Blue Boxes
PBX and Related Fraud
Voice Mail Fraud
Calling Card Fraud
Cloned Phones and Cellular Fraud
Computer Network Monitoring
Packet Sniffers
Keystroke Monitoring
Environment Surveillance
Cameras and Video
Satellites and Imagery
Van Eck Receptors
Miscellaneous Sensors
Shoulder Surfing
Privacy and Accountability
Sabotage
Tampering with Phone Service
Jamming
Radio Frequency Weapons
Physical Attacks
Computer Break-Ins and Hacking
Accounts
Getting Access. T
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×