Skip to content

Information Warfare and Security

Best in textbook rentals since 2012!

ISBN-10: 0201433036

ISBN-13: 9780201433036

Edition: 1999

Authors: Dorothy E. Denning

List price: $59.99
Blue ribbon 30 day, 100% satisfaction guarantee!

Rental notice: supplementary materials (access codes, CDs, etc.) are not guaranteed with rental orders.

what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures being mounted to defeat these threats. Focusing on the criminals and information terrorists whose depredations include information-based threats to nations, corporations, and individuals, Denning places cybercrime within a broader context, integrating the various kinds of information crime, and the countermeasures against it, into a methodology-based framework. Among the topics included are government use of information warfare for law…    
Customers also bought

Book details

List price: $59.99
Copyright year: 1999
Publisher: Addison Wesley Professional
Publication date: 12/10/1998
Binding: Paperback
Pages: 544
Size: 6.50" wide x 9.50" long x 1.25" tall
Weight: 1.628
Language: English

I. Introduction
Gulf WarInfowar
The Gulf War
Information Warfare
From Chicks to Chips
A Theory of Information Warfare
Information Resources
The Value of Resources
Players
The Offense
The Defense
A Dual Role
Offensive Information Warfare
Increased Availability to Offensive Player
Decreased Availability to Defensive Player
Decreased Integrity
Other Classification Schemes
Defensive Information Warfare
Types of Defense
Information Security and Information Assurance
The CIA Model and Authorization
Playgrounds to Battlegrounds
Play
Motivation
Culture
More than Childs Play
Crime
Intellectual Property Crimes
Fraud
Computer Fraud and Abuse
Fighting Crime
Individual Rights
National Security
Foreign Intelligence
War and Military Conflict
Terrorism
Netwars
Protecting National Infrastructures
Offensive Information Warfare
Open Sources
Open Source and Competitive Intelligence
Privacy
Snooping on People Through Open Sources
Web Browsing
Privacy Regulations
Piracy
Copyright Infringement
Trademark Infringement
Dark Sides
Psyops and Perception Management
Lies and Distortions
Distortion
Fabrication
Hoaxes
Social Engineering
Denouncement
Conspiracy Theories
Defamation
Harassment
Advertising
Scams
Spam Wars
Censorship
United States Restrictions
Inside the Fence
Traitors and Moles
State and Military Espionage
Economic Espionage
Corporate Espionage
Privacy Compromises
Business Relationships
Visits and Requests
Fraud and Embezzlement
Bogus Transactions
Data Diddling
Inside Sabotage
Physical Attacks
Software Attacks
Penetrating the Perimeter
Physical Break-ins and Burglaries
Search and Seizure
Dumpster Diving
Bombs
Seizing the Signals
Eavesdropping on Conversations
Cellular Intercepts
Pager Intercepts
Law Enforcement Wiretaps
Foreign Intelligence Intercepts
Deciphering the Messages
Traffic Analysis
Pen Registers and Trap and Trace
Location Tracking
Telecommunications Fraud
Blue Boxes
PBX and Related Fraud
Voice Mail Fraud
Calling Card Fraud
Cloned Phones and Cellular Fraud
Computer Network Monitoring
Packet Sniffers
Keystroke Monitoring
Environment Surveillance
Cameras and Video
Satellites and Imagery
Van Eck Receptors
Miscellaneous Sensors
Shoulder Surfing
Privacy and Accountability
Sabotage
Tampering with Phone Service
Jamming
Radio Frequency Weapons
Physical Attacks
Computer Break-Ins and Hacking
Accounts
Getting Access. T