가야대학교 분성도서관

상단 글로벌/추가 메뉴

회원 로그인


자료검색

자료검색

상세정보

부가기능

Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization / [electronic resource]

상세 프로파일

상세정보
자료유형E-Book
개인저자Gelbstein, Eduardo.
Reich, Pauline C.
서명/저자사항Law, policy, and technology[electronic resource] :cyberterrorism, information warfare, and Internet immobilization /Pauline C. Reich and Eduardo Gelbstein, editors.
발행사항Hershey, Pa. : Information Science Reference, c2012.
형태사항1 online resource : ill.
총서사항Gale virtual reference library
ISBN9781780348728 (electronic bk.)
178034872X (electronic bk.)
9781615208326 (electronic bk.)
1615208321 (electronic bk.)
9781615208319 (electronic bk.)
1615208313 (electronic bk.)
서지주기Includes bibliographical references.
내용주기Section 1: Setting the Scene for Cyberterrorism and Other Cyber Attacks. Chapter 1: The Security Practitioners' Perspective; Chapter 2: Economic, Political and Social Threats in the Information Age; Chapter 3 : Critical Information Infrastructure and Cyber-Terrorism; Chapter 4 : Attackers; Chapter 5: Threats, Vulnerability, Uncertainty and Information Risk; Chapter 6: ICT and Security Governance; Chapter 7: Concerns About What Will Happen Next.
Section 2: Law and Policy Perspectives. Chapter 8: To Define or Not to Define; Chapter 9: Anonymity, Actual Incidents, Cyber Attacks and Digital Immobilization; Chapter 10: Culture Clashes; Chapter 11: What is Cyberterrorism and How Real is the Threat?; Chapter 12: Cyber-Search and Cyber-Seizure; Chapter 13: Terrorism and the Internet.
Section 3: Case Studies. Chapter 14: Case Study; Chapter 15: China's Cyber Tool; Chapter 16: The United Kingdom's Centre for the Protection of National Infrastructure.
G-8 initiatives -- Recent Developments -- Calls For A United Nations Treaty -- Appendix: Putting Cyberterrorism Into Context.
요약Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
일반주제명Cyberterrorism.
Computer crimes.
Computer security.
Cyberspace.
Data protection.
POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism.
Computer crimes.
Computer security.
Cyberspace.
Cyberterrorism.
Data protection.
언어영어
기타형태 저록Print version:16152083139781615208319
대출바로가기http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329181

소장정보

  • 소장정보

인쇄 인쇄

메세지가 없습니다
No. 등록번호 청구기호 소장처 도서상태 반납예정일 예약 서비스 매체정보
1 WE00001840 363.325 가야대학교/전자책서버(컴퓨터서버)/ 대출가능 인쇄 이미지  

서평

  • 서평

태그

  • 태그

나의 태그

나의 태그 (0)

모든 이용자 태그

모든 이용자 태그 (0) 태그 목록형 보기 태그 구름형 보기
 

퀵메뉴

대출현황/연장
예약현황조회/취소
자료구입신청
상호대차
FAQ
교외접속
사서에게 물어보세요
메뉴추가
quickBottom

카피라이터

  • 개인정보보호방침
  • 이메일무단수집거부

김해캠퍼스 | 621-748 | 경남 김해시 삼계로 208 | TEL:055-330-1033 | FAX:055-330-1032
			Copyright 2012 by kaya university Bunsung library All rights reserved.