Cyber Warfare and Cyber Terrorism

Cyber Warfare and Cyber Terrorism

Lech Janczewski (University of Auckland, New Zealand) and Andrew Colarik (AndrewColarik.com, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: May, 2007|Copyright: © 2007 |Pages: 564
DOI: 10.4018/978-1-59140-991-5
ISBN13: 9781591409915|ISBN10: 1591409918|EISBN13: 9781591409922
Hardcover:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field.

Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Access Control Models
  • Anti-spam approaches
  • Behavioral information security
  • Bio-cyber machine gun
  • Bouncing techniques
  • Cryptography
  • Cyber Forensics
  • Cyber Security Models
  • Cyber Stalking
  • Cyber terrorism attacks
  • Cyber war defense
  • Data Mining
  • Databases
  • Deception in cyber attacks
  • Denial-of-service (dos) attacks
  • Economics of cyber security
  • Electronic money management
  • Electronic surveillance and civil rights
  • Information warfare trends
  • Infrastructures of cyber warfare
  • Knowledge Management
  • Malware
  • Personnel anomaly detection
  • Social Engineering
  • Spam, spim and illegal advertisement
  • SQL code poisoning
  • Steganography
  • Terrorism and the internet
Reviews and Testimonials

This timely reference book, based on an extensive compilation, is not a guide, but rather an introductory review of cyber warfare and cyber terrorism in the 21st century. The experienced editors have written an easily comprehended book that is international in scope, and covers the last 25 years in computer and telecommunications developments and the Web. Highly recommended. All academic libraries and professional collections; all levels.

– CHOICE, Vol. 45, No. 06 (2008)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).
Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.