Information Warfare and Homeland Security
Includes 18 Titles

Information Warfare and Homeland Security

Learn more about IGI Global Topic Collections.
This timely book bundle of 18 scholarly titles covers topics on cyber warfare and terrorism, digital crime and forensics, and information security and privacy. It is well suited for academic and professional researchers, government officials, military professionals, and industry consultants.
Release date: January 1, 2011
ISBN13: 9781609608064|EISBN13: 9781609608071

Description

In today's information age, security preparedness for cyber warfare and terrorist attacks is of critical importance. The rapid advancement of technology causes new threats to surface every day.

The Information Warfare & Homeland Security book bundle is a specialized reference compilation that supports research in the field of security technologies. This premier package includes 18 scholarly titles focusing on cyber warfare and terrorism, digital crime and forensics, and information security and privacy. These titles represent IGI Global’s unique coverage of the impact and effective use of technology for defense, security, and privacy in the information age.

Topics Covered

  • Cyber Warfare & Terrorism
  • Digital Crime and Forensics
  • Information Security & Privacy

Books Included in this Collection

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering
Hamid R. Nemati (The University of North Carolina at Greensboro, USA), Li Yang (University of Tennessee, USA). © 2011. 408 pages.
In today’s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Thomas J. Holt (Michigan State University, USA), Bernadette H. Schell (President's Advisor on Cybercrime, University of Ontario, Canada; Vice-Provost at Laurentian University, USA). © 2011. 316 pages.
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the “cyber criminal curve.” Corporate Hacking and...
Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection
Ali Serhan Koyuncugil (Capital Markets Board of Turkey, Turkey, and Baskent University, Turkey), Nermin Ozgulbas (Baskent University, Turkey). © 2011. 356 pages.
The modern world is fraught with risk, from natural disasters and terrorist attacks, to financial crises and pandemics. Assessing and planning for these risks can be done with a conventional human-based approach but this often requires large amounts of time and resources. Surveillance Technologies and...
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
Raghu Santanam (Arizona State University, USA), M. Sethumadhavan (Amrita University, India), Mohit Virendra (Brocade Communications Systems, USA). © 2011. 296 pages.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances...
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Chang-Tsun Li (University of Warwick, UK). © 2010. 620 pages.
Due to the rise of digital crime and the pressing need for methods of combating these forms of criminal activities, there is an increasing awareness of the importance of digital forensics and investigation. The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods...
Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy
Christopher G. Reddick (University of Texas at San Antonio, USA ). © 2010. 274 pages.
Homeland security information systems are an important area of inquiry due to the tremendous influence information systems play on the preparation and response of government to a terrorist attack or natural disaster. Homeland Security Preparedness and Information Systems: Strategies for Managing Public...
Advanced ICTs for Disaster Management and Threat Detection: Collaborative and Distributed Frameworks
Eleana Asimakopoulou (Loughborough University, UK), Nik Bessis (University of Bedfordshire, UK). © 2010. 370 pages.
Disaster management is a dynamic and fluid area, which requires the involvement of expertise from different authorities and organizations. There is a need to prepare and plan in advance actions in response to disaster related events in order to support sustainable livelihood by protecting lives...
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Kenneth J. Knapp (U.S. Air Force Academy, USA). © 2009. 458 pages.
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis...
Handbook of Research on Information Security and Assurance
Jatinder N. D. Gupta (The University of Alabama in Huntsville, USA), Sushil Sharma (Ball State University, USA). © 2009. 586 pages.
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such...
Social and Human Elements of Information Security: Emerging Trends and Countermeasures
Manish Gupta (State University of New York, USA), Raj Sharman (State University of New York, USA). © 2009. 412 pages.
More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those...
Socioeconomic and Legal Implications of Electronic Intrusion
Dionysios Politis (Aristotle University of Thessaloniki, Greece), Phaedon-John Kozyris (Aristotle University of Thessaloniki, Greece), Ioannis Iglezakis (Aristotle University of Thessaloniki, Greece). © 2009. 388 pages.
In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. Socioeconomic and Legal Implications of Electronic Intrusion focuses on abusive and illegal practices of penetration in the...
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
Lin Liu (University of Cincinnati, USA), John Eck (University of Cincinnati, USA). © 2008. 508 pages.
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably. Artificial Crime...
Cyber Warfare and Cyber Terrorism
Lech Janczewski (University of Auckland, New Zealand), Andrew Colarik (AndrewColarik.com, USA). © 2007. 564 pages.
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation...
Applications of Information Systems to Homeland Security and Defense
Hussein A. Abbass (University of New South Wales, Australia), Daryl Essam (University of New South Wales, Australia). © 2006. 272 pages.
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense...
Cyber Terrorism: Political and Economic Implications
Andrew Colarik (AndrewColarik.com, USA). © 2006. 172 pages.
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the...
Digital Crime and Forensic Science in Cyberspace
Panagiotis Kanellis (Information Society S.A., Greece), Evangelos Kiountouzis (Athens University, Greece), Nicholas Kolokotronis (Universitiy of Peloponnese, Greece), Drakoulis Martakos (National and Kapodistrian University of Athens, Greece). © 2006. 357 pages.
Digital forensics is the science of collecting evidence often used in a court of law to prosecute those who engage in digital activities that are deemed unlawful. Digital Crime and Forensic Science in Cyberspace is unique in putting together a number of contributions from leading experts in digital...
Geographic Information Systems and Crime Analysis
Fahui Wang (Northern Illinois University, USA). © 2005. 345 pages.
Computerized crime mapping or GIS in law enforcement agencies has experienced rapid growth, particularly since the mid 1990s. There has also been increasing interests in GIS analysis of crime from various academic fields including criminology, geography, urban planning, information science and others....
Managerial Guide for Handling Cyber-Terrorism and Information Warfare
Lech Janczewski (University of Auckland, New Zealand), Andrew Colarik (AndrewColarik.com, USA). © 2005. 245 pages.
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The...