자료유형 | 단행본 |
---|---|
서명/저자사항 | Law, policy, and technology [electronic resource]: cyberterrorism, information warfare, and Internet immobilization / Pauline C. Reich and Eduardo Gelbstein, editors. |
개인저자 | Gelbstein, Eduardo. Reich, Pauline C. |
발행사항 | Hershey, Pa.: Information Science Reference, c2012. |
형태사항 | 1 online resource : ill. |
총서사항 | Gale virtual reference library |
기타형태 저록 | Print version: 1615208313 9781615208319 |
ISBN | 9781780348728 (electronic bk.) 178034872X (electronic bk.) 9781615208326 (electronic bk.) 1615208321 (electronic bk.) 9781615208319 (electronic bk.) 1615208313 (electronic bk.) |
서지주기 | Includes bibliographical references. |
내용주기 | Section 1: Setting the Scene for Cyberterrorism and Other Cyber Attacks. Chapter 1: The Security Practitioners' Perspective; Chapter 2: Economic, Political and Social Threats in the Information Age; Chapter 3 : Critical Information Infrastructure and Cyber-Terrorism; Chapter 4 : Attackers; Chapter 5: Threats, Vulnerability, Uncertainty and Information Risk; Chapter 6: ICT and Security Governance; Chapter 7: Concerns About What Will Happen Next. Section 2: Law and Policy Perspectives. Chapter 8: To Define or Not to Define; Chapter 9: Anonymity, Actual Incidents, Cyber Attacks and Digital Immobilization; Chapter 10: Culture Clashes; Chapter 11: What is Cyberterrorism and How Real is the Threat?; Chapter 12: Cyber-Search and Cyber-Seizure; Chapter 13: Terrorism and the Internet. Section 3: Case Studies. Chapter 14: Case Study; Chapter 15: China's Cyber Tool; Chapter 16: The United Kingdom's Centre for the Protection of National Infrastructure. G-8 initiatives -- Recent Developments -- Calls For A United Nations Treaty -- Appendix: Putting Cyberterrorism Into Context. |
요약 | Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years. |
일반주제명 | Cyberterrorism. Computer crimes. Computer security. Cyberspace. Data protection. POLITICAL SCIENCE --Political Freedom & Security --Terrorism. Computer crimes. Computer security. Cyberspace. Cyberterrorism. Data protection. |
분류기호(DDC) | 363.325 |
언어 | 영어 |
바로가기 |
보존/밀집/기증 자료 신청 분관대출 서가부재도서 무인예약대출 배달서비스 소장위치출력
No. | 등록번호 | 청구기호 | 소장처 | 밀집번호 | 도서상태 | 반납예정일 | 예약 | 서비스 | 매체정보 |
---|---|---|---|---|---|---|---|---|---|
1 | E160831 | EB 363.325 | 중앙도서관[본관]/E-Book/ | 대출가능 |