Law, Policy, and Technology

Cyberterrorism, Information Warfare, and Internet Immobilization

Nonfiction, Reference & Language, Law, Ethics, Computers, Internet, Security
Cover of the book Law, Policy, and Technology by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466604377
Publisher: IGI Global Publication: June 30, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466604377
Publisher: IGI Global
Publication: June 30, 2012
Imprint: Information Science Reference
Language: English
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

More books from IGI Global

Cover of the book Knowledge Development and Social Change through Technology by
Cover of the book Handbook of Research on Leveraging Consumer Psychology for Effective Customer Engagement by
Cover of the book Handbook of Research on Visual Computing and Emerging Geometrical Design Tools by
Cover of the book Environmental Impacts of Tourism in Developing Nations by
Cover of the book Library and Information Science Research in Asia-Oceania by
Cover of the book Handbook of Research on Improving Learning and Motivation through Educational Games by
Cover of the book Challenges Associated with Cross-Cultural and At-Risk Student Engagement by
Cover of the book Strategic Optimization of Medium-Sized Enterprises in the Global Market by
Cover of the book Advancing Information Management through Semantic Web Concepts and Ontologies by
Cover of the book Fracture and Damage Mechanics for Structural Engineering of Frames by
Cover of the book New Opportunities for Artistic Practice in Virtual Worlds by
Cover of the book Software Process Improvement and Management by
Cover of the book Privacy, Intrusion Detection and Response by
Cover of the book Emerging Research on Islamic Marketing and Tourism in the Global Economy by
Cover of the book Interdisciplinary Approaches to Information Systems and Software Engineering by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy