Managerial Guide for Handling Cyber-Terrorism and Information Warfare

·
· IGI Global
Libro electrónico
245
Páginas
Apto

Acerca de este libro electrónico

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling Cyber-Terrorism and Information Warfare defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Listen to Dr. Andrew Colarik's appearance on Fox News (http://www.andrewcolarik.com/press.htm) concerning world terrorism, as well as the one hour discussion about this title on MyTechnologyLawyer.com.

Acerca del autor

Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).

Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents. [Editor]

Califica este libro electrónico

Cuéntanos lo que piensas.

Información de lectura

Smartphones y tablets
Instala la app de Google Play Libros para Android y iPad/iPhone. Como se sincroniza de manera automática con tu cuenta, te permite leer en línea o sin conexión en cualquier lugar.
Laptops y computadoras
Para escuchar audiolibros adquiridos en Google Play, usa el navegador web de tu computadora.
Lectores electrónicos y otros dispositivos
Para leer en dispositivos de tinta electrónica, como los lectores de libros electrónicos Kobo, deberás descargar un archivo y transferirlo a tu dispositivo. Sigue las instrucciones detalladas que aparecen en el Centro de ayuda para transferir los archivos a lectores de libros electrónicos compatibles.