Research Catalog

Cyber warfare and cyber terrorism

Title
Cyber warfare and cyber terrorism / [edited by] Lech J. Janczewski, Andrew M. Colarik.
Publication
Hershey : Information Science Reference, c2008.

Available Online

Table of contents only

Details

Additional Authors
  • Janczewski, Lech, 1943-
  • Colarik, Andrew M.
Description
xxx, 532 p. : ill.; 29 cm.
Summary
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, creating a vulnerability to a host of attacks and exploitations"--Provided by publisher.
Alternative Title
Cyber terrorism
Subjects
Note
  • "Premier reference source"--Cover.
Bibliography (note)
  • Includes bibliographical references (p. 483-527) and index.
Contents
  • Preface -- Acknowledgment -- Introductory chapter / Andrew M. Colarik and Lech J. Janczewski -- Section 1 : Terms, concepts, and definitions -- ch. 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, and Sean McKeever -- ch. 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- ch. 3. Ten information warfare trends / Kenneth J. Knapp and William R. Boulton -- ch. 4. Bits and bytes vs. bullets and bombs : a new form of warfare / John H. Nugent and Mahesh Raisinghani -- ch. 5. Infrastructures of cyber warfare / Robert S. Owen -- ch. 6. Terrorism and the Internet / M.J. Warren -- ch. 7. Steganography / Merrill Warkentin, Mark B. Schmidt, and Ernst Bekkering -- ch. 8. Cryptography / Kevin Curran, Niall Smyth, and Bryan Mc Grory -- ch. 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, and Ibrahim Al Kattan --
  • Section 2 : Dynamic aspects of cyber warfare and cyber terrorism -- ch. 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- ch. 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta and H.R. Rao -- ch. 12. Deception in cyber attacks / Neil C. Rowe and E. John Custy -- ch. 13. Deception in defense of compute systems from cyber attack / Neil C. Rowe -- ch. 14. Ethics of cyber war attacks / Neil C. Rowe -- ch. 15. International outsourcing, personal data, and cyber terrorism : approaches for oversight / Kirk St. Amant -- ch. 16. Network-based passive information gathering / Romuald Thion -- ch. 17. Electronic money management in modern online business / Theodoros Tzouramanis -- ch. 18. The analysis of money laundering techniques / Krzysztof Woda -- ch. 19. Spam, spim, and illegal advertisement / Dionysios V. Politis and Konstantinos P. Theodoridis -- ch. 20. Malware : specialized Trojan horse / Stefan Kiltz, Andreas Lang, and Jana Dittmann -- ch. 21. SQL code poisoning : the most prevalent technique for attacking web powered databases / Theodoros Tzouramanis --
  • Section 3 : Human aspects of cyber warfare and cyber terrorism -- ch. 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meena, and Ciaran Heaney -- ch. 23. Social engineering / B. Bhagyavati -- ch. 24. Social engineering / Michael Aiello -- ch. 25. Behavioral information security / Isabelle J. Fagnot -- ch. 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Mary Ho -- ch. 27. Cyber stalking : a challenge for web security / Alok Mishra and Deepti Mishra -- Section 4 : Technical aspects of handling cyber attacks -- ch. 28. Cyber security models / Norman F. Schneidewind -- ch. 29. Cyber war defense : systems development with integrated security / Murray E. Jennex -- ch. 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, and Joon S. Park -- ch. 31. Denial-of-service (DoS) attacks : prevention, intrusion detection, and mitigation / Georg Disterer, Ame Alles, and Axel Hervatin -- ch. 32. Large-scale monitoring of critical digital infrastructures / André Årnes -- ch. 33. Public key infrastructures as a means for increasing network security / Ioannis P. Chochliouros, Stergios S. Chochliouros, Anastasia S. Spiliopoulou, and Evita Lampadari -- ch. 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark R. Leipnik -- ch. 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong and Mark R. Leipnik --
  • Section 5 : Identification, authorization, and access control -- ch. 36. Hacking and eavesdropping / Kevin Curran, Peter Breslin, Kevin McLaughlin, and Gary Tracey -- ch. 37. Access control models / Romuald Thion -- ch. 38. An overview of IDS using anomaly detection / Lior Rokach and Yuval Elovici -- ch. 39. Bio-cyber machine gun : a new mode of authentication access using visual evoked potentials / Andrews Samraj -- ch. 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna and Richard Chbeir -- ch. 41. Data mining / Mark Last -- ch. 42. Identification and localization of digital addresses on the Internet / André Ånes -- ch. 43. Identification through data mining / Diego Liberati --
  • Section 6 : Business continuity -- ch. 44. A model for emergency response systems / Murray E. Jennex -- ch. 45. Bouncing techniques / Stéphane Coulondre -- ch. 46. Cyber forensics / Stéphane Coulondre -- ch. 47. Software component survivability in information warfare / Joon S. Park and Joseph Giordano -- ch. 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, and Jana Dittmann --
  • Section 7 : Cyber warfare and cyber terrorism : national and international responses -- ch. 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism : the European response / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Stergios P. Chochliouros -- ch. 50. EU tackles cybercrime / Sylvia Mercado Kierkegaard -- ch. 51. The U.S. military response to cyber warfare / Richard J. Kilroy, Jr. -- ch. 52. USA's view on world cyber security issues / Norman Schneidewind -- ch. 53. ECHELON and the NSA / D.C. Webb -- ch. 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard -- Epilogue -- Glossary -- Compilation of references -- About the editors -- Index.
Call Number
U163
ISBN
  • 1591409918 (hardcover)
  • 9781591409915 (hardcover)
LCCN
2006102336
OCLC
77520608
Title
Cyber warfare and cyber terrorism / [edited by] Lech J. Janczewski, Andrew M. Colarik.
Imprint
Hershey : Information Science Reference, c2008.
Bibliography
Includes bibliographical references (p. 483-527) and index.
Connect to:
Table of contents only
Added Author
Janczewski, Lech, 1943-
Colarik, Andrew M.
Research Call Number
*R-RMRR U163 .C946 2008
View in Legacy Catalog