Law, Policy, and Technology

Cyberterrorism, Information Warfare, and Internet Immobilization

Nonfiction, Reference & Language, Law, Ethics, Computers, Internet, Security
Cover of the book Law, Policy, and Technology by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466604377
Publisher: IGI Global Publication: June 30, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466604377
Publisher: IGI Global
Publication: June 30, 2012
Imprint: Information Science Reference
Language: English
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

More books from IGI Global

Cover of the book Strategic Enterprise Resource Planning Models for E-Government by
Cover of the book Global Ideologies Surrounding Children's Rights and Social Justice by
Cover of the book Non-Functional Properties in Service Oriented Architecture by
Cover of the book Urbanization and Its Impact on Socio-Economic Growth in Developing Regions by
Cover of the book Faculty Roles and Changing Expectations in the New Age by
Cover of the book Applications, Challenges, and Advancements in Electromyography Signal Processing by
Cover of the book Information Assurance and Security Technologies for Risk Assessment and Threat Management by
Cover of the book Mobile Opportunities and Applications for E-Service Innovations by
Cover of the book Study Abroad Opportunities for Community College Students and Strategies for Global Learning by
Cover of the book Emerging Issues and Prospects in African E-Government by
Cover of the book Contemporary Approaches to Dissertation Development and Research Methods by
Cover of the book STEM Education by
Cover of the book Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business by
Cover of the book Advanced Analytics for Green and Sustainable Economic Development by
Cover of the book Computational Modeling and Simulation of Intellect by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy