Information Warfare and Security
Information Warfare and Security

Images are for illustrative purposes only - Read Full Disclaimer

Information Warfare and Security

Book: Paperback 10 - 12 - 1998

Product ID: 11464960

Condition: New
Publisher : Addison-Wesley Professional

ISBN-10 : 0201433036

Original Product Guaranteed - Imported from USA


Product Description What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary. You will find in this book: A comprehensive and coherent treatment of offensive and defensive information warfare, identifying the key actors, targets, methods, technologies, outcomes, policies, and laws; A theory of information warfare that explains and integrates within a single framework operations involving diverse actors and media; An accurate picture of the threats, illuminated by actual incidents; A description of information warfare technologies and their limitations, particularly the limitations of defensive technologies. Whatever your interest or role in the emerging field of information warfare, this book will give you the background you need to make informed judgments about potential threats and our defenses against them. Review Dorothy Denning is one of the world's most respected computer-security experts. She's also the author of the now-classic Cryptography and Data Security (Addison-Wesley, 1982) and a professor of computer science at Georgetown University. But if Denning ever wants to chuck it all and opt for an honest living of, say, writing horror stories, her most recent book, Information Warfare and Security, has all the source material she will ever need. Before reading half the book, I was ready to cancel my e-mail accounts, jettison my modems, cancel my credit cards, move what little money I have from the bank to my mattress, and head out for the Flint Hills. You see, part of what Denning has done in Information Warfare and Security is chronicle what seems to be just about every breach in computer security over the past few years. Page after page of hacks, cracks, phreaks, and psyopts by everyone from teenagers and thrill seekers to spies and nuts. Credit card numbers, passwords, bank accounts -- they're all fair game for anyone who is bright, persistent, online, and so inclined.Not that it was Denning's intent simply to titillate us with one interesting or exciting story after another. Instead, her goal is to provide us with a comprehensive overview of what's become known as "information warfare"... Read more from this review. -- Jonathan Erickson, Dr. Dobb's Journal -- Dr. Dobb's Journal From the Inside Flap In recent years, information warfare has captured the attention--and imagination--of government officials, information security specialists, and curious onlookers. The term is used to cover a broad spectrum of activity but especially a scenario wherein information terrorists, using not much more than a keyboard and mouse, hack into a computer and cause planes to crash, unprecedented power blackouts to occur, or food supplies to be poisoned. The terrorists might tamper with computers that support banking and finance, perhaps causing

Have a look at the full range of genuine products and brands in our Computers & Technology and CompTIA categories that you can safely buy online in United Arab Emirates (UAE) at discounted prices.

Get the lowest prices for products from the Addison-Wesley Professional brand. The delivery of Addison-Wesley Professional products is free and fast to your doorstep whether its your office, home or wherever you like!.