Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

Information warfare and security / Dorothy E. Denning.

By: Material type: TextTextPublication details: New York : ACM Press ; Reading, Ma. : Addison-Wesley, c1999.Description: xvii, 522 p. : ill. ; 24 cmISBN:
  • 9780201433036
Subject(s): DDC classification:
  • 355.3/43 21
LOC classification:
  • U163 .D46 1999
Contents:
Gulf war-- Information warfare -- In formation resources -- Players -- Offensive information warfare -- Defensive information warfare -- Play -- crime -- Individual rights -- National security -- Open sources and competitive intelligence -- privacy -- Dark sides -- Lies and disortions -- Denouncement -- Harassment -- Advertising --Spam wars -- Censorship -- Traitors and moles -- Business relationships -- Visits and request -- Fraud and embezzlement -- Inside sabotage -- Penetrating the perimeter -- Eavesdrop[ping on conversations -- Traffic analysis --Telecommunications fraud -- Computer network monitoring -- Environment surveillance --Sabotage -- Accounts -- Tools and techniques -- Information theft -- Tampering -- Takedown -- Extent -- Identity theft -- Forged documents and messages -- Trojan horses --Undercover operations and stings -- Viruses -- Worms -- Locks and keys -- Cryptography -- Steganography -- Anonymity -- Sanitization --Trash disposal -- Shielding -- Biometrics -- Passwords and others secrets -- Integrity check sums -- Public-key management and certificates -- Watermarks -- Call back and call home -- Location -based authentication -- Badges and cards --Access controls -- Filters -- Intrusion and misuse -- Vulnerability monitoring --Building it secure -- Security awareness and training --Avoiding single points of failure -- Risk management -- Incident handling -- Obstacles -- Generally accepted system security principles -- Protection critical infrastructures -- Encryption policy.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - Pioneer General Stacks Non-fiction U163.D46 1999 (Browse shelf(Opens below)) C.1 Available Z005135
Books Books Zetech Library - TRC General Stacks Non-fiction U163.D46 1999 (Browse shelf(Opens below)) C4 Available Z007407
Books Books Zetech Library - TRC General Stacks Non-fiction U163.D46 1999 (Browse shelf(Opens below)) C.3 Available Z005436
Books Books Zetech Library - TRC General Stacks U163.D46 1999 (Browse shelf(Opens below)) C.2 Available Z005136
Browsing Zetech Library - Pioneer shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
TX 912 .B68 2004 Hotel, hostel and hospital housekeeping / TX 912 .B68 2004 Hotel, hostel and hospital housekeeping / TX 912 .B73 1988 Hotel, hostel and hospital housekeeping / U163.D46 1999 Information warfare and security / Z49.4.D7997 1996 First course : Z49.4.D8 1982 Typing, first course / Z49.4.D83 1986 Basic typing skills /

Includes bibliographical references (p. 425-428) and index.

Gulf war-- Information warfare -- In formation resources -- Players -- Offensive information warfare -- Defensive information warfare -- Play -- crime -- Individual rights -- National security -- Open sources and competitive intelligence -- privacy -- Dark sides -- Lies and disortions -- Denouncement -- Harassment -- Advertising --Spam wars -- Censorship -- Traitors and moles -- Business relationships -- Visits and request -- Fraud and embezzlement -- Inside sabotage -- Penetrating the perimeter -- Eavesdrop[ping on conversations -- Traffic analysis --Telecommunications fraud -- Computer network monitoring -- Environment surveillance --Sabotage -- Accounts -- Tools and techniques -- Information theft -- Tampering -- Takedown -- Extent -- Identity theft -- Forged documents and messages -- Trojan horses --Undercover operations and stings -- Viruses -- Worms -- Locks and keys -- Cryptography -- Steganography -- Anonymity -- Sanitization --Trash disposal -- Shielding -- Biometrics -- Passwords and others secrets -- Integrity check sums -- Public-key management and certificates -- Watermarks -- Call back and call home -- Location -based authentication -- Badges and cards --Access controls -- Filters -- Intrusion and misuse -- Vulnerability monitoring --Building it secure -- Security awareness and training --Avoiding single points of failure -- Risk management -- Incident handling -- Obstacles -- Generally accepted system security principles -- Protection critical infrastructures -- Encryption policy.

There are no comments on this title.

to post a comment.