Information warfare and security / Dorothy E. Denning.
Material type: TextPublication details: New York : ACM Press ; Reading, Ma. : Addison-Wesley, c1999.Description: xvii, 522 p. : ill. ; 24 cmISBN:- 9780201433036
- 355.3/43 21
- U163 .D46 1999
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - Pioneer General Stacks | Non-fiction | U163.D46 1999 (Browse shelf(Opens below)) | C.1 | Available | Z005135 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | U163.D46 1999 (Browse shelf(Opens below)) | C4 | Available | Z007407 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | U163.D46 1999 (Browse shelf(Opens below)) | C.3 | Available | Z005436 | ||
Books | Zetech Library - TRC General Stacks | U163.D46 1999 (Browse shelf(Opens below)) | C.2 | Available | Z005136 |
Browsing Zetech Library - TRC shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
TX945 .F85 1983 Modern restaurant service: | U33 .C76 2012 The psychology of the Athenian hoplite : | U162 .M34 2014 Strategic studies : a reader / | U163.D46 1999 Information warfare and security / | U163.D46 1999 Information warfare and security / | U163.D46 1999 Information warfare and security / | U163 .D56 2022 Cybersecurity: attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system. |
Includes bibliographical references (p. 425-428) and index.
Gulf war-- Information warfare -- In formation resources -- Players -- Offensive information warfare -- Defensive information warfare -- Play -- crime -- Individual rights -- National security -- Open sources and competitive intelligence -- privacy -- Dark sides -- Lies and disortions -- Denouncement -- Harassment -- Advertising --Spam wars -- Censorship -- Traitors and moles -- Business relationships -- Visits and request -- Fraud and embezzlement -- Inside sabotage -- Penetrating the perimeter -- Eavesdrop[ping on conversations -- Traffic analysis --Telecommunications fraud -- Computer network monitoring -- Environment surveillance --Sabotage -- Accounts -- Tools and techniques -- Information theft -- Tampering -- Takedown -- Extent -- Identity theft -- Forged documents and messages -- Trojan horses --Undercover operations and stings -- Viruses -- Worms -- Locks and keys -- Cryptography -- Steganography -- Anonymity -- Sanitization --Trash disposal -- Shielding -- Biometrics -- Passwords and others secrets -- Integrity check sums -- Public-key management and certificates -- Watermarks -- Call back and call home -- Location -based authentication -- Badges and cards --Access controls -- Filters -- Intrusion and misuse -- Vulnerability monitoring --Building it secure -- Security awareness and training --Avoiding single points of failure -- Risk management -- Incident handling -- Obstacles -- Generally accepted system security principles -- Protection critical infrastructures -- Encryption policy.
There are no comments on this title.