Information warfare and security / Dorothy E. Denning.
Material type:
- 9780201433036
- 355.3/43 21
- U163 .D46 1999
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Zetech Library - Nairobi City Campus General Stacks | Non-fiction | U163.D46 1999 (Browse shelf(Opens below)) | C.1 | Available | Z005135 | |
![]() |
Zetech Library - Ruiru Campus General Stacks | Non-fiction | U163.D46 1999 (Browse shelf(Opens below)) | C4 | Available | Z007407 | |
![]() |
Zetech Library - Ruiru Campus General Stacks | Non-fiction | U163.D46 1999 (Browse shelf(Opens below)) | C.3 | Available | Z005436 | |
![]() |
Zetech Library - Ruiru Campus General Stacks | U163.D46 1999 (Browse shelf(Opens below)) | C.2 | Available | Z005136 |
Includes bibliographical references (p. 425-428) and index.
Gulf war-- Information warfare -- In formation resources -- Players -- Offensive information warfare -- Defensive information warfare -- Play -- crime -- Individual rights -- National security -- Open sources and competitive intelligence -- privacy -- Dark sides -- Lies and disortions -- Denouncement -- Harassment -- Advertising --Spam wars -- Censorship -- Traitors and moles -- Business relationships -- Visits and request -- Fraud and embezzlement -- Inside sabotage -- Penetrating the perimeter -- Eavesdrop[ping on conversations -- Traffic analysis --Telecommunications fraud -- Computer network monitoring -- Environment surveillance --Sabotage -- Accounts -- Tools and techniques -- Information theft -- Tampering -- Takedown -- Extent -- Identity theft -- Forged documents and messages -- Trojan horses --Undercover operations and stings -- Viruses -- Worms -- Locks and keys -- Cryptography -- Steganography -- Anonymity -- Sanitization --Trash disposal -- Shielding -- Biometrics -- Passwords and others secrets -- Integrity check sums -- Public-key management and certificates -- Watermarks -- Call back and call home -- Location -based authentication -- Badges and cards --Access controls -- Filters -- Intrusion and misuse -- Vulnerability monitoring --Building it secure -- Security awareness and training --Avoiding single points of failure -- Risk management -- Incident handling -- Obstacles -- Generally accepted system security principles -- Protection critical infrastructures -- Encryption policy.
There are no comments on this title.