Law, Policy, and Technology

Cyberterrorism, Information Warfare, and Internet Immobilization

Nonfiction, Reference & Language, Law, Ethics, Computers, Internet, Security
Cover of the book Law, Policy, and Technology by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466604377
Publisher: IGI Global Publication: June 30, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466604377
Publisher: IGI Global
Publication: June 30, 2012
Imprint: Information Science Reference
Language: English
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

More books from IGI Global

Cover of the book E-Infrastructures and Technologies for Lifelong Learning by
Cover of the book Developments in Information Security and Cybernetic Wars by
Cover of the book Rethinking Machine Ethics in the Age of Ubiquitous Technology by
Cover of the book Using Technology Tools to Innovate Assessment, Reporting, and Teaching Practices in Engineering Education by
Cover of the book Quality Assurance and Assessment Practices in Translation and Interpreting by
Cover of the book Advanced Strategies and Models for Integrating RTI in Secondary Schools by
Cover of the book Building a Competitive Public Sector with Knowledge Management Strategy by
Cover of the book Therapeutic Jurisprudence and Overcoming Violence Against Women by
Cover of the book Information Acquisitions and Sharing through Inter-Organizational Collaboration by
Cover of the book Economic Growth in Latin America and the Impact of the Global Financial Crisis by
Cover of the book Handbook of Research on Human-Computer Interfaces and New Modes of Interactivity by
Cover of the book Non-Functional Properties in Service Oriented Architecture by
Cover of the book Corporate and Global Standardization Initiatives in Contemporary Society by
Cover of the book Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm by
Cover of the book Creating Business Value and Competitive Advantage With Social Entrepreneurship by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy