Law, Policy, and Technology

Cyberterrorism, Information Warfare, and Internet Immobilization

Nonfiction, Reference & Language, Law, Ethics, Computers, Internet, Security
Cover of the book Law, Policy, and Technology by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466604377
Publisher: IGI Global Publication: June 30, 2012
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466604377
Publisher: IGI Global
Publication: June 30, 2012
Imprint: Information Science Reference
Language: English
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

More books from IGI Global

Cover of the book Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments by
Cover of the book Information Technology Risk Management and Compliance in Modern Organizations by
Cover of the book Handbook of Research on Cloud-Based STEM Education for Improved Learning Outcomes by
Cover of the book Advancing Higher Education with Mobile Learning Technologies by
Cover of the book Models for Effective Service Delivery in Special Education Programs by
Cover of the book Intercultural Relations and Ethnic Conflict in Asia by
Cover of the book Special and Gifted Education by
Cover of the book Interactivity in E-Learning by
Cover of the book Handbook of Research on Study Abroad Programs and Outbound Mobility by
Cover of the book Global Diffusion and Adoption of Technologies for Knowledge and Information Sharing by
Cover of the book Global Marketing Strategies for the Promotion of Luxury Goods by
Cover of the book Geospatial Technologies and Advancing Geographic Decision Making by
Cover of the book 3D Printing and Its Impact on the Production of Fully Functional Components by
Cover of the book Supply Chain Optimization, Management and Integration by
Cover of the book Quantum-Inspired Intelligent Systems for Multimedia Data Analysis by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy