Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Indexed In: SCOPUS
Release Date: January, 2005|Copyright: © 2005 |Pages: 245
DOI: 10.4018/978-1-59140-583-2
ISBN13: 9781591405832|ISBN10: 1591405831|EISBN13: 9781591405504
Hardcover:
Available
$84.95
TOTAL SAVINGS: $84.95
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$84.95
TOTAL SAVINGS: $84.95
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$84.95
TOTAL SAVINGS: $84.95
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$84.95
TOTAL SAVINGS: $84.95
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$100.00
TOTAL SAVINGS: $100.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$100.00
TOTAL SAVINGS: $100.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling Cyber-Terrorism and Information Warfare defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Listen to Dr. Andrew Colarik's appearance on Fox News (http://www.andrewcolarik.com/press.htm) concerning world terrorism, as well as the one hour discussion about this title on MyTechnologyLawyer.com.

Coverage:
Coverage forthcoming
Reviews & Statements

Managerial Guide for Handling Cyber-Terrorism and Information Warfare, published by Idea Group Publishing, is a book that explains in very understandable ways the complex issues of cyber-terrorism and information warfare. Each of us who wants to apply the information superhighway without accidents must read this book.

– Andrew Targowski, Western Michigan University, USA

Comprised of 54 chapters, this collection describes the different attacks conducted against electronic data processing facilities and discusses techniques for detecting and preventing such attacks.

– Book News (November 2007)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).
Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.