Reference Hub14
Indices1
Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Copyright: © 2005 |Pages: 245
ISBN13: 9781591405832|ISBN10: 1591405831|EISBN13: 9781591405504|ISBN13 Softcover: 9781591405498
DOI: 10.4018/978-1-59140-583-2
Cite Book Cite Book

MLA

Janczewski, Lech, and Andrew Colarik. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. IGI Global, 2005. https://doi.org/10.4018/978-1-59140-583-2

APA

Janczewski, L. & Colarik, A. (2005). Managerial Guide for Handling Cyber-Terrorism and Information Warfare. IGI Global. https://doi.org/10.4018/978-1-59140-583-2

Chicago

Janczewski, Lech, and Andrew Colarik. Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-583-2

Export Reference

Mendeley
Favorite Full-Book Download

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling Cyber-Terrorism and Information Warfare defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Listen to Dr. Andrew Colarik's appearance on Fox News (http://www.andrewcolarik.com/press.htm) concerning world terrorism, as well as the one hour discussion about this title on MyTechnologyLawyer.com.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgments
This content has been removed at the discretion of the publisher and the editors.
Chapters
From Information Security to Cyber-Terrorism
This content has been removed at the discretion of the publisher and the editors.
Attacks Against Information Technology
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Handling Information Security Issues
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Epilogue: Thoughts for the Future
This content has been removed at the discretion of the publisher and the editors.
About the Authors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.