Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security FoundationsJohn Wiley & Sons, 2006 M03 10 - 1008 páginas The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. |
Contenido
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 PART 2 Social and Legal Issues | 125 |
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 PART 3 Foundations of Information Computer and N... | 467 |
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 Reviewers List Reviewers | 911 |
Otras ediciones - Ver todas
Handbook of Information Security, Information Warfare, Social, Legal, and ... Hossein Bidgoli Vista de fragmentos - 2006 |
Handbook of Information Security, Information Warfare, Social, Legal, and ... Hossein Bidgoli Sin vista previa disponible - 2006 |
Términos y frases comunes
activities anonymity application attack benefits claim clickwrap commercial communications companies Computer Crime computer network computer security computer system confidentiality consumer contract court crime criminal cyber cybercrime cyberspace cyberterrorism damage database defense defined definition detection devices difficult digital identity DMCA domain name e-mail electronic employees encryption example federal file filed financial find firewall firms first global hacker hacking hacktivism identified identity document identity theft Information Warfare infringement intellectual property Internet gambling intrusion issues jurisdiction LaFave law enforcement liability ment Office online gambling operations organization party password patent personal information prohibit protection protocol require Retrieved server signature significant spam spammers specific speech sufficient target threat tion trade trademark traffic transactions U.S. Supreme Court unauthorized United USA PATRIOT Act users violation vulnerabilities wireless
Referencias a este libro
Handbook of Information Security, Threats, Vulnerabilities, Prevention ... Hossein Bidgoli Vista previa limitada - 2006 |