附註:Includes bibliographical references and index.
""Table of Contents""; ""Preface""; ""Part 1 From Information Security to Cyber-Terrorism""; ""Chapter 1: Information and Computer Security""; ""Chapter 2 The Nature of Terrorism""; ""Chapter 3 Cyber-Terrorism""; ""Part 2 Attacks Against Information Technology""; ""Chapter 4 Physical Security""; ""Chapter 5 Denial of Service Threat""; ""Chapter 6 Web Defacements and Semantic Attacks""; ""Chapter 7 DNS Attacks""; ""Chapter 8 Routing Vulnerabilities""; ""Chapter 9 Identity Stealing Attacks""; ""Part 3 Handling Information Security Issues""
""Chapter 10 Identification, Authentication, and Access Control""""Chapter 11 Personnel Security""; ""Chapter 12 Operations Management""; ""Chapter 13 Information Security Policy""; ""Chapter 14 Business Continuity Management""; ""Epilogue: Thoughts for the Future""; ""About the Authors""; ""Index""
摘要:"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher.