Information Warfare and Security
Dorothy E. Denning
- 出版商: Addison-Wesley Professional
- 出版日期: 1998-12-20
- 售價: $700
- 貴賓價: 9.5 折 $665
- 語言: 英文
- 頁數: 544
- 裝訂: Paperback
- ISBN: 0201433036
- ISBN-13: 9780201433036
售價: $199Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators (Paperback)
售價: $299Incident Response: A Strategic Guide to Handling System and Network Security Bre
售價: $99Information Warfare: How to Survive Cyber Attacks
售價: $399Real World Linux Security: Intrusion Prevention, Detection and Recovery
售價: $990Linux System Security, 2/e
售價: $613How to Break Web Software: Functional and Security Testing of Web Applications and Web Services (Paperback)
貴賓價: $1,682Object Pascal Handbook
貴賓價: $988Getting Started with Lazarus and Free Pascal: A beginners and intermediate guide to Free Pascal using Lazarus IDE
貴賓價: $1,556Mastering VBA for Microsoft Office 2013 (Paperback)
貴賓價: $1,044VBA For Dummies, 5/e (Paperback)
貴賓價: $1,330Agile Product Management with Scrum: Creating Products that Customers Love (Paperback)
This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures being mounted to defeat these threats. Focusing on the criminals and information terrorists whose depredations include information-based threats to nations, corporations, and individuals, Denning places cybercrime within a broader context, integrating the various kinds of information crime, and the countermeasures against it, into a methodology-based framework.
Among the topics included are government use of information warfare for law enforcement investigations and for military and intelligence operations; also, the conflicts arising in the areas of free speech and encryption. The author discusses offensive information warfare, including acquisition of information, deceptive exploitation of information, and denial of access to information; and also addresses defensive information warfare, specifically, information security principles and practices. The book features coverage that is both broad and deep, illustrating cyberspace threats with real-world examples.
2. A Theory of Information Warfare.
A Dual Role.
Offensive Information Warfare.
Decreased Availability to Defensive Player.
Other Classification Schemes.
Defensive Information Warfare.
Information Security and Information Assurance.
The CIA Model and Authorization.
3. Playgrounds to Battlegrounds.
More than Child's Play.
Computer Fraud and Abuse.
War and Military Conflict.
Protecting National Infrastructures.
II. OFFENSIVE INFORMATION WARFARE.
5. Psyops and Perception Management.
6. Inside the Fence.
Visits and Requests.
Fraud and Embezzlement.
Penetrating the Perimeter.
Search and Seizure.
7. Seizing the Signals.
Law Enforcement Wiretaps.
Foreign Intelligence Intercepts.
Deciphering the Messages.
PBX and Related Fraud.
Voice Mail Fraud.
Calling Card Fraud.
Cloned Phones and Cellular Fraud.
Computer Network Monitoring.
Satellites and Imagery.
Van Eck Receptors.
Privacy and Accountability.
Radio Frequency Weapons.
8. Computer Break-Ins and Hacking.
Tools and Techniques.
Buffer Overows and Other Exploits.
Covering up Tracks.
More than Trophies.
Domain Name Service Hacks.
Forged Documents and Messages.
Forgeries in Spam.
Riding the Web.
Undercover Operations and Stings.
Who Writes Viruses.
III. DEFENSIVE INFORMATION WARFARE.
Generation and Distribution of Keys.
Public-Key Distribution and Diffie-Hellman.
Public-Key Cryptography and RSA.
Key Storage and Recovery.
Applications of Encryption.
The Limits of Encryption.
12. How to Tell a Fake.
Passwords and Other Secrets.
Public-Key Management and Certificates.
Call Back and Call Home.
Badges and Cards.
13. Monitors and Gatekeepers.
Access Control Monitors.
Junk E-Mail Filters.
Intrusion and Misuse Detection.
Computer Intrusion and Misuse Detection.
Analogy with the Human Immune System.
Detecting and Eradicating Viruses and Malicious Mobile Code.
14. In a Risky World.
Monitoring Security Publications.
Building It Secure.
The ITSEC and Common Criteria.
The Capability Maturity Model.
Security Awareness and Training.
Avoiding Single Points of Failure.
Due Care and Liability.
Containment and Recovery.
Legal and Civil Remedies.
Economic and Military Response.
15. Defending the Nation.
Protecting Critical Infrastructures.
Presidential Decision Directive.
Encryption Policy in Perspective.
Bibliography of Books.