Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations
John Wiley & Sons, 10.03.2006 г. - 1008 страници
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Какво казват хората - Напишете рецензия
Не намерихме рецензии на обичайните места.
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 PART 2 Social and Legal Issues
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 PART 3 Foundations of Information Computer and N...
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 Reviewers List Reviewers
Други издания - Преглед на всички
Handbook of Information Security, Information Warfare, Social, Legal, and ...
Ограничен достъп - 2006
activities anonymity application attack beneﬁts claim clickwrap commercial communications companies Computer Crime computer network computer security computer system conﬁdentiality consumer contract court crime criminal cyber cybercrime cyberspace cyberterrorism damage database defense deﬁned deﬁnition detection devices difﬁcult digital identity DMCA domain name e-mail electronic employees encryption example federal ﬁle ﬁled ﬁnancial ﬁnd ﬁrewall ﬁrms ﬁrst global hacker hacking hacktivism identiﬁed identity document identity theft Information Warfare infringement intellectual property Internet gambling intrusion issues jurisdiction LaFave law enforcement liability ment Ofﬁce online gambling operations organization party password patent personal information prohibit protection protocol require Retrieved server signature signiﬁcant spam spammers speciﬁc speech sufﬁcient target threat tion trade trademark trafﬁc transactions U.S. Supreme Court unauthorized United USA PATRIOT Act users violation vulnerabilities wireless