Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security FoundationsThe Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. |
What people are saying - Write a review
Reviews aren't verified, but Google checks for and removes fake content when it's identified
User Review - Flag as inappropriate
Nomqhele Anita 15 September 2019
Contents
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 PART 2 Social and Legal Issues | 125 |
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 PART 3 Foundations of Information Computer and N... | 467 |
Information Warfare Social Legal and International Issues and Security FoundationsVolume 2 Reviewers List Reviewers | 911 |
Other editions - View all
Handbook of Information Security, Information Warfare, Social, Legal, and ... Hossein Bidgoli No preview available - 2006 |
Common terms and phrases
activities anonymity application attack benefits claim clickwrap commercial communications companies Computer Crime computer network computer security computer system confidentiality consumer contract court crime criminal cyber cybercrime cyberspace cyberterrorism damage database defense defined definition detection devices difficult digital identity DMCA domain name e-mail electronic employees encryption example federal file filed financial find firewall firms first global hacker hacking hacktivism identified identity document identity theft Information Warfare infringement intellectual property Internet gambling intrusion issues jurisdiction LaFave law enforcement liability ment Office online gambling operations organization party password patent personal information prohibit protection protocol require Retrieved server signature significant spam spammers specific speech sufficient target threat tion trade trademark traffic transactions U.S. Supreme Court unauthorized United USA PATRIOT Act users violation vulnerabilities wireless