Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. This work presents a discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems.
Presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are also presented.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.