Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9781498703253
    Language: English
    Pages: XXXIX, 363 S.
    Edition: 2. ed.
    DDC: 303.48/33
    RVK:
    Keywords: Information warfare ; Business Data processing ; Information ; Kriegführung ; Datenverarbeitung ; Wirtschaft
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    ISBN: 9781498703260
    Language: English
    Pages: 1 online resource (403 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be do
    Note: Online resource; Title from title page (viewed September 25, 2015) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781498703260
    Language: English
    Pages: Online-Ressource (382 p)
    Edition: 2nd ed
    Parallel Title: Print version Global Information Warfare : The New Digital Battlefield, Second Edition
    DDC: 303.4833
    Keywords: Information warfare ; Business ; Data processing ; Electronic books ; Electronic books
    Abstract: Front Cover -- Contents -- Forewords to the Second Edition -- Foreword to the First Edition -- Preface -- Acknowledgments -- Authors -- Introduction -- Chapter 1: Introduction to Global Information Warfare -- Chapter 2: From Information Warfare to Information Operations and Cyber Warfare -- Chapter 3: War Stories from the Digital Battlefield -- Chapter 4: Pre 9/11 -- Chapter 5: Effect of 9/11 and US Homeland Security (DHS) -- Chapter 6: Nation-State Defensive and Offensive Information Warfare Capabilities: North America -- Chapter 7: Nation-State Defensive and Offensive Information Warfare Capabilities: Middle East Nation-States -- Chapter 8: Nation-State Defensive and Offensive Information Warfare Capabilities: Asia Pacific Region -- Chapter 9: Nation-State Defensive and Offensive Information Warfare Capabilities: Europe -- Chapter 10: Nation-State Defensive and Offensive Information Warfare Capabilities: The Russian Federation -- Chapter 11: International Organizations' Defensive and Offensive Information Warfare Capabilities -- Chapter 12: Nonstate Actors -- Chapter 13: The History of Technology -- Chapter 14: Corporate and National Resilience -- Chapter 15: Awareness -- Chapter 16: The Tallinn Manual -- Chapter 17: A Look at the Future: The Crystal Ball -- Appendix: A Short History of Technology and Its Relationship to Warfare -- Back Cover.
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781498703260
    Language: English
    Pages: 1 online resource
    Edition: Second edition.
    Parallel Title: Erscheint auch als
    DDC: 303.4833
    Keywords: Information warfare ; Business Data processing ; Information warfare ; Business ; Data processing
    Abstract: 1. Introduction to global information warfare -- 2. From information warfare to information operations and cyber warfare -- 3. War stories from the digital battlefield -- 4. Pre 9/11 -- 5. Effect of 9/11 and US Homeland Security (DHS) -- 6. Nation-state defensive and offensive information warfare capabilities : North America -- 7. Nation-state defensive and offensive information warfare capabilities : Middle East nation-states -- 8. Nation-state defensive and offensive information warfare capabilities : Asia Pacific region -- 9. Nation-state defensive and offensive information warfare capabilities : Europe -- 10. Nation-state defensive and offensive information warfare capabilities : the Russian Federation -- 11. International organizations' defensive and offensive information warfare capabilities -- 12. Nonstate actors -- 13. The history of technology -- 14. Corporate and national resilience -- 15. Awareness -- 16. The Tallinn manual -- 17. A look at the future : the crystal ball.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780128023792 , 0128023791
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Third edition.
    Keywords: Computer security ; Data protection ; Electronic books ; local ; Electronic books
    Abstract: The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program , Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment. Provides updated chapters that reflect the latest technological changes and advances in countering the latest information security threats and risks and how they relate to corporate security and crime investigation Includes new topics, such as forensics labs and information warfare, as well as how to liaison with attorneys, law enforcement, and other agencies others outside the organization Written in an accessible, easy-to-read style
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (viewed October 27, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Butterworth-Heinemann | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (360 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. It provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program.The author’s intent is to provide the reader with a practitioner’s guide (a “how-to book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.* Shows professionals how to save their companies money.* Provides a roadmap for developing an anti-fraud program.* Allows security professionals to tailor their anti-fraud program to their own corporate environment.* Explains how fraud is costing corporations a competitive edge in the global marketplace.
    Note: Online resource; Title from title page (viewed August 27, 2007) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780849311147
    Language: English
    Pages: Online-Ressource (686 p)
    Parallel Title: Print version Global Information Warfare : How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages
    DDC: 005.8
    Keywords: Information warfare ; Business -- Data processing ; Information warfare ; Business ; Data processing ; Electronic books ; Electronic books
    Abstract: Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the ""Achilles heel"" that these dependencies on advanced computing and information technologies create. It underscores how hostile countries, business competitors, terrorists, hacktivists and others are waging Information Warfare (IW) against their adversaries. This may sound like science fiction, but it has been happening for years and continues
    Description / Table of Contents: Front cover; Dedication; Contents; Foreword; Acknowledgments; Introduction; SECTION I: HOW WE CAME TO WHERE WE ARE-AND BY THE WAY, WHERE ARE WE?; Chapter 1. Everything You Wanted to Know about Information Warfare but Were Afraid to Ask; Chapter 2. Fuel for the InfoWar Fire: The High-Technology Revolution; Chapter 3. The Global and Nation-State Information Infrastructures: Backbone or Achilles' Heel?; Chapter 4. Our Changing World, or Is It Really?; Chapter 5. Business, Government, and Activist Warfare: The More Things Change, The More They Don't
    Description / Table of Contents: SECTION II: THE PAST, PRESENT, AND FUTURE USE OF INFORMATION WARFARE TACTICS BY BUSINESSES, GOVERNMENT AGENCIES, AND ASSORTED MISCREANTSChapter 6. Information Warfare Tactics: How Can They Do That? It's the COTS, Stupid!; Chapter 7. It's All about Influence: Information Warfare Tactics by Nation-States; Chapter 8. Information Warfare: Asian Nation-States; Chapter 9. Information Warfare: Middle East Nation-States; Chapter 10. Information Warfare: European Nation-States; Chapter 11. Information Warfare: Nation-States of the Americas
    Description / Table of Contents: Chapter 12. Information Warfare: African and Other Nation-StatesChapter 13. It's All about Profits: Infromation Warfare Tactics in Business; Chapter 14. It's All about Power: Information Warfare Tactics by Terrorists, Activists, and Miscreants; SECTION III: INFORMATION WAREFARE DEFENSES: COUNTERMEASRURES, COUNTERATTACK, OR BOTH; Chapter 15. Surviving the Onslaughts: Defenses and Countermeasures; Chapter 16. Defending against Information Warfare Attacks Begins with Knowledge Management; Chapter 17. What's a CEO to Do? Ya Gotta Have A Plan
    Description / Table of Contents: Chapter 18. Those Who Do Not Accept Change and Adapt Will Be Consumed By It The Enlightened Will Survive; Chapter 19. The Twenty-First Century Challenge: Surviving in the New Century; Appendix A: Recommended Reading and References; Appendix B: Glossary of Terms; Appendix C: A Short History of Technology and Its Relationship to Warfare; Appendix D: Revolution in Infromation Affairs: Tactical and Strategic Implications of Information Warfare and Information Operations; Afterword; About the Authors; Index; Back cover
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...