Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007996912/catalog> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- catalog abstract "In Information Warfare and Security, Dorothy E. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.".
- catalog contributor b11092911.
- catalog created "c1999.".
- catalog date "1999".
- catalog date "c1999.".
- catalog dateCopyrighted "c1999.".
- catalog description "In Information Warfare and Security, Dorothy E. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.".
- catalog description "Includes bibliographical references (p. 425-428) and index.".
- catalog description "pt. I. Introduction. Ch. 1. Gulf War -- Infowar. Ch. 2. A Theory of Information Warfare. Ch. 3. Playgrounds to Battlegrounds -- pt. II. Offensive Information Warfare. Ch. 4. Open Sources. Ch. 5. Psyops and Perception Management. Ch. 6. Inside the Fence. Ch. 7. Seizing the Signals. Ch. 8. Computer Break-Ins and Hacking. Ch. 9. Masquerade. Ch. 10. Cyberplagues -- pt. III. Defensive Information Warfare. Ch. 11. Secret Codes and Hideaways. Ch. 12. How to Tell a Fake. Ch. 13. Monitors and Gatekeepers. Ch. 14. In a Risky World. Ch. 15. Defending the Nation.".
- catalog extent "xvii, 522 p. :".
- catalog identifier "0201433036 (acid-free paper)".
- catalog issued "1999".
- catalog issued "c1999.".
- catalog language "eng".
- catalog publisher "New York : ACM Press ; Reading, Ma. : Addison-Wesley,".
- catalog spatial "United States.".
- catalog subject "355.3/43 21".
- catalog subject "Information warfare United States.".
- catalog subject "Information warfare.".
- catalog subject "National security United States.".
- catalog subject "U163 .D46 1999".
- catalog tableOfContents "pt. I. Introduction. Ch. 1. Gulf War -- Infowar. Ch. 2. A Theory of Information Warfare. Ch. 3. Playgrounds to Battlegrounds -- pt. II. Offensive Information Warfare. Ch. 4. Open Sources. Ch. 5. Psyops and Perception Management. Ch. 6. Inside the Fence. Ch. 7. Seizing the Signals. Ch. 8. Computer Break-Ins and Hacking. Ch. 9. Masquerade. Ch. 10. Cyberplagues -- pt. III. Defensive Information Warfare. Ch. 11. Secret Codes and Hideaways. Ch. 12. How to Tell a Fake. Ch. 13. Monitors and Gatekeepers. Ch. 14. In a Risky World. Ch. 15. Defending the Nation.".
- catalog title "Information warfare and security / Dorothy E. Denning.".
- catalog type "text".