Coverart for item
The Resource Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization, Pauline C. Reich and Eduardo Gelbstein, editors

Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization, Pauline C. Reich and Eduardo Gelbstein, editors

Label
Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization
Title
Law, policy, and technology
Title remainder
cyberterrorism, information warfare, and Internet immobilization
Statement of responsibility
Pauline C. Reich and Eduardo Gelbstein, editors
Contributor
Subject
Language
eng
Summary
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact"--Provided by publisher
Cataloging source
DLC
Dewey number
363.325
Index
index present
LC call number
HV6773.15.C97
LC item number
L39 2012
Literary form
non fiction
Nature of contents
bibliography
Label
Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization, Pauline C. Reich and Eduardo Gelbstein, editors
Instantiates
Publication
Bibliography note
Includes bibliographical references (p. 447-491) and index
Contents
  • Eduardo Gelbstein
  • Threats, vulnerability, uncertainty, and information risk
  • Eduardo Gelbstein
  • ICT and security governance : doing the right things the right way (and well enough)
  • Eduardo Gelbstein , Tom Kellerman
  • Concerns about what will happen next : should these things keep you awake at night?
  • Eduardo Gelbstein
  • Law and policy perspectives.
  • Introduction:
  • Weak legal framework and limited international cooperation
  • Setting the scene for cyberterrorism and other cyber attacks.
  • Eduardo Gelbstein
  • To define or not to define : law and policy conundrums for the cybercrime, national security, international law and military law communities
  • Pauline C. Reich
  • Anonymity, actual incidents, cyber attacks, and digital mobilization
  • Pauline C. Reich, Stuart Weinstein, Charles Wild, Allan S. Cabanlong
  • Culture clashes : freedom, privacy, and government surveillance issues arising in relation to national security and internet use
  • Pauline C. Reich
  • What is cyberterrorism and how real is the threat? : a review of the academic literature, 1996-2009
  • Maura Conway
  • Cyber-search and cyber-seizure : policy considerations of cyber operations and Fourth Amendment implications
  • The security practitioners' perspective
  • Catherine B. Lotrionte
  • Terrorism and the internet : do we need an international solution?
  • Gilbert Ramsay
  • Case study : India : terrorism and terrorist use of the internet/technology
  • Pauline C. Reich
  • China's cyber tool : striving to attain electronic shi?
  • Timothy L. Thomas
  • The United Kingdom's Centre for the Protection of National Infrastructure : an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructure
  • Stuart Weinstein, Charles Wild
  • Eduardo Gelbstein
  • Economic, political, and social threats in the information age
  • Eduardo Gelbstein, Marcus Wuest, Stephen Fridakis
  • Critical information infrastructure and cyber-terrorism
  • Olivia Bosch
  • Attackers : internal and external
Dimensions
29 cm.
Extent
xv, 496 p.
Isbn
9781615208326
Isbn Type
(ebook)
Lccn
2012004590
Other control number
40021618610
System control number
  • (OCoLC)842839755
  • UtOrBLW
  • (OCoLC)617382284
Label
Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization, Pauline C. Reich and Eduardo Gelbstein, editors
Publication
Bibliography note
Includes bibliographical references (p. 447-491) and index
Contents
  • Eduardo Gelbstein
  • Threats, vulnerability, uncertainty, and information risk
  • Eduardo Gelbstein
  • ICT and security governance : doing the right things the right way (and well enough)
  • Eduardo Gelbstein , Tom Kellerman
  • Concerns about what will happen next : should these things keep you awake at night?
  • Eduardo Gelbstein
  • Law and policy perspectives.
  • Introduction:
  • Weak legal framework and limited international cooperation
  • Setting the scene for cyberterrorism and other cyber attacks.
  • Eduardo Gelbstein
  • To define or not to define : law and policy conundrums for the cybercrime, national security, international law and military law communities
  • Pauline C. Reich
  • Anonymity, actual incidents, cyber attacks, and digital mobilization
  • Pauline C. Reich, Stuart Weinstein, Charles Wild, Allan S. Cabanlong
  • Culture clashes : freedom, privacy, and government surveillance issues arising in relation to national security and internet use
  • Pauline C. Reich
  • What is cyberterrorism and how real is the threat? : a review of the academic literature, 1996-2009
  • Maura Conway
  • Cyber-search and cyber-seizure : policy considerations of cyber operations and Fourth Amendment implications
  • The security practitioners' perspective
  • Catherine B. Lotrionte
  • Terrorism and the internet : do we need an international solution?
  • Gilbert Ramsay
  • Case study : India : terrorism and terrorist use of the internet/technology
  • Pauline C. Reich
  • China's cyber tool : striving to attain electronic shi?
  • Timothy L. Thomas
  • The United Kingdom's Centre for the Protection of National Infrastructure : an evaluation of the UK government's response mechanism to cyber attacks on critical infrastructure
  • Stuart Weinstein, Charles Wild
  • Eduardo Gelbstein
  • Economic, political, and social threats in the information age
  • Eduardo Gelbstein, Marcus Wuest, Stephen Fridakis
  • Critical information infrastructure and cyber-terrorism
  • Olivia Bosch
  • Attackers : internal and external
Dimensions
29 cm.
Extent
xv, 496 p.
Isbn
9781615208326
Isbn Type
(ebook)
Lccn
2012004590
Other control number
40021618610
System control number
  • (OCoLC)842839755
  • UtOrBLW
  • (OCoLC)617382284

Library Locations

    • BYU-LAWBorrow it
      Howard W. Hunter Law Library Brigham Young University, Provo, UT, 84602, US
      40.249603 -111.645501
Processing Feedback ...