Information warfare and security Dorothy E. Denning.
Publisher: India : Reading, Ma. : ACM Press ; Addison-Wesley, c1999Description: xvii, 522 p. : ill. ; 24 cmISBN: 0201433036 (acid-free paper)Subject(s): Information warfare | Information warfare -- United States | National security -- United StatesReview: "In Information Warfare and Security, Dorothy E. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary."--BK JACKET.| Item type | Current location | Home library | Collection | Shelving location | Call number | Status | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|
Book
|
Central Library (CL) | Central Library (CL) | NFIC | First Floor - Artificial Intelligence/Data Mining | 005.8 DEN (Browse shelf) | Available | SEECS001726 |
Total holds: 0
Browsing Central Library (CL) shelves, Shelving location: First Floor - Artificial Intelligence/Data Mining Close shelf browser
| 005.8 DAV IPSec : securing VPNs | 005.8 DEA The complete Cisco VPN configuration guide | 005.8 DEN User's guide to cryptography and standards | 005.8 DEN Information warfare and security | 005.8 DOR IP Sec: the new security standard for the Internet, intranets, and virtual private networks | 005.8 DWI Mobile application security | 005.8 EAR Wireless security handbook |
"In Information Warfare and Security, Dorothy E. Denning, a pioneer in computer security, provides a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary."--BK JACKET.

Book
There are no comments on this title.