IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Managerial Guide for Handling Cyber-Terrorism and Information Warfare
Author(s)/Editor(s): Lech Janczewski (University of Auckland, New Zealand)and Andrew Colarik (AndrewColarik.com, USA)
Copyright: ©2005
DOI: 10.4018/978-1-59140-583-2
ISBN13: 9781591405832
ISBN10: 1591405831
EISBN13: 9781591405504

Purchase

View Managerial Guide for Handling Cyber-Terrorism and Information Warfare on the publisher's website for pricing and purchasing information.


Description

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling Cyber-Terrorism and Information Warfare defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

Listen to Dr. Andrew Colarik's appearance on Fox News (http://www.andrewcolarik.com/press.htm) concerning world terrorism, as well as the one hour discussion about this title on MyTechnologyLawyer.com.



Reviews and Testimonials

Managerial Guide for Handling Cyber-Terrorism and Information Warfare, published by Idea Group Publishing, is a book that explains in very understandable ways the complex issues of cyber-terrorism and information warfare. Each of us who wants to apply the information superhighway without accidents must read this book.

– Andrew Targowski, Western Michigan University, USA

Comprised of 54 chapters, this collection describes the different attacks conducted against electronic data processing facilities and discusses techniques for detecting and preventing such attacks.

– Book News (November 2007)

Author's/Editor's Biography

Lech Janczewski
Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).

Andrew Colarik
Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents.

More...
Less...

Body Bottom