[ISN] Information Warfare and Security by: Dorothy Denning

From: mea culpa (jerichoat_private)
Date: Fri Feb 12 1999 - 17:28:36 PST

  • Next message: mea culpa: "[ISN] Experts say computer hacker menace growing"

    [Moderator: Chapter 8, pg 203: "The chapter gives a sampling of hacking
     tools and techniques but is not exhaustive. Additional methods are
     described in the next two chapters. A good, in-depth guide to hacking is
     Carolyn Meinel's book The Happy Hacker." Enough said.]
    
    Forwarded From: William Knowles <erehwonat_private>
    
    Information Warfare and Security
    by: Dorothy E. Denning
    part of the ACM Press
     
    What individuals, corporations, and governments need to know about
    information-related attacks and defenses!
     
    Every day, we hear reports of hackers who have penetrated computer
    networks, vandalized Web pages, and accessed sensitive information. We
    hear how they have tampered with medical records, disrupted emergency 911
    systems, and siphoned money from bank accounts. Could information
    terrorists, using nothing more than a personal computer, cause planes to
    crash, widespread power blackouts, or financial chaos? Such real and
    imaginary scenarios, and our defense against them, are the stuff of
    information warfare-operations that target or exploit information media to
    win some objective over an adversary.
     
    Dorothy E. Denning, a pioneer in computer security, provides in this book
    a framework for understanding and dealing with information-based threats:
    computer break-ins, fraud, sabotage, espionage, piracy, identity theft,
    invasions of privacy, and electronic warfare. She describes these attacks
    with astonishing, real examples, as in her analysis of information warfare
    operations during the Gulf War. Then, offering sound advice for security
    practices and policies, she explains countermeasures that are both
    possible and necessary. 
    
    You will find in this book:
    
       * A comprehensive and coherent treatment of offensive and defensive
         information warfare, identifying the key actors, targets,
         methods, technologies, outcomes, policies, and laws;
    
       * A theory of information warfare that explains and integrates
         within a single framework operations involving diverse actors and
         media;
    
       * An accurate picture of the threats, illuminated by actual
         incidents;
    
       * A description of information warfare technologies and their
         limitations, particularly the limitations of defensive
         technologies.
    
    Whatever your interest or role in the emerging field of information
    warfare, this book will give you the background you need to make informed
    judgments about potential threats and our defenses against them. 
    
    ISBN: 0-201-43303-6
    pages: 544
    1999
    binding: Paper
    
    ----------------------------------------------------------------------
     
    Professor Denning's informative Web site:
    http://www.cosc.georgetown.edu/~denning/
    
     
    
    -o-
    Subscribe: mail majordomoat_private with "subscribe isn".
    Today's ISN Sponsor: Internet Security Institute [www.isi-sec.com]
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:18:50 PDT