Law, Policy, and Technology

Law, Policy, and Technology : Cyberterrorism, Information Warfare, and Internet Immobilization

Edited by  , Edited by 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?


Law, Policy, and Technology: Cyberterorrism, Information Warfare, and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.
show more

Product details

  • Hardback | 350 pages
  • 218.44 x 281.94 x 33.02mm | 1,451.5g
  • Hershey, United States
  • English
  • black & white illustrations
  • 1615208313
  • 9781615208319
  • 1,614,218

Our customer reviews

Reich (Waseda U., Japan) and Gelbstein (Webster U., Switzerland) compile 16 chapters by law, security, and information professionals from Europe, the US, and Asia, who examine issues in cyber and information security; initiatives in law, policy, and information security to address them; and how to address gaps in these areas. They consider the nature of the problem, the parties that have an interest in disrupting technology infrastructures and computer systems, how attacks take place and how organizations can prepare for them, and when, where, and why they occur. They discuss the main challenges facing security practitioners; the economic, political, and social consequences of information security disruption; the relationship between critical information infrastructure and cyberterrorism; managing risks associated with information assets; standards and best practices; key vulnerabilities; the application of law and policy to actual incidents; the academic literature on cyberterrorism; the nature of cyber threats to government and private computer systems; whether an international solution to cyberterrorism is needed; and case studies from India, China, and the UK. - Annotation ©2013 Book News Inc. Portland, ORshow more
by Nathan