![]() |
Books on Computers & the Internet Search by Author I Search by Title I Search by ISBN Book Tour I Similar Books I Shipping Costs I Contact Us I Home |
ORDER NOW toll-free at 1-(877) 879-2669
Are You Ready for Information Warfare?
Security for Personal Computers, Networks and Telecommunication Systems
The author, Gregory J. Petrakis Ph.D., is an expert in computer and telecommunications security. He is Adjunct Professor at the University of Missouri-Kansas City.
Dr. Petrakis states: "The Gutenberg press has symbolically evolved into Netscape's Navigator and Microsoft's Internet Explorer. Digital data is supreme over the written word, and access to data is simple and easy to obtain. Information warfare has moved into cyberspace."
This book is essential reading if you use personal computers, networks or telecommunication systems. It will almost certainly keep you awake at night until you have implemented its recommendations!
Introduction: A New Age Binary Schizophrenia Events in Cyberspace
An Information Warrior Simple and Clear Cut Style Over Force
The Internet How the Internet Works The Web How The Web Works
Chapter 3: Weapons Conventional Unconventional
Elements of Computer Crime Understanding the Problem How it Happens
Computer Security Importance Network Security Importance Types of Security Hazards
Chapter 6: Virus Prevention in General User Education Software Management Technical Controls General Monitoring Contingency Planning
Chapter 7: Virus Prevention for Multi-User Computers and Associated Networks General Policies Technical Controls Monitoring Contingency Planning
Chapter 8: Virus Protection for Personal Computers General Policies Software Management Technical Controls Monitoring Contingency Planning Associated Network Concerns
Security Breach Detection Avoidance of Physical Hazards Supervision of Employees Prevention and Deterrence Recovery and Correction Security System Evaluation Criteria Contingency Plans
Access Control Physical Logical Encryption Communications Security Protocols Vulnerability of Computer Security Measures
Background Investigated Data Have Limited Value
Chapter 12: Uniform Data Inquiry Technique (Audit) Retrieval
The National Information Infrastructure Protection Act of 1996 by David M. Lurie, J.D.
Short Term Telecommunications Planning Long Term Telecommunications Planning Technology Voice and Data Financial Options Implementation Equipment Conversions and Installations Selection of Network Equipment Basic Telephony Transmission Media Information Networking Network Information Transmission Switching What in the World is a CAP The Information Highway
Chapter 15: Current Issues in Systems Security Data Encryption for Telecommunications Cellular Communications
Paperless Offices Personal Phones Personal Computer Information Services Bellcore Movie System The Information Highway Conclusion
Glossary and Abbreviations
Are You Ready for Information Warfare? Security for Personal Computers, Networks and Telecommunication Systems by Gregory J. Petrakis, Ph.D., 206 pages, softcover; ISBN 978-1-896210-94-0; published in 1998; Canadian: $34.95. ![]()
Toll-Free Order Desk (Canada & US Only): 1-(877) 879-2669 (9 a.m. to 5 p.m. Eastern Standard Time)
To place order by fax using a credit card, download the following order form and fax to (416) 322-7434
By mail, please pay by cheque or credit card, download the following order form and mail to: Productive Publications 380 Brooke Ave. North York, ON M5M 2L6 CANADA
US and Overseas customers please place your order on our $US Web Site: www.ProductivePublications.com
Order Desk for Outside of Canada & USA phone: + (416) 322-9896 (9 a.m. to 5 p.m. Eastern Standard Time)
For enquiries or for rates on overseas shipping charges (outside of Canada & USA) please e-mail: productivepublications@gmail.com
OTHER BOOKS ON COMPUTERS & THE INTERNET
Copyright: 2020 Productive Publications
|