Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
  Top » Catalog » Books » Internet » My Account  |  Cart Contents  |  Checkout   
Quick Find
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Brain, Body, Cognition - A continuation of Functional Neurology, Rehabilitation and Ergonomics
Shopping Cart more
0 items
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
01.Mobile Telephones: Networks, Applications, and Performance
02.Internet and Suicide
03.Academic Librarianship in the 21st Century
04.Cybersecurity, Botnets, and Cyberterrorism
05.Cyberterrorism and Computer Attacks
06.Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
07.Cyberinfrastructure Technologies and Applications
08.The E-Society
09.Building an Intelligent Assisted Instructional Design System
10.Data Security Breaches: Context and Incident Summaries
Notifications more
NotificationsNotify me of updates to Computer Attack and Cyberterrorism
Tell A Friend
Tell someone you know about this product.
Computer Attack and Cyberterrorism
Retail Price: $59.00
10% Online Discount
You Pay:

Authors: Clay Wilson 
Book Description:
Many International terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a coordinated attacks against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a coordinated cyberattack against the U.S. Critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorist goals. This new book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack.

Table of Contents:

Chapter 1. Introduction
(pg. 1-2)

Chapter 2. Background
(pg. 3-22)

Chapter 3. Issues for Congress
(pg. 23-34)

Chapter 4. Legislative Activity
(Pg. 35-36)

Appendix A Planning for a Cyberattack
(Pg. 37-40)

Appendix B Characteristics of Malicious Code
(Pg. 41-44)

Appendix C Similarities in Tactics Used for Cyberattacks and
Conventional Terrorist Attacks

(Pg. 47-66)


      Computer Science, Technology and Applications
   Binding: Softcover
   Pub. Date: 2009
   Pages: 6 x 9 , 75 pp.
   ISBN: 978-1-60692-337-5
   Status: AV
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2021

Computer Attack and Cyberterrorism