![]() |
Books on Computers & the Web Search by Author I Search by Title I Search by ISBN Book Tour I Similar Books I Shipping Costs I Contact Us I Home |
Are You Ready for Information Warfare?
Security for Personal Computers, Networks and Telecommunication Systems
The author, Gregory J. Petrakis Ph.D., is an expert in computer and telecommunications security. He is Adjunct Professor at the University of Missouri-Kansas City.
Dr. Petrakis states: "The Gutenberg press has symbolically evolved into Netscape's Navigator and Microsoft's Internet Explorer. Digital data is supreme over the written word, and access to data is simple and easy to obtain. Information warfare has moved into cyberspace."
This book is essential reading if you use personal computers, networks or telecommunication systems. It will almost certainly keep you awake at night until you have implemented its recommendations!
Introduction: A New Age Binary Schizophrenia Events in Cyberspace
An Information Warrior Simple and Clear Cut Style Over Force
The Internet How the Internet Works The Web How The Web Works
Chapter 3: Weapons Conventional Unconventional
Elements of Computer Crime Understanding the Problem How it Happens
Computer Security Importance Network Security Importance Types of Security Hazards
Chapter 6: Virus Prevention in General User Education Software Management Technical Controls General Monitoring Contingency Planning
Chapter 7: Virus Prevention for Multi-User Computers and Associated Networks General Policies Technical Controls Monitoring Contingency Planning
Chapter 8: Virus Protection for Personal Computers General Policies Software Management Technical Controls Monitoring Contingency Planning Associated Network Concerns
Security Breach Detection Avoidance of Physical Hazards Supervision of Employees Prevention and Deterrence Recovery and Correction Security System Evaluation Criteria Contingency Plans
Access Control Physical Logical Encryption Communications Security Protocols Vulnerability of Computer Security Measures
Background Investigated Data Have Limited Value
Chapter 12: Uniform Data Inquiry Technique (Audit) Retrieval
The National Information Infrastructure Protection Act of 1996 by David M. Lurie, J.D.
Short Term Telecommunications Planning Long Term Telecommunications Planning Technology Voice and Data Financial Options Implementation Equipment Conversions and Installations Selection of Network Equipment Basic Telephony Transmission Media Information Networking Network Information Transmission Switching What in the World is a CAP The Information Highway
Chapter 15: Current Issues in Systems Security Data Encryption for Telecommunications Cellular Communications
Paperless Offices Personal Phones Personal Computer Information Services Bellcore Movie System The Information Highway Conclusion
Glossary and Abbreviations
Are You Ready for Information Warfare? Security for Personal Computers, Networks and Telecommunication Systems by Gregory J. Petrakis, Ph.D., 206 pages, softcover; ISBN 978-1-896210-94-0; $34.95 .
![]() Toll-Free
Order Desk (Canada & US Only): 1-(877) 879-2669 (9am to 5pm Eastern
Standard Time) To
place
To use the mail and pay by check or credit card, please download the following order form and mail to: Productive Publications 380 Brooke Ave. North York, ON M5M 2L6 CANADA
Order Desk for Outside of Canada please phone: + (416) 322-9896 (9am to 5pm Eastern Standard Time)
For enquiries or for rates on overseas shipping charges (outside of Canada or USA) please e-mail: productivepublications@gmail.com
Canadians - please order on our $CDN Web at: www.ProductivePublications.ca
OTHER BOOKS ON COMPUTERS & THE INTERNET
Copyright: 2020 Productive Publications
|