Chapter 17. Cyber Terrorism
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Defend against computer-based espionage.
Employ defenses against computer-based terrorism.
Choose appropriate defense strategies for your network.
Employ defenses against information warfare.
Introduction ...
Get Network Defense and Countermeasures: Principles and Practices, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.