Chapter 17. Cyber Terrorism

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

Image Defend against computer-based espionage.

Image Employ defenses against computer-based terrorism.

Image Choose appropriate defense strategies for your network.

Image Employ defenses against information warfare.

Introduction ...

Get Network Defense and Countermeasures: Principles and Practices, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.