Chapter 17. Cyber Terrorism

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

Image Defend against computer-based espionage.

Image Employ defenses against computer-based terrorism.

Image Choose appropriate defense strategies for your network.

Image Employ defenses against information warfare.

Introduction ...

Get Network Defense and Countermeasures: Principles and Practices, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.