Vous voulez voir cette page en français ? Cliquez ici.

Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security [Paperback]

Eduardo Gelbstein , Ahmad Kamal


Available from these sellers.


Join Amazon Student in Canada


Book Description

July 31 2005 9211045304 978-9211045307 2nd
A guide to computer security that attempts to create awareness about the dangers of cyber-hooliganism, cyber-crime, cyber-terrorism and cyber-war, inherent in the opportunities for good and evil that have been opened up in information technology. It is written for the general reader.

Product Details


Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.0 out of 5 stars  1 review
4.0 out of 5 stars educates a general audience Sept. 10 2005
By W Boudville - Published on Amazon.com
Format:Paperback
This guide is written for a general, non-technical audience. It attempts to educate the reader in the common types of malware and cyber attacks that are now seen globally. The scope of the threats vary. Some are the equivalent of graffiti on billboards. Breakins to computers just for the heck of it. Hooliganism, as the book calls it.

But there are more serious attacks. Phishing-style, for example. Where financial fraud is being tried on an unwary user. No adequate technical answer is given to this by the book.

Further along the scale of severity is cyber terrorism, or even cyber war. These are disguished by the former being done by groups unaffiliated with any government. While the latter is, or might be, performed by one government on another. Thus far, few real and damaging examples of cyber terrorism have surfaced. Nuisance value events that might be construed as cyber terrorism have occasionally surfaced in recent years. But nothing more dire.

Look for similar items by category


Feedback