Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security Paperback – Jul 31 2005

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 80.07 CDN$ 64.34

Save an Additional 10% on Textbooks When you Join Amazon Student

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Paperback: 155 pages
  • Publisher: United Nations Pubns; 2nd edition (July 31 2005)
  • Language: English
  • ISBN-10: 9211045304
  • ISBN-13: 978-9211045307
  • Product Dimensions: 15.5 x 0.9 x 23 cm
  • Shipping Weight: 204 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #3,088,671 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x9ed36da4) out of 5 stars 1 review
HASH(0x9ede8bdc) out of 5 stars educates a general audience Sept. 10 2005
By W Boudville - Published on Amazon.com
Format: Paperback
This guide is written for a general, non-technical audience. It attempts to educate the reader in the common types of malware and cyber attacks that are now seen globally. The scope of the threats vary. Some are the equivalent of graffiti on billboards. Breakins to computers just for the heck of it. Hooliganism, as the book calls it.

But there are more serious attacks. Phishing-style, for example. Where financial fraud is being tried on an unwary user. No adequate technical answer is given to this by the book.

Further along the scale of severity is cyber terrorism, or even cyber war. These are disguished by the former being done by groups unaffiliated with any government. While the latter is, or might be, performed by one government on another. Thus far, few real and damaging examples of cyber terrorism have surfaced. Nuisance value events that might be construed as cyber terrorism have occasionally surfaced in recent years. But nothing more dire.