Buy Used
CDN$ 27.09
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Moderate wear on cover and edges. Minimal highlighting and/or other markings can be present. May be ex-library copy and may not include CD, Accessories and/or Dust Cover. Good readable copy.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security Paperback – Jul 31 2005

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 71.39 CDN$ 27.09

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 155 pages
  • Publisher: United Nations Pubns; 2nd edition (July 31 2005)
  • Language: English
  • ISBN-10: 9211045304
  • ISBN-13: 978-9211045307
  • Product Dimensions: 15.5 x 0.9 x 23 cm
  • Shipping Weight: 204 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #3,283,017 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) HASH(0x9e676d68) out of 5 stars 1 review
HASH(0x9e9edc78) out of 5 stars educates a general audience Sept. 10 2005
By W Boudville - Published on
Format: Paperback
This guide is written for a general, non-technical audience. It attempts to educate the reader in the common types of malware and cyber attacks that are now seen globally. The scope of the threats vary. Some are the equivalent of graffiti on billboards. Breakins to computers just for the heck of it. Hooliganism, as the book calls it.

But there are more serious attacks. Phishing-style, for example. Where financial fraud is being tried on an unwary user. No adequate technical answer is given to this by the book.

Further along the scale of severity is cyber terrorism, or even cyber war. These are disguished by the former being done by groups unaffiliated with any government. While the latter is, or might be, performed by one government on another. Thus far, few real and damaging examples of cyber terrorism have surfaced. Nuisance value events that might be construed as cyber terrorism have occasionally surfaced in recent years. But nothing more dire.