Books on Computers & the Web

Search by Author I Search by Title I Search by ISBN

Book Tour I Similar Books I Shipping Costs I Contact Us I Home

 

 

 

 

 

 

 

Are You Ready for Information Warfare?

 

Security for Personal Computers, Networks

and Telecommunication Systems


By Gregory J. Petrakis, Ph.D.





HOW THIS BOOK WILL HELP YOU


This book is an antidote against hackers and information theft that every business person should read, if they want to survive in our new information age.

 

The author, Gregory J. Petrakis Ph.D., is an expert in computer and telecommunications security. He is Adjunct Professor at the University of Missouri-Kansas City.

 

Dr. Petrakis states: "The Gutenberg press has symbolically evolved into Netscape's Navigator and Microsoft's Internet Explorer. Digital data is supreme over the written word, and access to data is simple and easy to obtain. Information warfare has moved into cyberspace."


The author claims: "Information warfare is, in a general sense, the manipulation of the flow of information. Information warfare is a massive battle waged daily around the globe....Information Warfare surrounds us everyday and we fail to see it." He then talks about the enemy: "The Information Warrior has specific goals in mind at the beginning of an engagement: to steal information, modify information or destroy the informational infrastructure."


Dr. Petrakis takes a look at the conventional and unconventional weapons that are used in computer crime and then lays out the counter-attack. He examines virus protection and discusses security planning for prevention, detection, deterrence and recovery. He takes a look at computer security and safeguard techniques and then examines the whole area of telecommunications.

 

This book is essential reading if you use personal computers, networks or telecommunication systems. It will almost certainly keep you awake at night until you have implemented its recommendations!




CONTENTS

 

Introduction: A New Age

Binary Schizophrenia

Events in Cyberspace


Chapter 1: Information Warfare

An Information Warrior

Simple and Clear Cut

Style Over Force


Chapter 2: A New Battlefield

The Internet

How the Internet Works

The Web

How The Web Works

 

Chapter 3: Weapons

Conventional

Unconventional


Chapter 4: Computer Crime

Elements of Computer Crime

Understanding the Problem

How it Happens


Chapter 5: Security Hazards

Computer Security Importance

Network Security Importance

Types of Security Hazards

 

Chapter 6: Virus Prevention in General

User Education

Software Management

Technical Controls

General Monitoring

Contingency Planning

 

Chapter 7: Virus Prevention for Multi-User Computers and Associated Networks

General Policies

Technical Controls

Monitoring

Contingency Planning

 

Chapter 8: Virus Protection for Personal Computers

General Policies

Software Management

Technical Controls

Monitoring

Contingency Planning

Associated Network Concerns


Chapter 9: Computer Security Planning for Prevention, Detection, Deterrence and Recovery

Security Breach Detection

Avoidance of Physical Hazards

Supervision of Employees

Prevention and Deterrence

Recovery and Correction

Security System Evaluation Criteria

Contingency Plans


Chapter 10: Computer Security Safeguard Techniques

Access Control

Physical

Logical

Encryption

Communications Security

Protocols

Vulnerability of Computer Security Measures


Chapter 11: Internal Security Management Information System Review of the Internal Revenue Service

Background

Investigated Data Have Limited Value

 

Chapter 12: Uniform Data Inquiry Technique (Audit) Retrieval


Chapter 13: Taking a Byte out of Computer Crime:

The National Information Infrastructure Protection Act of 1996 by David M. Lurie, J.D.


Chapter 14: Introduction to Telecommunications Management Strategic Operational Plans

Short Term Telecommunications Planning

Long Term Telecommunications Planning

Technology

Voice and Data

Financial

Options

Implementation

Equipment Conversions and Installations

Selection of Network Equipment

Basic Telephony

Transmission Media

Information Networking

Network Information Transmission

Switching

What in the World is a CAP

The Information Highway

 

Chapter 15: Current Issues in Systems Security

Data Encryption for Telecommunications

Cellular Communications


Chapter 16: The Future of Telecommunications

Paperless Offices

Personal Phones

Personal Computer Information Services

Bellcore Movie System

The Information Highway

Conclusion

 

Glossary and Abbreviations


Bibliography



Are You Ready for Information Warfare? Security for Personal Computers, Networks and Telecommunication Systems by Gregory J. Petrakis, Ph.D., 206 pages, softcover; ISBN 978-1-896210-94-0; $34.95 ($US).   


Toll-Free Order Desk (Canada & US Only): 1-(877) 879-2669  (9am to 5pm Eastern Standard Time)

 

To place your order by fax using a credit card, download the following order form and fax to (416) 322-7434

 

To use the mail and pay by check or credit card, please download the following order form and mail to:

Productive Publications

7-B Pleasant Blvd., #1210

Toronto, ON  M4T 1K2

CANADA

 

Order Desk for Outside of Canada please phone: + (416) 322-9896 (9am to 5pm Eastern Standard Time)

 

For enquiries or for rates on overseas shipping charges (outside of Canada or USA) please e-mail: 

ProductivePublications@rogers.com

 

 

Canadians - please order on our $CDN Web at:   www.ProductivePublications.ca

 

 

 

OTHER BOOKS ON COMPUTERS & THE INTERNET

 

 

RETURN TO HOME PAGE

 

 

 

Copyright 2015 Productive Publications