Computer crime: a crimefighter's handbook
Computer crime: a crimefighter's handbook
The impact of information—II: concepts of information and its value
Information Processing and Management: an International Journal
Computer related risks
Electronic commerce: a manager's guide
Electronic commerce: a manager's guide
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Security in computing
Computer security
Information Warfare Principles and Operations
Information Warfare Principles and Operations
Computer Security
The NCSA Guide to Enterprise Security: Protecting Information Assets
The NCSA Guide to Enterprise Security: Protecting Information Assets
Commonsense Computer Security
Cyberwar 2.0: Myths, Mysteries and Reality
Cyberwar 2.0: Myths, Mysteries and Reality
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Hacking Exposed Windows 2000: Network Security Secrets and Solutions
Hacking Exposed Windows 2000: Network Security Secrets and Solutions
Design of network security projects using honeypots
Journal of Computing Sciences in Colleges
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication
Journal of Management Information Systems
Hi-index | 0.00 |
For each layer of information security there is a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you cannot have the former without the latter. In today's technological & interconnected world, however, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and cost effective technique that can assure the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.