Intrusion detection systems and multisensor data fusion
Communications of the ACM
Integrating information security and intelligence courses
Security education and critical infrastructures
A national information infrastructure model for information warfare defence
Current security management & Ethical issues of information technology
An information-centric and proactive approach to Information Security teaching
International Journal of Information and Computer Security
Information Systems Security
Hi-index | 0.02 |
From the Publisher:Here's a systems engineering-level introduction to the growing field of Information Warfare (IW) the battlefield where information is both target and weapon. This comprehensive book provides engineers, system operators, and information technology users with an understandable overview of rapidly emerging threats to commercial, civil, and military information systems and shows how these threats can be identified and systems protected. Authored by a leading expert in advanced information-based technologies, this is the first book to detail the component principles, technologies, and tactics critical to success in the three key areas of IW: Information Dominance, Information Defense, and Information Offense. The author explains the quantification of information, describes the deductive, inductive and abductive processes that create knowledge, and provides essential technical background on: 聲 The knowledge creation processes of data fusion and data mining 聲 Information security technologies, including: encryption, authentication, authorization, and attack detection 聲 Information attack technologies, including: physical, infrastructure, and perceptual methods Adding to the book's value are extensive citations to relevant unclassified literature, numerous examples of practical defense-related systems, clear explanations of basic IW theory, and much deeper and broader coverage of security issues than found in typical Internet security books.