Add to Book Shelf
Flag as Inappropriate
Email this Book

Conflict and the Computer : Information Warfare and Related Ethical Issues

By Nitzberg, Sam

Click here to view

Book Id: WPLBN0000692046
Format Type: PDF eBook:
File Size: 0.3 MB
Reproduction Date: 2005

Title: Conflict and the Computer : Information Warfare and Related Ethical Issues  
Author: Nitzberg, Sam
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Nitzberg, B. S. (n.d.). Conflict and the Computer : Information Warfare and Related Ethical Issues. Retrieved from http://self.gutenberg.org/


Description
Technical Reference Publication

Excerpt
Introduction: This paper discusses information warfare and ethical issues by providing an overview to the subject of information warfare, and a brief discussion of warfare and historical notions of just war. Following this, issues are discussed which describe significant areas of interest to both the ?underdog? and the ?fat cat,? those either seeking or holding power, respectively, through the use of information warfare. A brief guide follows recommending how an organization (small or large) may defend itself in light of the material presented, along with an appropriate conclusion.

Table of Contents
Table of Contents 22nd National Information Systems Security Conference Conference Committee 1999 National Computer Systems Security Award Papers Find and Fix Y2K Embedded Equipment Risks Dick Lefkon, New York University Are Organizations Ready for the Electronic Renaissance in Communications? Email Monitoring & Privacy Issues Jim Kates, Phillip Whited, IntraSec Corporation Making Netscape Compatible with Fortezza? ? Lessons Learned George Ryan, Pulse Engineering, Inc. Active Networks and Security Vijay Varadharajan, Rajan Shankaran, Michael Hitchens, University of W. Sydney Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi, Mississippi State University Attitude Adjustment: Trojans and Malware on the Internet: an Update Sarah Gordon, David Chess, IBM Thomas J. Watson Research Center The Network Vulnerability Tool (NVT) ? A System Vulnerability Visualization Architecture. Ronda Henning, Ph.D., Kevin L. Fox, Ph.D., Harris Corporation Implementation of Mulitple Access Control Policies within a CORBASEC Framework Ramaswamy Chandramouli, National Institute for Standards and Technology A Trace-Based Model of the Chinese Wall Security Policy Ann E. Kelley Sobel, Miami University (Ohio) Jim Alves-Foss, University of Idaho Digital Watermark Mobile Agents Jian Zhao, Chenghui Luo, Fraunhofer Center for Research in Computer Graphics, Inc. Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta, University of Memphis From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour Dr. Klaus Brunnstein, University of Hamburg, Germany P3I - Protection Profile Process Improvement Jeffrey R. Williams, Karen M. Ferraiolo, Arca Systems, Inc. Protection Profiles for Certificate Issuing & Management Systems A. Arsenault, National Security Agency R. Housley, Spyrus Common Criteria Evaulations in the US: What a Developer Should Know Kimberly S. Caplan, Douglas Stuart, CISSP, Computer Sciences Corporation

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.