Home
»
Information Technology for Counterterrorism
National Research Council | Division on Engineering and Physical Sciences | Computer Science and Telecommunications Board | Committee on the Role of Information Technology in Responding to Terrorism
Information Technology for Counterterrorism
★★★★★
★★★★★
Regular price
€45.99
A01=Committee on the Role of Information Technology in Responding to Terrorism
A01=Computer Science and Telecommunications Board
A01=Division on Engineering and Physical Sciences
A01=National Research Council
Author_Committee on the Role of Information Technology in Responding to Terrorism
Author_Computer Science and Telecommunications Board
Author_Division on Engineering and Physical Sciences
Author_National Research Council
Category=JPWL
Category=U
eq_bestseller
eq_computing
eq_isMigrated=1
eq_nobargain
eq_non-fiction
eq_society-politics
Product details
- ISBN 9780309087360
- Dimensions: 152 x 229mm
- Publication Date: 07 Apr 2003
- Publisher: National Academies Press
- Publication City/Country: US
- Product Form: Paperback
Delivery/Collection within 10-20 working days
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.
Table of Contents
- Front Matter
- Executive Summary
- 1 Background and Introduction
- 2 Types of Threats Associated with Information Technology Infrastructure
- 3 Investing in Information Technology Research
- 4 What Can Be Done Now?
- 5 Rationalizing the Future Research Agenda
- Appendix: Biographies of Committee and Staff Members
- What is CSTB?
John L. Hennessy, David A. Patterson, and Herbert S. Lin, Editors, Committee on the Role of Information Technology in Responding to Terrorism, National Research Council
Qty:
