Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
Paperback

Information Technology for Counterterrorism: Immediate Actions and Future Possibilities

$159.99
Sign in or become a Readings Member to add this title to your wishlist.

Information technology (IT) is essential to virtually all critical infrastructures, making them vulnerable to a terrorist attack. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. This report states that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. It presents two recommendations on what can be done in the short term to protect communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
National Academies Press
Country
United States
Date
15 September 2003
Pages
144
ISBN
9780309087360

Information technology (IT) is essential to virtually all critical infrastructures, making them vulnerable to a terrorist attack. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. This report states that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. It presents two recommendations on what can be done in the short term to protect communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.

Read More
Format
Paperback
Publisher
National Academies Press
Country
United States
Date
15 September 2003
Pages
144
ISBN
9780309087360