Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves

  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Paperback
  • Copyright: 2000-03-01
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
    Android 2.2 +
    Our reader is compatible
    Kindle Fire
    Our reader is compatible
    10 / 8 / 7 / Vista / XP
    Our reader is compatible
    Our reader is compatible
List Price: $49.99 Save up to $7.50
  • Buy New
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Offers a guide to defending your digital assets against all manner of threats, whatever their motivation or source. Discusses the growing vulnerability of digital information and the importance of protecting of this information. Softcover.

Author Biography

Daniel J. Ryan is currently an Adjunct Professor of Information Security and Internet Law for George Washington University and James Madison University.

Table of Contents

Part I: Digital Espionage, Warfare and Information Security (INFOSEC).

Chapter 1: Introduction to Digital Espionage.

Chapter 2: Foundations of Information Security (INFOSEC).

Part II: Infosec Concepts.

Chapter 3: Risk Management and Architecture of Information Security (INFOSEC).

Chapter 4: Information Security Policy.

Chapter 5: Privacy in a Knowlede-Based Economy.

Chapter 6: Security Verification of Systems and Networks.

Part III: Practical Countermeasures.

Chapter 7: Cryptography.

Chapter 8: Access Controls--Two Views.

Chapter 9: Digital Signatures and Cetification Authorities--Technology, Policy, and Legal Issues.

Chapter 10: Permissions Management: Identification, Authentication, and Authorization (PMIAA).

Chapter 11: Virtual Private Networks.

Chapter 12: Biometric Countermeasures.

Part IV: Enterprise Continuity Planning.

Chapter 13: Before the Attack: Protect and Detect.

Chapter 14: During and After the Attack--Special Consideration--The Web Server.

Part V: Order of Battle.

Chapter 15: The Big Picture.

Chapter 16: Information Warfare.

Chapter 17: Information Warfare Weapons, Intelligence, and the Cyberspace Environment.

Chapter 18: Methods of Employment.

Chapter 19: Public Key Infrastructure: Building Trust Online.

Chapter 20: Cryptography Politics: Encryption Export Law and Its Impact on U.S. Industry.

Appendix A: The Information Technology Revolution.

Appendix B: Definitions of Electronic Signatures in Enacted State Legislation.

Appendix C: Enacted Legislation Authorizing the Use of Electronic Images.

Appendix D: Policy Initiatives--United States.

Appendix E: International--35 Countries and Political Entities Enact Digital Signature Legislation.

Appendix F: Bernstein and the Encryption Debate.

Appendix G: VPN Comparisons.

Appendix H: Liability of Certificate Auhorities Provisions Relating to Liability of Certification Authorities in States that Have Enacted Legislation.

Rewards Program

Write a Review