It is not a surprise that the "softer" issues around Internet-based cyber-crime, cyber-terrorism, and information warfare are both unclear and constantly evolving. This edited volume, with 13 contributors including two editors who authored over half of the papers, claims to provide the perspective of practitioners. Despite "technology" appearing in the title, there is no significant treatment of technical issues or research. Throughout the volume, the underlying assumption is that attackers can exploit vulnerabilities while preserving their own anonymity. As a consequence, the volume disregards smart processes that can exploit fragmented information about attackers, leading to legal pursuit or counterattacks, not to mention penetration of attackers' resources. Almost no statistics are included on cyber-crime, terrorist incidents, or categorized cyber-attacks.
展开▼