* This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures b