Summary and Conclusions
The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download to read the full chapter text
Chapter PDF
References
Yashwant Deva, “Cyber Surveillance: Threats and New Technologies,” Aakrosh, Forum for Strategic and Security Studies, [Strategic Affairs (Stratmag.com) is an unofficial Defence website, which is not endorsed or recognized by any Government or its institutions. All the material published on this site is in the public domain. The views represented in this site are those of the authors alone.], 2004.
John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition, Charles River Media, 2005.
Kevin McLaughlin, “RFID Tags May Provide New ‘In’ For Hackers,” CRN, Copyright © 2006 CMP Media LLC, CMP Media LLC, 600 Community Drive, Manhasset, New York 11030, page 57, March 27, 2006.
John R. Vacca, Guide to Wireless Network Security, Springer, 2006.
John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). How Masqueraders Infiltrate a System. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-29844-3_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40533-9
Online ISBN: 978-0-387-29844-3
eBook Packages: Computer ScienceComputer Science (R0)