1: Cyber-Terrorism: Fact or Fiction? 2: Black Ice: Cyber-Terrorism’s Hidden Dangers 3: Terror on a Wire: The Internet as Weapon 4: Terror in the Air: The Wireless Threat 5: Al-Qaeda: In Search of Bin Laden’s Hackers 6: Web of Terror: What al-Qaeda Knows about the U.S. 7: 9/11: The Cyber-terrorist Attack 8: Intelligence: Stopping the Next Attack 9: Dark Winter: Technology and Early Warning 10: Patriot Games: Security, Terror, Liberty 11: The War on Terror: Mobilizing for the Future A: Critical Infrastructures B: PDD-63 at a Glance C: Remarks on Cyber-Terrorism D: The Homeland Security Challenge: Source: U.S. Department of Homeland Security
Dan Verton (Burke, VA) is a senior writer at Computerworld,
specializing in Internet security, national security, critical
infrastructure protection, and corporate information security
policies. He has written hundreds of news stories, profiles
of government and industry leaders, and feature-length stories
related to Internet security, defense, and intelligence matters.
He is also the former Associate Editor, Defense, for the
trade publication Federal Computer Week.
Other publication credits include stories on information warfare
and corporate espionage for Business2.0, various Internet security
news stories for Information Security Magazine, CNN.com, The
Industry Standard, InfoWorld, and PC World.Dan has been asked to
speak at various Internet security conferences, including a recent
event at the United Nations in New York, where he moderated an
expert panel on security issues.Dan is a former intelligence
officer in the U.S. Marine Corps. While in the military, he served
as an information systems security officer and training officer for
various CIA and DIA database systems. Dan is also a former imagery
intelligence analyst with the U.S. Army Reserve.
Ask a Question About this Product More... |