Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 9 of 42
Previous Record Next Record
E-Book/E-Doc
Author Amoroso, Edward G.

Title Cyber attacks : protecting national infrastructure / Edward Amoroso.

Imprint Burlington, MA : Butterworth-Heinemann, ©2011.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Summary No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T.
Contents Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements.
Introduction -- Deception -- Separation -- Diversity -- Commonality -- Depth -- Discretion -- Collection -- Correlation -- Awareness -- Response.
Bibliography Includes bibliographical references and index.
Note Print version record.
Subject Cyberterrorism -- United States -- Prevention.
Computer security -- United States.
National security -- United States.
Sécurité informatique -- États-Unis.
POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism.
Computer security
Cyberterrorism -- Prevention
National security
United States https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
Other Form: Print version: Amoroso, Edward G. Cyber attacks. Burlington, MA : Butterworth-Heinemann, ©2011 9780123849175 (DLC) 2010040626 (OCoLC)670211398
ISBN 9780123849175 (electronic bk.)
0123849179 (electronic bk.)
9780123849182 (electronic bk.)
0123849187 (electronic bk.)
Standard No. AU@ 000046315145
AU@ 000053265865
AU@ 000060584898
CHDSB 005989234
CHNEW 001009901
DEBBG BV042300709
DEBSZ 370594428
DEBSZ 399118276
DEBSZ 430908768
GBVCP 78536238X
NZ1 13642882
NZ1 15548345
DKDLA 820120-katalog:9910110070805765

 
    
Available items only