語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber attacksprotecting national infrastructure /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber attacksEdward Amoroso.
其他題名:
protecting national infrastructure /
作者:
Amoroso, Edward G.
出版者:
Burlington, MA :Butterworth-Heinemann,c2011.
面頁冊數:
1 online resource.
附註:
Includes index.
標題:
CyberterrorismPrevention.United States
標題:
United States.
電子資源:
http://www.sciencedirect.com/science/book/9780123849175
ISBN:
9780123849175 (electronic bk.)
Cyber attacksprotecting national infrastructure /
Amoroso, Edward G.
Cyber attacks
protecting national infrastructure /[electronic resource] :Edward Amoroso. - Burlington, MA :Butterworth-Heinemann,c2011. - 1 online resource.
Includes index.
Includes bibliographical references and index.
Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements.
No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T.
ISBN: 9780123849175 (electronic bk.)
Source: 1100567:10945411Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
404086
Cyberterrorism
--Prevention.--United StatesSubjects--Geographical Terms:
235877
United States.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: HV6773.2 / .A47 2011
Dewey Class. No.: 363.325/90046780973
Cyber attacksprotecting national infrastructure /
LDR
:04150cmm 2200457Ka 4500
001
313685
003
OCoLC
005
20111122085809.0
006
m d
007
cr cn|||||||||
008
111229s2011 mau ob 001 0 eng d
019
$a
690111229
020
$a
9780123849175 (electronic bk.)
020
$a
0123849179 (electronic bk.)
020
$a
9780123849182 (electronic bk.)
020
$a
0123849187 (electronic bk.)
029
1
$a
AU@
$b
000046315145
029
1
$a
NZ1
$b
13642882
035
$a
(OCoLC)677828684
$z
(OCoLC)690111229
035
$a
ocn677828684
035
$a
313685
037
$a
1100567:10945411
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
OCLCQ
$d
N
$d
YDXCP
$d
EBLCP
$d
IUL
$d
MHW
$d
OCLCQ
043
$a
n-us---
049
$a
TEFA
050
4
$a
HV6773.2
$b
.A47 2011
072
7
$a
POL
$x
037000
$2
bisacsh
082
0 4
$a
363.325/90046780973
$2
22
100
1
$a
Amoroso, Edward G.
$3
536651
245
1 0
$a
Cyber attacks
$h
[electronic resource] :
$b
protecting national infrastructure /
$c
Edward Amoroso.
260
$a
Burlington, MA :
$b
Butterworth-Heinemann,
$c
c2011.
300
$a
1 online resource.
500
$a
Includes index.
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements.
505
0
$a
Introduction -- Deception -- Separation -- Diversity -- Commonality -- Depth -- Discretion -- Collection -- Correlation -- Awareness -- Response.
520
$a
No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T.
588
$a
Description based on print version record.
650
0
$a
Cyberterrorism
$z
United States
$x
Prevention.
$3
404086
650
0
$a
Computer security
$z
United States.
$3
247047
650
0
$a
National security
$z
United States.
$3
174995
650
4
$a
Computer security.
$3
184416
650
4
$a
Cyberterrorism.
$3
283235
650
4
$a
National security.
$3
248255
650
4
$a
Prevention.
$3
536652
650
4
$a
Social Science.
$3
477089
650
7
$a
POLITICAL SCIENCE
$x
Political Freedom & Security
$x
Terrorism.
$2
bisacsh
$3
536653
651
4
$a
United States.
$t
Constitution.
$3
235877
655
4
$a
Electronic books.
$2
local.
$3
214472
776
0 8
$i
Print version:
$a
Amoroso, Edward G.
$t
Cyber attacks.
$d
Burlington, MA : Butterworth-Heinemann, c2011
$z
9780123849175
$w
(DLC) 2010040626
$w
(OCoLC)670211398
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9780123849175
938
$a
YBP Library Services
$b
YANK
$n
3536885
938
$a
EBL - Ebook Library
$b
EBLB
$n
EBL610561
994
$a
C0
$b
TEF
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000060649
電子館藏
1圖書
電子書
EB HV6773.2 .A47 c2011
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://www.sciencedirect.com/science/book/9780123849175
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入