Cyber attacks protecting national infrastructure

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community aroun...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Amoroso, Edward G. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Burlington, MA Butterworth-Heinemann © 2011
Schlagworte:
Online-Zugang:FLA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV046125517
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 190827s2011 |||| o||u| ||||||eng d
020 |a 9780123849175  |9 978-0-12-384917-5 
020 |a 0123849179  |9 0-12-384917-9 
020 |a 9780123849182  |9 978-0-12-384918-2 
020 |a 0123849187  |9 0-12-384918-7 
035 |a (ZDB-33-ESD)ocn677828684 
035 |a (OCoLC)677828684 
035 |a (DE-599)BVBBV046125517 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 363.325/90046780973  |2 22 
100 1 |a Amoroso, Edward G.  |e Verfasser  |4 aut 
245 1 0 |a Cyber attacks  |b protecting national infrastructure  |c Edward Amoroso 
264 1 |a Burlington, MA  |b Butterworth-Heinemann  |c © 2011 
300 |a 1 online resource 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure.  
520 |a This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments.  
520 |a * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. 
650 7 |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism / Prevention  |2 fast 
650 7 |a National security  |2 fast 
650 4 |a Cyberterrorism  |z United States  |x Prevention 
650 4 |a Computer security  |z United States 
650 4 |a National security  |z United States 
650 0 7 |a Information warfare  |0 (DE-588)4461975-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitspolitik  |0 (DE-588)4116489-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Prävention  |0 (DE-588)4076308-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Cyberspace  |0 (DE-588)4266146-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerkriminalität  |0 (DE-588)4010452-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
651 7 |a USA  |0 (DE-588)4078704-7  |2 gnd  |9 rswk-swf 
689 0 0 |a USA  |0 (DE-588)4078704-7  |D g 
689 0 1 |a Cyberspace  |0 (DE-588)4266146-8  |D s 
689 0 2 |a Computerkriminalität  |0 (DE-588)4010452-7  |D s 
689 0 3 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |8 1\p  |5 DE-604 
689 1 0 |a USA  |0 (DE-588)4078704-7  |D g 
689 1 1 |a Sicherheitspolitik  |0 (DE-588)4116489-1  |D s 
689 1 2 |a Information warfare  |0 (DE-588)4461975-3  |D s 
689 1 3 |a Prävention  |0 (DE-588)4076308-0  |D s 
689 1 |8 2\p  |5 DE-604 
856 4 0 |u http://www.sciencedirect.com/science/book/9780123849175  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-33-ESD 
999 |a oai:aleph.bib-bvb.de:BVB01-031505971 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
966 e |u http://www.sciencedirect.com/science/book/9780123849175  |l FLA01  |p ZDB-33-ESD  |q FLA_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1804180444741107712
any_adam_object
author Amoroso, Edward G.
author_facet Amoroso, Edward G.
author_role aut
author_sort Amoroso, Edward G.
author_variant e g a eg ega
building Verbundindex
bvnumber BV046125517
collection ZDB-33-ESD
ctrlnum (ZDB-33-ESD)ocn677828684
(OCoLC)677828684
(DE-599)BVBBV046125517
dewey-full 363.325/90046780973
dewey-hundreds 300 - Social sciences
dewey-ones 363 - Other social problems and services
dewey-raw 363.325/90046780973
dewey-search 363.325/90046780973
dewey-sort 3363.325 1190046780973
dewey-tens 360 - Social problems and services; associations
discipline Soziologie
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04805nmm a2200697zc 4500</leader><controlfield tag="001">BV046125517</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123849175</subfield><subfield code="9">978-0-12-384917-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123849179</subfield><subfield code="9">0-12-384917-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123849182</subfield><subfield code="9">978-0-12-384918-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123849187</subfield><subfield code="9">0-12-384918-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn677828684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)677828684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125517</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/90046780973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Amoroso, Edward G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber attacks</subfield><subfield code="b">protecting national infrastructure</subfield><subfield code="c">Edward Amoroso</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">* Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT &amp; T.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom &amp; Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123849175</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505971</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780123849175</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
geographic USA (DE-588)4078704-7 gnd
geographic_facet USA
id DE-604.BV046125517
illustrated Not Illustrated
indexdate 2024-07-10T08:35:52Z
institution BVB
isbn 9780123849175
0123849179
9780123849182
0123849187
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031505971
oclc_num 677828684
open_access_boolean
physical 1 online resource
psigel ZDB-33-ESD
ZDB-33-ESD FLA_PDA_ESD
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Butterworth-Heinemann
record_format marc
spelling Amoroso, Edward G. Verfasser aut
Cyber attacks protecting national infrastructure Edward Amoroso
Burlington, MA Butterworth-Heinemann © 2011
1 online resource
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references and index
No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure.
This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments.
* Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T.
POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh
Computer security fast
Cyberterrorism / Prevention fast
National security fast
Cyberterrorism United States Prevention
Computer security United States
National security United States
Information warfare (DE-588)4461975-3 gnd rswk-swf
Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf
Prävention (DE-588)4076308-0 gnd rswk-swf
Cyberspace (DE-588)4266146-8 gnd rswk-swf
Computerkriminalität (DE-588)4010452-7 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
USA (DE-588)4078704-7 gnd rswk-swf
USA (DE-588)4078704-7 g
Cyberspace (DE-588)4266146-8 s
Computerkriminalität (DE-588)4010452-7 s
Computersicherheit (DE-588)4274324-2 s
1\p DE-604
Sicherheitspolitik (DE-588)4116489-1 s
Information warfare (DE-588)4461975-3 s
Prävention (DE-588)4076308-0 s
2\p DE-604
http://www.sciencedirect.com/science/book/9780123849175 Verlag URL des Erstveröffentlichers Volltext
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Amoroso, Edward G.
Cyber attacks protecting national infrastructure
POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh
Computer security fast
Cyberterrorism / Prevention fast
National security fast
Cyberterrorism United States Prevention
Computer security United States
National security United States
Information warfare (DE-588)4461975-3 gnd
Sicherheitspolitik (DE-588)4116489-1 gnd
Prävention (DE-588)4076308-0 gnd
Cyberspace (DE-588)4266146-8 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4461975-3
(DE-588)4116489-1
(DE-588)4076308-0
(DE-588)4266146-8
(DE-588)4010452-7
(DE-588)4274324-2
(DE-588)4078704-7
title Cyber attacks protecting national infrastructure
title_auth Cyber attacks protecting national infrastructure
title_exact_search Cyber attacks protecting national infrastructure
title_full Cyber attacks protecting national infrastructure Edward Amoroso
title_fullStr Cyber attacks protecting national infrastructure Edward Amoroso
title_full_unstemmed Cyber attacks protecting national infrastructure Edward Amoroso
title_short Cyber attacks
title_sort cyber attacks protecting national infrastructure
title_sub protecting national infrastructure
topic POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh
Computer security fast
Cyberterrorism / Prevention fast
National security fast
Cyberterrorism United States Prevention
Computer security United States
National security United States
Information warfare (DE-588)4461975-3 gnd
Sicherheitspolitik (DE-588)4116489-1 gnd
Prävention (DE-588)4076308-0 gnd
Cyberspace (DE-588)4266146-8 gnd
Computerkriminalität (DE-588)4010452-7 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet POLITICAL SCIENCE / Political Freedom & Security / Terrorism
Computer security
Cyberterrorism / Prevention
National security
Cyberterrorism United States Prevention
Computer security United States
National security United States
Information warfare
Sicherheitspolitik
Prävention
Cyberspace
Computerkriminalität
Computersicherheit
USA
url http://www.sciencedirect.com/science/book/9780123849175
work_keys_str_mv AT amorosoedwardg cyberattacksprotectingnationalinfrastructure