Cyber attacks protecting national infrastructure
No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community aroun...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Butterworth-Heinemann
© 2011
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125517 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780123849175 |9 978-0-12-384917-5 | ||
020 | |a 0123849179 |9 0-12-384917-9 | ||
020 | |a 9780123849182 |9 978-0-12-384918-2 | ||
020 | |a 0123849187 |9 0-12-384918-7 | ||
035 | |a (ZDB-33-ESD)ocn677828684 | ||
035 | |a (OCoLC)677828684 | ||
035 | |a (DE-599)BVBBV046125517 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 363.325/90046780973 |2 22 | |
100 | 1 | |a Amoroso, Edward G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber attacks |b protecting national infrastructure |c Edward Amoroso |
264 | 1 | |a Burlington, MA |b Butterworth-Heinemann |c © 2011 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. | ||
520 | |a This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. | ||
520 | |a * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 4 | |a Cyberterrorism |z United States |x Prevention | |
650 | 4 | |a Computer security |z United States | |
650 | 4 | |a National security |z United States | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 1 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | 3 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780123849175 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505971 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780123849175 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444741107712 |
---|---|
any_adam_object | |
author | Amoroso, Edward G. |
author_facet | Amoroso, Edward G. |
author_role | aut |
author_sort | Amoroso, Edward G. |
author_variant | e g a eg ega |
building | Verbundindex |
bvnumber | BV046125517 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn677828684 (OCoLC)677828684 (DE-599)BVBBV046125517 |
dewey-full | 363.325/90046780973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/90046780973 |
dewey-search | 363.325/90046780973 |
dewey-sort | 3363.325 1190046780973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04805nmm a2200697zc 4500</leader><controlfield tag="001">BV046125517</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123849175</subfield><subfield code="9">978-0-12-384917-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123849179</subfield><subfield code="9">0-12-384917-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123849182</subfield><subfield code="9">978-0-12-384918-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123849187</subfield><subfield code="9">0-12-384918-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn677828684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)677828684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125517</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/90046780973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Amoroso, Edward G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber attacks</subfield><subfield code="b">protecting national infrastructure</subfield><subfield code="c">Edward Amoroso</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">* Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123849175</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505971</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780123849175</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV046125517 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9780123849175 0123849179 9780123849182 0123849187 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505971 |
oclc_num | 677828684 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Amoroso, Edward G. Verfasser aut Cyber attacks protecting national infrastructure Edward Amoroso Burlington, MA Butterworth-Heinemann © 2011 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computer security fast Cyberterrorism / Prevention fast National security fast Cyberterrorism United States Prevention Computer security United States National security United States Information warfare (DE-588)4461975-3 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Prävention (DE-588)4076308-0 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Cyberspace (DE-588)4266146-8 s Computerkriminalität (DE-588)4010452-7 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Sicherheitspolitik (DE-588)4116489-1 s Information warfare (DE-588)4461975-3 s Prävention (DE-588)4076308-0 s 2\p DE-604 http://www.sciencedirect.com/science/book/9780123849175 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Amoroso, Edward G. Cyber attacks protecting national infrastructure POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computer security fast Cyberterrorism / Prevention fast National security fast Cyberterrorism United States Prevention Computer security United States National security United States Information warfare (DE-588)4461975-3 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Prävention (DE-588)4076308-0 gnd Cyberspace (DE-588)4266146-8 gnd Computerkriminalität (DE-588)4010452-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4116489-1 (DE-588)4076308-0 (DE-588)4266146-8 (DE-588)4010452-7 (DE-588)4274324-2 (DE-588)4078704-7 |
title | Cyber attacks protecting national infrastructure |
title_auth | Cyber attacks protecting national infrastructure |
title_exact_search | Cyber attacks protecting national infrastructure |
title_full | Cyber attacks protecting national infrastructure Edward Amoroso |
title_fullStr | Cyber attacks protecting national infrastructure Edward Amoroso |
title_full_unstemmed | Cyber attacks protecting national infrastructure Edward Amoroso |
title_short | Cyber attacks |
title_sort | cyber attacks protecting national infrastructure |
title_sub | protecting national infrastructure |
topic | POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computer security fast Cyberterrorism / Prevention fast National security fast Cyberterrorism United States Prevention Computer security United States National security United States Information warfare (DE-588)4461975-3 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Prävention (DE-588)4076308-0 gnd Cyberspace (DE-588)4266146-8 gnd Computerkriminalität (DE-588)4010452-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Terrorism Computer security Cyberterrorism / Prevention National security Cyberterrorism United States Prevention Computer security United States National security United States Information warfare Sicherheitspolitik Prävention Cyberspace Computerkriminalität Computersicherheit USA |
url | http://www.sciencedirect.com/science/book/9780123849175 |
work_keys_str_mv | AT amorosoedwardg cyberattacksprotectingnationalinfrastructure |