Please use this identifier to cite or link to this item: https://lib.hpu.edu.vn/handle/123456789/30352
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAmoroso, Edwarden_US
dc.date.accessioned2018-04-18T01:49:31Z
dc.date.available2018-04-18T01:49:31Z
dc.date.issued2010en_US
dc.identifier.isbn0123849179en_US
dc.identifier.isbn9780123849175en_US
dc.identifier.otherHPU4162261en_US
dc.identifier.urihttps://lib.hpu.edu.vn/handle/123456789/30352-
dc.description.abstractNo nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computng technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.en_US
dc.format.extent246 p.en_US
dc.format.mimetypeapplication/pdfen_US
dc.language.isoenen_US
dc.publisherHeinemannen_US
dc.subjectCyber Attacksen_US
dc.subjectNational Infrastructureen_US
dc.subjectInfrastructureen_US
dc.titleCyber Attacks: Protecting National Infrastructureen_US
dc.typeBooken_US
dc.size1.50 MBen_US
dc.departmentSociologyen_US
Appears in Collections:Sociology

Files in This Item:
File Description SizeFormat 
Cyber-Attacks-Protecting-National-Infrastructure-2245.pdf
  Restricted Access
1.54 MBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.