Cyber Attacks

Protecting National Infrastructure

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Attacks by Edward Amoroso, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Edward Amoroso ISBN: 9780123849182
Publisher: Elsevier Science Publication: December 20, 2010
Imprint: Butterworth-Heinemann Language: English
Author: Edward Amoroso
ISBN: 9780123849182
Publisher: Elsevier Science
Publication: December 20, 2010
Imprint: Butterworth-Heinemann
Language: English

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.

This book covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. It provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. It illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle.

Cyber Attacks will be of interest to security professionals tasked with protection of critical infrastructure and with cyber security; CSOs and other top managers; government and military security specialists and policymakers; security managers; and students in cybersecurity and international security programs.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.

This book covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. It provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. It illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle.

Cyber Attacks will be of interest to security professionals tasked with protection of critical infrastructure and with cyber security; CSOs and other top managers; government and military security specialists and policymakers; security managers; and students in cybersecurity and international security programs.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

More books from Elsevier Science

Cover of the book Olive Oil by Edward Amoroso
Cover of the book Phase Transitions in Polymers: The Role of Metastable States by Edward Amoroso
Cover of the book Sorting and Recycling Endosomes by Edward Amoroso
Cover of the book Risk Management of Complex Inorganic Materials by Edward Amoroso
Cover of the book Handbook of Epigenetics by Edward Amoroso
Cover of the book Handbook of Synthetic Organic Chemistry by Edward Amoroso
Cover of the book Conceptual Breakthroughs in Ethology and Animal Behavior by Edward Amoroso
Cover of the book Embedded Linux Development Using Eclipse by Edward Amoroso
Cover of the book Yunnan-A Chinese Bridgehead to Asia by Edward Amoroso
Cover of the book Doping, Performance-Enhancing Drugs, and Hormones in Sport by Edward Amoroso
Cover of the book Chemical and Biochemical Approaches for the Study of Anesthetic Function Part B by Edward Amoroso
Cover of the book Still the Iron Age by Edward Amoroso
Cover of the book Advances in Insect Physiology by Edward Amoroso
Cover of the book The Laboratory Rabbit, Guinea Pig, Hamster, and Other Rodents by Edward Amoroso
Cover of the book Social Data Analytics by Edward Amoroso
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy