Cargando…

Cyber infrastructure protection : selected issues and analyses /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Collins, Howard C., Hughes, Connor R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Nova Publishers, [2013]
Colección:Internet policies and issues.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1162012695
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 140320t20132013nyua ob 001 0 eng
010 |a  2020678488 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCF  |d VLY  |d OCLCO  |d E7B  |d N$T  |d YDXCP  |d EBLCP  |d DEBSZ  |d AGLDB  |d VTS  |d AU@  |d REC  |d STF  |d M8D  |d OCLCO  |d OCLCQ  |d ESU  |d OCLCQ 
019 |a 857062686  |a 963730312 
020 |a 9781628085822  |q ebook 
020 |a 1628085827 
020 |z 1628085819 
020 |z 9781628085815 
029 1 |a AU@  |b 000052305174 
029 1 |a CHNEW  |b 000639335 
029 1 |a DEBBG  |b BV041637166 
029 1 |a DEBBG  |b BV043132315 
029 1 |a DEBSZ  |b 429950306 
029 1 |a DEBSZ  |b 449550745 
029 1 |a DEBSZ  |b 454919654 
029 1 |a AU@  |b 000062327398 
035 |a (OCoLC)1162012695  |z (OCoLC)857062686  |z (OCoLC)963730312 
050 0 0 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Cyber infrastructure protection :  |b selected issues and analyses /  |c Howard C. Collins and Connor R. Hughes editors. 
264 1 |a New York :  |b Nova Publishers,  |c [2013] 
264 4 |c ©2013 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Internet policies and issues 
504 |a Includes bibliographical references and index. 
588 |a Description based on print version record. 
546 |a English. 
505 0 |a CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; Library of Congress Cataloging-in-Publication Data; Contents; Preface ; Chapter 1: Cyber Intrastructure Protection; SECTION 1. INTRODUCTION; Strategy and Policy Aspects; Legal and Social Aspects; Technical Aspects; PART I. STRATEGY AND POLICY ASPECTS; SECTION 2. DEVELOPING A THEORY OF CYBERPOWER; Introduction; Elements of a Theory; Key Challenges; SECTION 3. SURVIVABILITY OF THE INTERNET; Introduction; Symposium Data Collection; Current Escalating Situation. 
505 8 |a General DiscussionConclusion; APPENDIX; Planning Guidelines; REFERENCES; SECTION 4. ARE LARGE-SCALE DATA BREACHES INEVITABLE?; Introduction; Notable Breaches: Institutions, Causes, and Costs; Monetizing the Crime; Challenges and Remedies; Concluding Remarks; SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS; Introduction; Role of Cyber and Challenges; Commercial ICT Capability Packages; ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example; Observations; PART II: SOCIAL AND LEGAL ASPECTS. 
505 8 |a SECTION 6. THE INFORMATION POLITY: SOCIAL ANDLEGAL FRAMEWORKS FOR CRITICAL CYBERINFRASTRUCTURE PROTECTIONIntroduction; Jurisdiction among Distributed Sovereigns; Local Substantive Criminal Law and the Exercise of Sovereignty; A Transnational Legal Regime and Cooperation across Frontiers-The Convention on Cybercrime; Social Norms and Criminological Theory; Administrative Engagement- Marshalling and Enabling Existing Law Enforcement; Citizen Engagement; Conclusion; SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS; Introduction; Data and Method; Findings. 
505 8 |a Discussion and ConclusionPART III: TECHNICAL ASPECTS; SECTION 8. RESILIENCE OF DATA CENTERS; Introduction; State of the Art; Conclusion; SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS; Introduction; Current Issues; The Virtual Environment; Conclusions; SECTION 10. VOICE OVER IP: RISKS, THREATS,AND VULNERABILITIES; Introduction; VOIP Technologies Overview; VoIP Threats; Discussion; Conclusion; SECTION 11. TOWARD FOOLPROOF IP NETWORKCONFIGURATION ASSESSMENTS; Introduction; Configuration Errors Found in Operational IP Networks; Reliability. 
505 8 |a Regulators Expect ComplianceMany Assessment Approaches Prove Deficient; Toward a Solution That Works; Summary; SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET; Introduction; Traditional Brute Force Attacks; New Breed of Stealthy DoS Attacks; Defense Systems; Future Research Directions; Conclusion; About the Contributors; End Notes; Chapter 2: Cyber Infrastructure Protection: Volume II; FOREWORD; SECTION 1. INTRODUCTION; Outline of the Report; Economics and Social Aspects of Cyber Security; Law and Cybercrime; Cyber Infrastructure. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Collins, Howard C. 
700 1 |a Hughes, Connor R. 
776 0 8 |i Print version:  |t Cyber infrastructure protection  |d New York : Nova Publishers, [2013]  |z 9781628085815  |w (DLC) 2013454787 
830 0 |a Internet policies and issues. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=621667  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3022943 
938 |a ebrary  |b EBRY  |n ebr10742752 
938 |a EBSCOhost  |b EBSC  |n 621667 
938 |a YBP Library Services  |b YANK  |n 10926808 
994 |a 92  |b IZTAP