|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1162012695 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
140320t20132013nyua ob 001 0 eng |
010 |
|
|
|a 2020678488
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d OCLCF
|d VLY
|d OCLCO
|d E7B
|d N$T
|d YDXCP
|d EBLCP
|d DEBSZ
|d AGLDB
|d VTS
|d AU@
|d REC
|d STF
|d M8D
|d OCLCO
|d OCLCQ
|d ESU
|d OCLCQ
|
019 |
|
|
|a 857062686
|a 963730312
|
020 |
|
|
|a 9781628085822
|q ebook
|
020 |
|
|
|a 1628085827
|
020 |
|
|
|z 1628085819
|
020 |
|
|
|z 9781628085815
|
029 |
1 |
|
|a AU@
|b 000052305174
|
029 |
1 |
|
|a CHNEW
|b 000639335
|
029 |
1 |
|
|a DEBBG
|b BV041637166
|
029 |
1 |
|
|a DEBBG
|b BV043132315
|
029 |
1 |
|
|a DEBSZ
|b 429950306
|
029 |
1 |
|
|a DEBSZ
|b 449550745
|
029 |
1 |
|
|a DEBSZ
|b 454919654
|
029 |
1 |
|
|a AU@
|b 000062327398
|
035 |
|
|
|a (OCoLC)1162012695
|z (OCoLC)857062686
|z (OCoLC)963730312
|
050 |
0 |
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyber infrastructure protection :
|b selected issues and analyses /
|c Howard C. Collins and Connor R. Hughes editors.
|
264 |
|
1 |
|a New York :
|b Nova Publishers,
|c [2013]
|
264 |
|
4 |
|c ©2013
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Internet policies and issues
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on print version record.
|
546 |
|
|
|a English.
|
505 |
0 |
|
|a CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; Library of Congress Cataloging-in-Publication Data; Contents; Preface ; Chapter 1: Cyber Intrastructure Protection; SECTION 1. INTRODUCTION; Strategy and Policy Aspects; Legal and Social Aspects; Technical Aspects; PART I. STRATEGY AND POLICY ASPECTS; SECTION 2. DEVELOPING A THEORY OF CYBERPOWER; Introduction; Elements of a Theory; Key Challenges; SECTION 3. SURVIVABILITY OF THE INTERNET; Introduction; Symposium Data Collection; Current Escalating Situation.
|
505 |
8 |
|
|a General DiscussionConclusion; APPENDIX; Planning Guidelines; REFERENCES; SECTION 4. ARE LARGE-SCALE DATA BREACHES INEVITABLE?; Introduction; Notable Breaches: Institutions, Causes, and Costs; Monetizing the Crime; Challenges and Remedies; Concluding Remarks; SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS; Introduction; Role of Cyber and Challenges; Commercial ICT Capability Packages; ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example; Observations; PART II: SOCIAL AND LEGAL ASPECTS.
|
505 |
8 |
|
|a SECTION 6. THE INFORMATION POLITY: SOCIAL ANDLEGAL FRAMEWORKS FOR CRITICAL CYBERINFRASTRUCTURE PROTECTIONIntroduction; Jurisdiction among Distributed Sovereigns; Local Substantive Criminal Law and the Exercise of Sovereignty; A Transnational Legal Regime and Cooperation across Frontiers-The Convention on Cybercrime; Social Norms and Criminological Theory; Administrative Engagement- Marshalling and Enabling Existing Law Enforcement; Citizen Engagement; Conclusion; SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS; Introduction; Data and Method; Findings.
|
505 |
8 |
|
|a Discussion and ConclusionPART III: TECHNICAL ASPECTS; SECTION 8. RESILIENCE OF DATA CENTERS; Introduction; State of the Art; Conclusion; SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS; Introduction; Current Issues; The Virtual Environment; Conclusions; SECTION 10. VOICE OVER IP: RISKS, THREATS,AND VULNERABILITIES; Introduction; VOIP Technologies Overview; VoIP Threats; Discussion; Conclusion; SECTION 11. TOWARD FOOLPROOF IP NETWORKCONFIGURATION ASSESSMENTS; Introduction; Configuration Errors Found in Operational IP Networks; Reliability.
|
505 |
8 |
|
|a Regulators Expect ComplianceMany Assessment Approaches Prove Deficient; Toward a Solution That Works; Summary; SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET; Introduction; Traditional Brute Force Attacks; New Breed of Stealthy DoS Attacks; Defense Systems; Future Research Directions; Conclusion; About the Contributors; End Notes; Chapter 2: Cyber Infrastructure Protection: Volume II; FOREWORD; SECTION 1. INTRODUCTION; Outline of the Report; Economics and Social Aspects of Cyber Security; Law and Cybercrime; Cyber Infrastructure.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
700 |
1 |
|
|a Collins, Howard C.
|
700 |
1 |
|
|a Hughes, Connor R.
|
776 |
0 |
8 |
|i Print version:
|t Cyber infrastructure protection
|d New York : Nova Publishers, [2013]
|z 9781628085815
|w (DLC) 2013454787
|
830 |
|
0 |
|a Internet policies and issues.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=621667
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3022943
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10742752
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 621667
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10926808
|
994 |
|
|
|a 92
|b IZTAP
|