skip to content
Cyber attacks : protecting national infrastructure Preview this item
ClosePreview this item
Checking...

Cyber attacks : protecting national infrastructure

Author: Edward G Amoroso
Publisher: Burlington, MA : Butterworth-Heinemann, ©2011.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Amoroso, Edward G.
Cyber attacks.
Burlington, MA : Butterworth-Heinemann, ©2011
(DLC) 2010040626
(OCoLC)670211398
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Edward G Amoroso
ISBN: 9780123849175 0123849179 9780123849182 0123849187
OCLC Number: 677828684
Description: 1 online resource
Contents: Chapter 1: Introduction --
Chapter 2: Deception --
Chapter 3: Separation --
Chapter 4: Diversity --
Chapter 5: Commonality --
Chapter 6: Depth --
Chapter 7: Discretion --
Chapter 8: Collection --
Chapter 9: Correlation --
Chapter 10: Awareness --
Chapter 11: Response --
Appendix: Sample National Infrastructure Protection Requirements. Introduction --
Deception --
Separation --
Diversity --
Commonality --
Depth --
Discretion --
Collection --
Correlation --
Awareness --
Response.
Responsibility: Edward Amoroso.

Abstract:

Deals with the national debate on protecting critical infrastructure. This book covers cyber security policy development for massively complex infrastructure using ten principles derived from  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"Amoroso's advice takes the art out of the debate onwhether security is art or science. He brings a high level goal oriented approach to practical situations in order for the 'right' security Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/677828684> # Cyber attacks : protecting national infrastructure
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "677828684" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/793028766#Place/burlington_ma> ; # Burlington, MA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{FE6BD285-FF6B-4939-BA87-0D1DEBB0D156}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/political_science_political_freedom_&_security_terrorism> ; # POLITICAL SCIENCE--Political Freedom & Security--Terrorism
    schema:about <http://id.loc.gov/authorities/subjects/sh2008101478> ; # Computer security--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/social_science> ; # Social Science
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/computer_crimes_united_states_prevention> ; # Computer crimes--United States--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/national_security> ; # National security
    schema:about <http://id.worldcat.org/fast/1204155> ; # United States.
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberterrorism> ; # Cyberterrorism
    schema:about <http://dewey.info/class/363.32590046780973/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberterrorism_prevention> ; # Cyberterrorism--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Place/united_states> ; # United States.
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/computer_security> ; # Computer security
    schema:about <http://id.loc.gov/authorities/subjects/sh85140387> ; # National security--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/national_security_united_states> ; # National security--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/computer_security_united_states> ; # Computer security--United States
    schema:about <http://id.loc.gov/authorities/subjects/sh2009121190> ; # Cyberterrorism--United States--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberspace_security_measures_united_states> ; # Cyberspace--Security measures--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberterrorism_united_states_prevention> ; # Cyberterrorism--United States--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/793028766#Topic/prevention> ; # Prevention
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2011" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/793028766#Person/amoroso_edward_g> ; # Edward G. Amoroso
    schema:datePublished "2011" ;
    schema:description "Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements."@en ;
    schema:description "No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T."@en ;
    schema:description "Introduction -- Deception -- Separation -- Diversity -- Commonality -- Depth -- Discretion -- Collection -- Correlation -- Awareness -- Response."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/793028766> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/670211398> ;
    schema:name "Cyber attacks : protecting national infrastructure"@en ;
    schema:productID "677828684" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/677828684#PublicationEvent/burlington_ma_butterworth_heinemann_2011> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/793028766#Agent/butterworth_heinemann> ; # Butterworth-Heinemann
    schema:url <http://site.ebrary.com/id/10429793> ;
    schema:url <https://www.overdrive.com/search?q=FE6BD285-FF6B-4939-BA87-0D1DEBB0D156> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9780123849175> ;
    schema:url <http://excerpts.cdn.overdrive.com/FormatType-410/1706-1/FE6/BD2/85/CyberAttacks9780123849182.epub> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=345713> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=40128> ;
    schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{FE6BD285-FF6B-4939-BA87-0D1DEBB0D156}Img100.jpg" ;
    schema:url <http://proquest.tech.safaribooksonline.de/9780123849175> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=610561> ;
    schema:url <http://www.sciencedirect.com/science/book/9780123849175> ;
    schema:url <http://proquest.safaribooksonline.com/9780123849175> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9780123849175> ;
    schema:url <https://samples.overdrive.com/?crid=FE6BD285-FF6B-4939-BA87-0D1DEBB0D156&.epub-sample.overdrive.com> ;
    schema:workExample <http://worldcat.org/isbn/9780123849182> ;
    schema:workExample <http://worldcat.org/isbn/9780123849175> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/677828684> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/793028766#Agent/butterworth_heinemann> # Butterworth-Heinemann
    a bgn:Agent ;
    schema:name "Butterworth-Heinemann" ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Person/amoroso_edward_g> # Edward G. Amoroso
    a schema:Person ;
    schema:familyName "Amoroso" ;
    schema:givenName "Edward G." ;
    schema:name "Edward G. Amoroso" ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Place/burlington_ma> # Burlington, MA
    a schema:Place ;
    schema:name "Burlington, MA" ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Place/united_states> # United States.
    a schema:Place ;
    schema:name "United States." ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/computer_crimes_united_states_prevention> # Computer crimes--United States--Prevention
    a schema:Intangible ;
    schema:name "Computer crimes--United States--Prevention"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/computer_security_united_states> # Computer security--United States
    a schema:Intangible ;
    schema:name "Computer security--United States"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberspace_security_measures_united_states> # Cyberspace--Security measures--United States
    a schema:Intangible ;
    schema:name "Cyberspace--Security measures--United States"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberterrorism_prevention> # Cyberterrorism--Prevention
    a schema:Intangible ;
    schema:name "Cyberterrorism--Prevention"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/cyberterrorism_united_states_prevention> # Cyberterrorism--United States--Prevention
    a schema:Intangible ;
    schema:name "Cyberterrorism--United States--Prevention"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/national_security> # National security
    a schema:Intangible ;
    schema:name "National security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/national_security_united_states> # National security--United States
    a schema:Intangible ;
    schema:name "National security--United States"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/793028766#Topic/political_science_political_freedom_&_security_terrorism> # POLITICAL SCIENCE--Political Freedom & Security--Terrorism
    a schema:Intangible ;
    schema:name "POLITICAL SCIENCE--Political Freedom & Security--Terrorism"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2008101478> # Computer security--United States
    a schema:Intangible ;
    schema:name "Computer security--United States"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2009121190> # Cyberterrorism--United States--Prevention
    a schema:Intangible ;
    schema:name "Cyberterrorism--United States--Prevention"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85140387> # National security--United States
    a schema:Intangible ;
    schema:name "National security--United States"@en ;
    .

<http://id.worldcat.org/fast/1204155> # United States.
    a schema:Place ;
    schema:name "United States." ;
    .

<http://worldcat.org/isbn/9780123849175>
    a schema:ProductModel ;
    schema:isbn "0123849179" ;
    schema:isbn "9780123849175" ;
    .

<http://worldcat.org/isbn/9780123849182>
    a schema:ProductModel ;
    schema:isbn "0123849187" ;
    schema:isbn "9780123849182" ;
    .

<http://www.worldcat.org/oclc/670211398>
    a schema:CreativeWork ;
    rdfs:label "Cyber attacks." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/677828684> ; # Cyber attacks : protecting national infrastructure
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.