Buch(gedruckt) World Affairs Online2013

Cyber infrastructure protection

Verfügbarkeit an Ihrem Standort wird überprüft

Abstract

vol I. - Chapter 1. Introduction / Tarek Saadawi and Louis Jordan 1. - PART I: STRATEGY AND POLICY ASPECTS . - Chapter 2. Developing a Theory of Cyberpower / Stuart H. Starr 15. - Chapter 3. Survivability of the Internet / Michael J. Chumer 29. - Chapter 4. Are Large Scale Data Breaches Inevitable? / Douglas E. Salane 51. - Chapter 5. The Role of Cyberpower in Humanitarian Assistance/Disaster Relief (HA/DR) and Stability and Reconstruction Operations / Larry Wentz 81. - PART II: SOCIAL AND LEGAL ASPECTS. - Chapter 6. The Information Polity: Social and Legal Frameworks for Critical Cyber Infrastructure Protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling 129. - Chapter 7. The Attack Dynamics of Political and Religiously Motivated Hackers / Thomas J. Holt 159. - PART III: TECHNICAL ASPECTS. - Chapter 8. Resilience of Data Centers / Yehia H. Khalil and Adel S. Elmaghraby 183. - Chapter 9. Developing High Fidelity Sensors for Intrusion Activity on Enterprise Networks / Edward Wagner and Anup K. Ghosh 207. - Chapter 10. Voice over IP: Risks, Threats, and Vulnerabilities / Angelos D. Keromytis 223. - Chapter 11. Toward Foolproof IP Network Configuration Assessments / Rajesh Talpade 263. - Chapter 12. On the New Breed of Denial of Service (DoS) Attacks in the Internet / Nirwan Ansari and Amey Shevtekar 279. - Vol. II. - 1. Introduction / Tarek Saadawi, Louis H. Jordan, Jr., and Vincent Boudreau 1. - PART I: ECONOMICS AND SOCIAL ASPECTS OF CYBER SECURITY . - 2. Exploring the Economics of the MaliciouscSoftware Market / Thomas J. Holt 17. - 3. The Emergence of the Civilian Cyber Warrior / Max Kilger 53. - PART II: LAW AND CYBERCRIME. - 4. Changing the Game: Social and Justice Models for Enhanced Cyber Security / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling 85. - 5. An Institutional and Developmental Analysis of the Data Breach Disclosure Laws / Melissa Dark 107. - 6. Cyber Security and Identity: Solutions for Critical Infrastructure that Protect Civil Liberties and Enhance Security / Joshua Gruenspecht 139. - 7. Exploring the Utility of Open Source Data to Predict Malicious Software Creation / George W. Burruss, Thomas J. Holt, and Adam M. Bossler 183. - PART III: CYBER INFRASTRUCTURE. - 8. ISP Grade Threat Monitoring / Abhrajit Ghosh 221. - 9. The Challenges Associated with Assessing Cyber Issues / Stuart H. Starr 235

Problem melden

Wenn Sie Probleme mit dem Zugriff auf einen gefundenen Titel haben, können Sie sich über dieses Formular gern an uns wenden. Schreiben Sie uns hierüber auch gern, wenn Ihnen Fehler in der Titelanzeige aufgefallen sind.