Cyber Attacks: Protecting National Infrastructure

· Elsevier
3,5
2 umsagnir
Rafbók
248
Síður
Gjaldgeng

Um þessa rafbók

Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.

This book covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. It provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. It illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle.

Cyber Attacks will be of interest to security professionals tasked with protection of critical infrastructure and with cyber security; CSOs and other top managers; government and military security specialists and policymakers; security managers; and students in cybersecurity and international security programs.
  • Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments
  • Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems
  • Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T

Einkunnir og umsagnir

3,5
2 umsagnir

Um höfundinn

Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.

Gefa þessari rafbók einkunn.

Segðu okkur hvað þér finnst.

Upplýsingar um lestur

Snjallsímar og spjaldtölvur
Settu upp forritið Google Play Books fyrir Android og iPad/iPhone. Það samstillist sjálfkrafa við reikninginn þinn og gerir þér kleift að lesa með eða án nettengingar hvar sem þú ert.
Fartölvur og tölvur
Hægt er að hlusta á hljóðbækur sem keyptar eru í Google Play í vafranum í tölvunni.
Lesbretti og önnur tæki
Til að lesa af lesbrettum eins og Kobo-lesbrettum þarftu að hlaða niður skrá og flytja hana yfir í tækið þitt. Fylgdu nákvæmum leiðbeiningum hjálparmiðstöðvar til að flytja skrár yfir í studd lesbretti.