Cyber attacks (Record no. 29648)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04231nam a2200385Ka 4500 |
001 - CONTROL NUMBER | |
control field | 6ocm77828684 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IE-LiIT |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20180119131920.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cn||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 101104s2011 mau s 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0123849179 (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780123849175 (electronic bk.) |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 1100567:10945411 |
Source of stock number/acquisition | Elsevier Science & Technology |
Note | http://www.sciencedirect.com |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OPELS |
Language of cataloging | eng |
Transcribing agency | OPELS |
043 ## - GEOGRAPHIC AREA CODE | |
Geographic area code | n-us--- |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Amoroso, Edward G. |
9 (RLIN) | 16630 |
245 10 - TITLE STATEMENT | |
Title | Cyber attacks |
Medium | [electronic book] : |
Remainder of title | protecting national infrastructure / |
Statement of responsibility, etc. | Edward Amoroso. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Burlington, MA : |
Name of publisher, distributor, etc. | Butterworth-Heinemann, |
Date of publication, distribution, etc. | c2011. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | p. cm. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- Deception -- Separation -- Diversity -- Commonality -- Depth -- Discretion -- Collection -- Correlation -- Awareness -- Response. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T. |
533 ## - REPRODUCTION NOTE | |
Type of reproduction | Electronic reproduction. |
Place of reproduction | Amsterdam : |
Agency responsible for reproduction | Elsevier Science & Technology, |
Date of reproduction | 2010. |
Note about reproduction | Mode of access: World Wide Web. |
-- | System requirements: Web browser. |
-- | Title from title screen (viewed on Nov. 3, 2010). |
-- | Access may be restricted to users at subscribing institutions. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberterrorism |
Geographic subdivision | United States |
General subdivision | Prevention. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Geographic subdivision | United States. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | National security |
Geographic subdivision | United States. |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | local |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | ScienceDirect (Online service) |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Amoroso, Edward G. |
Title | Cyber attacks. |
Place, publisher, and date of publication | Burlington, MA : Butterworth-Heinemann, c2011 |
International Standard Book Number | 9780123849175 |
Record control number | (DLC) 2010040626 |
-- | (OCoLC)670211398 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://www-sciencedirect-com.ezproxy.lit.ie/science/book/9780123849175">https://www-sciencedirect-com.ezproxy.lit.ie/science/book/9780123849175</a> |
Link text | ScienceDirect eBook |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) | |
a | 120815 |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) | |
a | .b1119151x |
b | ebook |
c | ebook |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Suppress in OPAC | 0 |
Source of classification or shelving scheme | Dewey Decimal Classification |
998 ## - LOCAL CONTROL INFORMATION (RLIN) | |
Operator's initials, OID (RLIN) | 0 |
Cataloger's initials, CIN (RLIN) | 110125 |
First Date, FD (RLIN) | m |
Local | @ |
-- | - |
-- | 0 |
No items available.