gogogo

Cyber attacks (Record no. 29648)

MARC details
000 -LEADER
fixed length control field 04231nam a2200385Ka 4500
001 - CONTROL NUMBER
control field 6ocm77828684
003 - CONTROL NUMBER IDENTIFIER
control field IE-LiIT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180119131920.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101104s2011 mau s 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0123849179 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123849175 (electronic bk.)
037 ## - SOURCE OF ACQUISITION
Stock number 1100567:10945411
Source of stock number/acquisition Elsevier Science & Technology
Note http://www.sciencedirect.com
040 ## - CATALOGING SOURCE
Original cataloging agency OPELS
Language of cataloging eng
Transcribing agency OPELS
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Amoroso, Edward G.
9 (RLIN) 16630
245 10 - TITLE STATEMENT
Title Cyber attacks
Medium [electronic book] :
Remainder of title protecting national infrastructure /
Statement of responsibility, etc. Edward Amoroso.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington, MA :
Name of publisher, distributor, etc. Butterworth-Heinemann,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent p. cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Deception -- Separation -- Diversity -- Commonality -- Depth -- Discretion -- Collection -- Correlation -- Awareness -- Response.
520 ## - SUMMARY, ETC.
Summary, etc. No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Amsterdam :
Agency responsible for reproduction Elsevier Science & Technology,
Date of reproduction 2010.
Note about reproduction Mode of access: World Wide Web.
-- System requirements: Web browser.
-- Title from title screen (viewed on Nov. 3, 2010).
-- Access may be restricted to users at subscribing institutions.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
Geographic subdivision United States
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Geographic subdivision United States.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element National security
Geographic subdivision United States.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ScienceDirect (Online service)
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Amoroso, Edward G.
Title Cyber attacks.
Place, publisher, and date of publication Burlington, MA : Butterworth-Heinemann, c2011
International Standard Book Number 9780123849175
Record control number (DLC) 2010040626
-- (OCoLC)670211398
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www-sciencedirect-com.ezproxy.lit.ie/science/book/9780123849175">https://www-sciencedirect-com.ezproxy.lit.ie/science/book/9780123849175</a>
Link text ScienceDirect eBook
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 120815
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b1119151x
b ebook
c ebook
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Suppress in OPAC 0
Source of classification or shelving scheme Dewey Decimal Classification
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Operator's initials, OID (RLIN) 0
Cataloger's initials, CIN (RLIN) 110125
First Date, FD (RLIN) m
Local @
-- -
-- 0

No items available.

Powered by Koha