Cyber Attacks

CHF 81.30
Auf Lager
SKU
6E4BR42S2HN
Stock 1 Verfügbar
Geliefert zwischen Mi., 26.11.2025 und Do., 27.11.2025

Details

Deals with the national debate on protecting critical infrastructure. This book covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in US Federal Government settings and a range of global commercial environments.

Autorentext
Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.

Klappentext

Google has turned to the National Security Agency for technical assistance in an effort to learn more about the computer network attackers who breached the company s cybersecurity defenses late in 2009, according to a recent NY Times report. National and global security and economic stability are increasingly threatened by the exponential rise in cyber attacks, whether they are mounted by national intelligence services, criminals, or some combination of hackers and state sponsors. Conventional computer security works at the enterprise level, but massively complex infrastructure demands a completely different approach to defeating these attacks. Amoroso s 10 principles offer a way to design national and corporate policies that protect our most crucial systems, our money, and perhaps even our lives. Security managers in every organization urgently need the thought-provoking information this book provides.


Inhalt

  1. Introduction2. Deception3. Separation4. Diversity5. Commonality6. Depth7. Discretion8. Collection9. Correlation10. Awareness11. ResponseAppendix: Sample National Infrastructure Protection Requirements

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09780123849175
    • Sprache Englisch
    • Größe H240mm x B15mm x T195mm
    • Jahr 2010
    • EAN 9780123849175
    • Format Fester Einband
    • ISBN 978-0-12-384917-5
    • Veröffentlichung 20.12.2010
    • Titel Cyber Attacks
    • Autor Edward Amoroso
    • Untertitel Protecting National Infrastructure. Reference
    • Gewicht 690g
    • Herausgeber Elsevier LTD, Oxford
    • Anzahl Seiten 248
    • Genre Informatik

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470