Cyber infrastructure protection / (Record no. 76234)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03147cam a22003257a 4500 |
001 - CONTROL NUMBER | |
control field | 12239732 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | SE-LIBR |
005 - DATE AND TIME | |
control field | 20120809144726.0 |
008 - GENERAL INFORMATION | |
fixed length control field | 110707s2011 paua | f000 0 eng c |
020 ## - ISBN | |
ISBN | 9781584874683 |
020 ## - ISBN | |
ISBN | 1584874686 |
040 ## - CATALOGUING LIBRARY | |
Original cataloging library | AWC |
Modifying library | AFQ |
-- | Sipr |
041 ## - LANGUAGE CODE | |
Language code | eng |
245 00 - TITLE | |
Title | Cyber infrastructure protection / |
Author, etc | Tarek Saadawi, Louis Jordan, Jr. editors. |
260 ## - PUBLICATION DATA | |
Place of publication | Carlisle, PA : |
Publisher | Strategic Studies Institute, U.S. Army War College, |
Year | 2011 |
300 ## - PAGES ETC | |
Pages | vi, 315 p. : |
Details | ill. ; |
Dimensions | 23 cm. |
500 ## - GENERAL NOTE | |
General note | "May 2011." |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
About the authors | Includes bibliographical references. |
505 0# - CONTENTS | |
Contents | Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the Internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Edward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angelos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar. |
520 ## - SUMMARY | |
Summary, etc | Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks. |
650 #7 - KEYWORD | |
Keyword | computers |
Subdivision | security |
-- | communications |
-- | protection |
-- | information technology |
653 ## - UNCONTROLLED KEYWORD | |
Uncontrolled keyword | infrastructure |
653 ## - UNCONTROLLED KEYWORD | |
Uncontrolled keyword | networks |
700 1# - ADDED AUTHOR/EDITOR | |
Author/Editor | Saadawi, Tarek Nazir, |
700 1# - ADDED AUTHOR/EDITOR | |
Author/Editor | Jordan, Louis, |
710 2# - ADDED INSTITUTION | |
Institution | US Army War College. |
Subordinate unit | Strategic Studies Institute, SSI |
852 ## - LOCATION | |
Classification part | 007 Cyber |
856 41 - ELECTRONIC LOCATION | |
URI | http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1067.pdf |
942 ## - ITEM TYPE (KOHA) | |
Koha item type | monograph |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Acquisition no. | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
SIPRI Library and Documentation | SIPRI Library and Documentation | 2011-07-08 | 007 Cyber | G11/751 | 2011-07-08 | monograph |