Cyber infrastructure protection
(eBook)

Book Cover
Average Rating
Published
Carlisle, PA : Strategic Studies Institute, U.S. Army War College, [2011].
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eBook
Language
English

Notes

General Note
Title from PDF title page (viewed on May 16, 2011)
General Note
"May 2011."
Bibliography
Includes bibliographical references.
Description
Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.

Citations

APA Citation, 7th Edition (style guide)

Saadawi, T. N., & Jordan, L. (2011). Cyber infrastructure protection . Strategic Studies Institute, U.S. Army War College.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Saadawi, Tarek Nazir, 1951- and Louis. Jordan. 2011. Cyber Infrastructure Protection. Strategic Studies Institute, U.S. Army War College.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Saadawi, Tarek Nazir, 1951- and Louis. Jordan. Cyber Infrastructure Protection Strategic Studies Institute, U.S. Army War College, 2011.

MLA Citation, 9th Edition (style guide)

Saadawi, Tarek Nazir, and Louis Jordan. Cyber Infrastructure Protection Strategic Studies Institute, U.S. Army War College, 2011.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
ad02e085-73de-53f9-0086-4629b716fd99-eng
Go To Grouped Work

Grouping Information

Grouped Work IDad02e085-73de-53f9-0086-4629b716fd99-eng
Full titlecyber infrastructure protection
Authortarek saadawi louis jordan
Grouping Categorybook
Last Update2022-07-13 05:41:45AM
Last Indexed2024-07-12 00:33:26AM

Book Cover Information

Image Sourcedefault
First LoadedSep 11, 2022
Last UsedJul 5, 2024

Marc Record

First DetectedMay 16, 2011 12:00:00 AM
Last File Modification TimeAug 18, 2021 03:28:51 AM

MARC Record

LEADER03296nam a2200361 a 4500
001ocn724097002
003OCoLC
00520110517160635.0
006m        d f      
007cr bn|||||||||
008110516s2011    paua    ob   f000 0 eng c
020 |z 9781584874683
020 |z 1584874686
040 |a AWC|c AWC|d GPO|d MvI
042 |a pcc
049 |a TNN
074 |a 0307-A-31 (online)
0860 |a D 101.146:C 99
099 |a D 101.146:C 99
24500|a Cyber infrastructure protection|h [electronic resource] /|c Tarek Saadawi, Louis Jordan, editors.
260 |a Carlisle, PA :|b Strategic Studies Institute, U.S. Army War College,|c [2011]
300 |a 1 online resource (vi, 315 p.) :|b ill.
500 |a Title from PDF title page (viewed on May 16, 2011)
500 |a "May 2011."
504 |a Includes bibliographical references.
5050 |a Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Eddward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angleos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar.
520 |a Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
650 0|a Cyberinfrastructure|x Security measures.
650 0|a Computer networks|x Security measures.
7001 |a Saadawi, Tarek Nazir,|d 1951-
7001 |a Jordan, Louis.
7102 |a Army War College (U.S.).|b Strategic Studies Institute.
85640|u http://purl.fdlp.gov/GPO/gpo7624|z Online Version