Cyber infrastructure protection /

Saved in:
Bibliographic Details
Imprint:Carlisle, PA : Strategic Studies Institute, U.S. Army War College, [2011]
Description:1 online resource (vi, 315 p.) : ill.
Language:English
Subject:
Format: E-Resource U.S. Federal Government Document Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/8388468
Hidden Bibliographic Details
Other authors / contributors:Saadawi, Tarek Nazir, 1951-
Jordan, Louis.
Army War College (U.S.). Strategic Studies Institute.
ISBN:9781584874683
1584874686
Notes:Title from PDF title page (viewed on May 16, 2011).
"May 2011."
Includes bibliographical references.
Summary:Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
GPO item no.:0307-A-31 (online)
Govt.docs classification:D 101.146:C 99

MARC

LEADER 00000nam a2200000 a 4500
001 8388468
003 ICU
005 20110607152300.0
006 m d f
007 cr bn|||||||||
008 110516s2011 paua sb f000 0 eng c
020 |z 9781584874683 
020 |z 1584874686 
035 |a (OCoLC)724097002 
040 |a AWC  |c AWC  |d GPO  |d MvI 
042 |a pcc 
050 4 |a U413.A66  |b C93 2011 
074 |a 0307-A-31 (online) 
086 0 |a D 101.146:C 99 
245 0 0 |a Cyber infrastructure protection /  |c Tarek Saadawi, Louis Jordan, editors. 
260 |a Carlisle, PA :  |b Strategic Studies Institute, U.S. Army War College,  |c [2011] 
300 |a 1 online resource (vi, 315 p.) :  |b ill. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
500 |a Title from PDF title page (viewed on May 16, 2011). 
500 |a "May 2011." 
520 |a Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks. 
504 |a Includes bibliographical references. 
505 0 |a Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Eddward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angleos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar. 
650 0 |a Cyberinfrastructure  |x Security measures. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00872341 
700 1 |a Saadawi, Tarek Nazir,  |d 1951-  |0 http://id.loc.gov/authorities/names/n86806186  |1 http://viaf.org/viaf/50718093 
700 1 |a Jordan, Louis.  |0 http://id.loc.gov/authorities/names/n82223993  |1 http://viaf.org/viaf/283515547 
710 2 |a Army War College (U.S.).  |b Strategic Studies Institute.  |0 http://id.loc.gov/authorities/names/n80120847  |1 http://viaf.org/viaf/150730355 
856 4 0 |u http://purl.fdlp.gov/GPO/gpo7624 
903 |a HeVa 
929 |a eresource 
999 f f |i 81a5a48c-02e7-5552-8da8-73b53758b393  |s 494e7b68-9321-55da-914e-03c3f5cb6faa 
928 |t Library of Congress classification  |a U413.A66C93 2011  |l Online  |c UC-FullText  |u http://purl.fdlp.gov/GPO/gpo7624  |g ebooks  |i 7226412