Cyber infrastructure protection: [1]
Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Carlisle, PA
Strategic Studies Institute, U.S. Army War College
2011
|
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks |
Beschreibung: | Includes bibliographical references Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the Internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Edward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angelos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar |
Beschreibung: | VI, 315 S. Ill., graph. Darst. |
ISBN: | 9781584874683 1584874686 |
Internformat
MARC
LEADER | 00000nam a2200000 cc4500 | ||
---|---|---|---|
001 | BV041158617 | ||
003 | DE-604 | ||
005 | 20130723 | ||
007 | t | ||
008 | 130722s2011 ad|| |||| 00||| eng d | ||
020 | |a 9781584874683 |c pbk. |9 978-1-58487-468-3 | ||
020 | |a 1584874686 |c pbk. |9 1-58487-468-6 | ||
035 | |a (OCoLC)856835043 | ||
035 | |a (DE-599)BVBBV041158617 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-29 | ||
084 | |a 8 |2 ssgn | ||
084 | |a 24,1 |2 ssgn | ||
245 | 1 | 0 | |a Cyber infrastructure protection |n [1] |c Strategic Studies Institute... Tarek Saadawi ..., eds. |
264 | 1 | |a Carlisle, PA |b Strategic Studies Institute, U.S. Army War College |c 2011 | |
300 | |a VI, 315 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
500 | |a Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the Internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Edward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angelos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar | ||
520 | |a Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks | ||
700 | 1 | |a Jordan, Louis |e Sonstige |4 oth | |
700 | 1 | |a Saadawi, Tarek Nazir |e Sonstige |4 oth | |
710 | 2 | |a Strategic Studies Institute (Carlisle Barracks, Pa.) |e Sonstige |0 (DE-588)1046371-9 |4 oth | |
773 | 0 | 8 | |w (DE-604)BV041158608 |g 1 |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026133919&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026133919 |
Datensatz im Suchindex
_version_ | 1804150564006658048 |
---|---|
adam_text | CONTENTS
Preface
..........................................................................
v
Chapter
1.
Introduction
..............................................1
Tarek Saadawi
and Louis Jordan
PART I: STRATEGY AND POLICY
ASPECTS
....................................................................13
Chapter
2.
Developing a Theory of
Cyberpower
...............................................................15
Stuart H. Starr
Chapter
3.
Survivability of the Internet
..................29
Michael
}.
Chumer
Chapter
4.
Are Large Scale Data Breaches
Inevitable?
........................................................51
Douglas
E. Salane
Chapter
5.
The Role of Cyberpower in
Humanitarian Assistance/Disaster
Relief (HA/
DR)
and Stability and
Reconstruction Operations
............................81
Larry Wentz
PART II: SOCIAL AND LEGAL ASPECTS
..........127
Chapter
6.
The Information Polity: Social and
Legal Frameworks for Critical Cyber
Infrastructure Protection
..............................129
Michael M. Losavio, J. Eagle Shutt, and
Deborah Wilson Keeling
111
Chapter
7.
The Attack Dynamics of Political
and Religiously Motivated Hackers
...........159
Thomas J. Holt
PART III: TECHNICAL ASPECTS
........................181
Chapter
8.
Resilience of Data Centers
...................183
Yehia H, Khalil and
Adel
S.
Elmaghrahy
Chapter
9.
Developing High Fidelity Sensors
for Intrusion Activity on Enterprise
Networks
.......................................................207
Edward Wagner and Anup K. Ghosh
Chapter
10.
Voice over IP: Risks, Threats, and
Vulnerabilities
..............................................223
Angelos D. Keromytis
Chapter
11.
Toward Foolproof IP Network
Configuration Assessments
........................263
Rajesh
Talpadé
Chapter
12.
On the New Breed of Denial
of Service (DoS) Attacks in the
Internet
..........................................................279
Nirwan
Ansari and Amey Shevtekar
About the Contributors
...........................................307
IV
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041158617 |
ctrlnum | (OCoLC)856835043 (DE-599)BVBBV041158617 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03534nam a2200373 cc4500</leader><controlfield tag="001">BV041158617</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130723 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130722s2011 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584874683</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-58487-468-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1584874686</subfield><subfield code="c">pbk.</subfield><subfield code="9">1-58487-468-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)856835043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041158617</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber infrastructure protection</subfield><subfield code="n">[1]</subfield><subfield code="c">Strategic Studies Institute... Tarek Saadawi ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Carlisle, PA</subfield><subfield code="b">Strategic Studies Institute, U.S. Army War College</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VI, 315 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the Internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Edward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angelos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jordan, Louis</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saadawi, Tarek Nazir</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Strategic Studies Institute (Carlisle Barracks, Pa.)</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1046371-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV041158608</subfield><subfield code="g">1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026133919&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026133919</subfield></datafield></record></collection> |
id | DE-604.BV041158617 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:40:55Z |
institution | BVB |
institution_GND | (DE-588)1046371-9 |
isbn | 9781584874683 1584874686 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026133919 |
oclc_num | 856835043 |
open_access_boolean | |
owner | DE-12 DE-29 |
owner_facet | DE-12 DE-29 |
physical | VI, 315 S. Ill., graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Strategic Studies Institute, U.S. Army War College |
record_format | marc |
spelling | Cyber infrastructure protection [1] Strategic Studies Institute... Tarek Saadawi ..., eds. Carlisle, PA Strategic Studies Institute, U.S. Army War College 2011 VI, 315 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references Introduction / Tarek Saadawi and Louis Jordan -- Pt. I. Strategy and policy aspects. Developing a theory of cyberpower / Stuart H. Starr -- Survivability of the Internet / Michael J. Chumer -- Are large scale data breaches inevitable? / Douglas E. Salane -- The role of cyberpower in humanitarian assistance/disaster relief (HA/DR) and stability and reconstruction operations / Larry Wentz -- Pt. II. Social and legal aspects. The information polity : social and legal frameworks for critical cyber infrastructure protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- The attack dynamics of political and religiously motivated hackers / Thomas J. Holt -- Pt. III. Technical aspects. Resilience of data centers / Yehia H. Khalil and Adel S. Elmaghraby -- Developing high fidelity sensors for intrusion activity on enterprise networks / Edward Wagner and Anup K. Ghosh -- Voice over IP : risks, threats, and vulnerabilities / Angelos D. Keromytis -- Toward foolproof IP network configuration assessments / Rajesh Talpade -- On the new breed of denial of service (DoS) attacks in the internet / Nirwan Ansari and Amey Shevtekar Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks Jordan, Louis Sonstige oth Saadawi, Tarek Nazir Sonstige oth Strategic Studies Institute (Carlisle Barracks, Pa.) Sonstige (DE-588)1046371-9 oth (DE-604)BV041158608 1 Digitalisierung BSB Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026133919&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cyber infrastructure protection |
title | Cyber infrastructure protection |
title_auth | Cyber infrastructure protection |
title_exact_search | Cyber infrastructure protection |
title_full | Cyber infrastructure protection [1] Strategic Studies Institute... Tarek Saadawi ..., eds. |
title_fullStr | Cyber infrastructure protection [1] Strategic Studies Institute... Tarek Saadawi ..., eds. |
title_full_unstemmed | Cyber infrastructure protection [1] Strategic Studies Institute... Tarek Saadawi ..., eds. |
title_short | Cyber infrastructure protection |
title_sort | cyber infrastructure protection |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026133919&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041158608 |
work_keys_str_mv | AT jordanlouis cyberinfrastructureprotection1 AT saadawitareknazir cyberinfrastructureprotection1 AT strategicstudiesinstitutecarlislebarrackspa cyberinfrastructureprotection1 |