Cyber attacks: protecting national infrastructure
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Butterworth-Heinemann
©2011
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9780123849175 0123849179 9780123849182 0123849187 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300709 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9780123849175 |c electronic bk. |9 978-0-12-384917-5 | ||
020 | |a 0123849179 |c electronic bk. |9 0-12-384917-9 | ||
020 | |a 9780123849182 |c electronic bk. |9 978-0-12-384918-2 | ||
020 | |a 0123849187 |c electronic bk. |9 0-12-384918-7 | ||
035 | |a (OCoLC)677828684 | ||
035 | |a (DE-599)BVBBV042300709 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 363.325/90046780973 |2 22 | |
100 | 1 | |a Amoroso, Edward G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber attacks |b protecting national infrastructure |c Edward Amoroso |
264 | 1 | |a Burlington, MA |b Butterworth-Heinemann |c ©2011 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. | ||
500 | |a This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. | ||
500 | |a * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a National security | |
650 | 4 | |a Prevention | |
650 | 4 | |a Social Science | |
650 | 4 | |a Computer crimes / United States / Prevention | |
650 | 4 | |a Cyberterrorism / United States / Prevention | |
650 | 4 | |a Cyberspace / Security measures / United States | |
650 | 4 | |a Computer security / United States | |
650 | 4 | |a National security / United States | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a National security |2 fast | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Cyberterrorism |z United States |x Prevention | |
650 | 4 | |a Computer security |z United States | |
650 | 4 | |a National security |z United States | |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
651 | 4 | |a United States | |
651 | 7 | |a United States |2 fast | |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 2 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 1 | 2 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | 3 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780123849175 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737701 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804152878429896704 |
---|---|
any_adam_object | |
author | Amoroso, Edward G. |
author_facet | Amoroso, Edward G. |
author_role | aut |
author_sort | Amoroso, Edward G. |
author_variant | e g a eg ega |
building | Verbundindex |
bvnumber | BV042300709 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)677828684 (DE-599)BVBBV042300709 |
dewey-full | 363.325/90046780973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325/90046780973 |
dewey-search | 363.325/90046780973 |
dewey-sort | 3363.325 1190046780973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05374nmm a2200889zc 4500</leader><controlfield tag="001">BV042300709</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123849175</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-384917-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123849179</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-384917-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123849182</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-384918-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123849187</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-384918-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)677828684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300709</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325/90046780973</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Amoroso, Edward G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber attacks</subfield><subfield code="b">protecting national infrastructure</subfield><subfield code="c">Edward Amoroso</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">©2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">* Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / United States / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security / United States</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">National security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123849175</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737701</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | United States United States fast USA USA (DE-588)4078704-7 gnd |
geographic_facet | United States USA |
id | DE-604.BV042300709 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9780123849175 0123849179 9780123849182 0123849187 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737701 |
oclc_num | 677828684 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Amoroso, Edward G. Verfasser aut Cyber attacks protecting national infrastructure Edward Amoroso Burlington, MA Butterworth-Heinemann ©2011 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes index No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. Includes bibliographical references and index Computer security Cyberterrorism National security Prevention Social Science Computer crimes / United States / Prevention Cyberterrorism / United States / Prevention Cyberspace / Security measures / United States Computer security / United States National security / United States POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computer security fast Cyberterrorism / Prevention fast National security fast Terrorismus Cyberterrorism United States Prevention Computer security United States National security United States Cyberspace (DE-588)4266146-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Prävention (DE-588)4076308-0 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf United States United States fast USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Cyberspace (DE-588)4266146-8 s Computerkriminalität (DE-588)4010452-7 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Sicherheitspolitik (DE-588)4116489-1 s Information warfare (DE-588)4461975-3 s Prävention (DE-588)4076308-0 s 2\p DE-604 http://www.sciencedirect.com/science/book/9780123849175 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Amoroso, Edward G. Cyber attacks protecting national infrastructure Computer security Cyberterrorism National security Prevention Social Science Computer crimes / United States / Prevention Cyberterrorism / United States / Prevention Cyberspace / Security measures / United States Computer security / United States National security / United States POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computer security fast Cyberterrorism / Prevention fast National security fast Terrorismus Cyberterrorism United States Prevention Computer security United States National security United States Cyberspace (DE-588)4266146-8 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Prävention (DE-588)4076308-0 gnd Information warfare (DE-588)4461975-3 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4266146-8 (DE-588)4274324-2 (DE-588)4116489-1 (DE-588)4076308-0 (DE-588)4461975-3 (DE-588)4010452-7 (DE-588)4078704-7 |
title | Cyber attacks protecting national infrastructure |
title_auth | Cyber attacks protecting national infrastructure |
title_exact_search | Cyber attacks protecting national infrastructure |
title_full | Cyber attacks protecting national infrastructure Edward Amoroso |
title_fullStr | Cyber attacks protecting national infrastructure Edward Amoroso |
title_full_unstemmed | Cyber attacks protecting national infrastructure Edward Amoroso |
title_short | Cyber attacks |
title_sort | cyber attacks protecting national infrastructure |
title_sub | protecting national infrastructure |
topic | Computer security Cyberterrorism National security Prevention Social Science Computer crimes / United States / Prevention Cyberterrorism / United States / Prevention Cyberspace / Security measures / United States Computer security / United States National security / United States POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh Computer security fast Cyberterrorism / Prevention fast National security fast Terrorismus Cyberterrorism United States Prevention Computer security United States National security United States Cyberspace (DE-588)4266146-8 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Prävention (DE-588)4076308-0 gnd Information warfare (DE-588)4461975-3 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Computer security Cyberterrorism National security Prevention Social Science Computer crimes / United States / Prevention Cyberterrorism / United States / Prevention Cyberspace / Security measures / United States Computer security / United States National security / United States POLITICAL SCIENCE / Political Freedom & Security / Terrorism Cyberterrorism / Prevention Terrorismus Cyberterrorism United States Prevention Computer security United States National security United States Cyberspace Computersicherheit Sicherheitspolitik Prävention Information warfare Computerkriminalität United States USA |
url | http://www.sciencedirect.com/science/book/9780123849175 |
work_keys_str_mv | AT amorosoedwardg cyberattacksprotectingnationalinfrastructure |