Skip to content

Cyber Attacks Protecting National Infrastructure

Best in textbook rentals since 2012!

ISBN-10: 0123849179

ISBN-13: 9780123849175

Edition: 2011

Authors: Edward Amoroso

List price: $43.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as…    
Customers also bought

Book details

List price: $43.99
Copyright year: 2011
Publisher: Elsevier Science & Technology
Publication date: 12/20/2010
Binding: Hardcover
Pages: 248
Size: 7.50" wide x 9.21" long x 1.00" tall
Weight: 1.540
Language: English

Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.

Introduction
Deception
Separation
Diversity
Commonality
Depth
Discretion
Collection
Correlation
Awareness
Response
Appendix: Sample National Infrastructure Protection Requirements