Skip to content

Cyber Attacks Protecting National Infrastructure, STUDENT EDITION

Spend $50 to get a free DVD!

ISBN-10: 0123918553

ISBN-13: 9780123918550

Edition: 2013

Authors: Edward Amoroso

List price: $47.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A…    
Customers also bought

Book details

List price: $47.99
Copyright year: 2013
Publisher: Elsevier Science & Technology
Publication date: 3/29/2012
Binding: Hardcover
Pages: 336
Size: 7.75" wide x 9.45" long x 0.75" tall
Weight: 4.158
Language: English

Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.

Introduction
Deception
Separation
Diversity
Commonality
Depth
Discretion
Collection
Correlation
Awareness
Response
Case Studies
National Requirements