000 01586cam a2200325 i 4500
003 SA-RiNAUS
005 20230531084257.0
008 120105s2013 maua b 000 0 eng d
020 _a9780123918550 (hardback)
040 _aSA-RiNAUS
_beng
_cSA-RiNAUS
_erda
043 _an-us---
082 0 4 _a363.32590046780973
_221
_bA E C
100 1 _aAmoroso, Edward G.
_dAuthor.
_937358
245 1 0 _aCyber attacks :
_bprotecting national infrastructure /
_cEdward Amoroso, John R. Vacca.
250 _aStudent edition.
264 1 _aWaltham, MA :
_bButterworth-Heinemann,
_c2013.
300 _axv, 319 pages. :
_billustrations ;
_c24 cm
505 8 _aMachine generated contents note: Chapter One: Introduction Chapter Two: Deception Chapter Three: Separation Chapter Four: Diversity Chapter Five: Consistency Chapter Six: Validation Chapter Seven: Collection Chapter Eight: Correlation Chapter Nine: Obscurity Chapter Ten: Awareness Chapter Eleven: Response Appendix A: Case Studies Appendix B: National Requirements.
520 _a"Ten basic principles that will reduce the risk of cyber attack to national infrastructure in a substantive manner"--
650 4 _aCyberterrorism
_zUnited States
_xPrevention.
_937357
650 4 _aComputer networks
_xSecurity measures.
650 4 _aCyberspace
_xSecurity measures.
_92867
650 4 _aComputer crimes
_zUnited States
_xPrevention.
650 4 _aNational security
_zUnited States.
_92606
700 1 _aVacca, John R.
_eAuthor.
_92097
942 _2ddc
_cNEW
999 _c34016
_d34015