‹ zurück Sie sind hier:  Startseite » Buchhändler » » Cyber Attacks: Protecting National Infrastructure

Linksbuch Neu neu Rechtsbuch

Amoroso, Edward

Cyber Attacks: Protecting National Infrastructure (Gebundene Ausgabe)


233 S. - Sprache: Englisch - 243x197x22 mm

ISBN: 0123849179 EAN: 9780123849175

Google has turned to the National Security Agency for technical assistance in an effort to learn more about the computer network attackers who breached the company?s cybersecurity defenses late in 2009, according to a recent NY Times report. National and global security and economic stability are increasingly threatened by the exponential rise in cyber attacks, whether they are mounted by national intelligence services, criminals, or some combination of hackers and state sponsors. Conventional computer security works at the enterprise level, but massively complex infrastructure demands a completely different approach to defeating these attacks. Amoroso?s 10 principles offer a way to design national and corporate policies that protect our most crucial systems, our money, and perhaps even our lives. Security managers in every organization urgently need the thought-provoking information this book provides.

Titel derzeit leider nicht verfügbar.


Über den Autor

Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.


"Amoroso's advice takes the art out of the debate onwhether security is art or science. He brings a high level goal oriented approach to practical situations in order for the 'right' security decisions to appear obvious to the reader. However, no book is a single solution, and this one is no exception. Some readers may be disappointed not to find comprehensive references for further reading. It is apparent that the book surveys a great deal of literature, but there is no bibliography. Readers may also be disappointed that there is no step-by-step guaranteed path to cyber security solutions. The book provides no procedures or checklists. Nevertheless, those who allow Amoroso to influence their view of the security problem at the level he chooses to present it should more easily be able to recognize cyber security solutions."--Computers and Security "Ed Amoroso has again given the policy community a thoughtful roadmap. Cyberthreats are becoming more sophisticated, but thankfully Ed is well abreast of the problem and leading with solutions."-John Hamre, Deputy Secretary of Defense (1997-2000), president and CEO of the Center for Strategic and Informational Studies, Washington, DC "Dr. Amoroso's fifth book Cyber Attacks: Protecting National Infrastructure outlines the challenges of protecting our nation's infrastructure from cyber attack using security techniques established to protect much smaller and less complex environments. He proposes a brand new type of national infrastructure protection methodology and outlines a strategy presented as a series of ten basic design and operations principles ranging from deception to response. The bulk of the text covers each of these principles in technical detail. While several of these principles would be daunting to implement and practice they provide the first clear and concise framework for discussion of this critical challenge. This text is thought-provoking and should be a 'must read' for anyone concerned with cybersecurity in the private or government sector."-Clayton W. Naeve, Ph.D., Senior Vice President and Chief Information Officer, Endowed Chair in Bioinformatics, St. Jude Children's Research Hospital, Memphis, TN "Dr. Ed Amoroso reveals in plain English the threats and weaknesses of our critical infrastructure balanced against practices that reduce the exposures. This is an excellent guide to the understanding of the cyber-scape that the security professional navigates. The book takes complex concepts of security and simplifies it into coherent and simple to understand concepts."-Arnold Felberbaum, Chief IT Security & Compliance Officer, Reed Elsevier "The national infrastructure, which is now vital to communication, commerce and entertainment in everyday life, is highly vulnerable to malicious attacks and terrorist threats. Today, it is possible for botnets to penetrate millions of computers around the world in few minutes, and to attack the valuable national infrastructure. "As the New York Times reported, the growing number of threats by botnets suggests that this cyber security issue has become a serious problem, and we are losing the war against these attacks. "While computer security technologies will be useful for network systems, the reality tells us that this conventional approach is not effective enough for the complex, large-scale national infrastructure. "Not only does the author provide comprehensive methodologies based on 25 years of experience in cyber security at AT&T, but he also suggests 'security through obscurity,' which attempts to use secrecy to provide security." -Byeong Gi Lee, President, IEEE Communications Society, and Commissioner of the Korea Communications Commission (KCC) "Amoroso has laid the much needed foundation for a solid Critical Infrastructure plan. Security professionals now have the basis to apply his ideas to solve an incredibly complex problem. "-Howard Israel, Corporate Security Officer, Fidessa Corporation "Cyber Attacks: Protecting National Infrastructure is a captivating journey through cyber security policy development for complex infrastructures by one of today's foremost experts on large-scale network security. It is a must read technological roadmap for anyone interested in what we must do to strengthen our national network security systems."-Ken Xie, CEO, Fortinet, Inc. "Some of his ideas are controversial and bound to incite debates about privacy and practice. For instance in his book, Cyber Attacks: Protecting National Infrastructure," Amoroso suggests using large-scale and coordinated collection of network-traffic data as well as security information from end-user desktops to pinpoint botnet-compromised computers, identify suspicious anomalies and trace attack paths."--Network World Magazine "In his new book Cyber Attacks: Protecting National Infrastructure, Amoroso takes a hard look at common information security practices that have failed to protect individuals, organizations, and ultimately US critical infrastructure. Amoroso offers a new way of looking at information security and some "common sense" strategies to thwart cyberattackers, who are becoming more sophisticated, organized, and advanced."--Infosecurity Magazine (an Elsevier publication) "Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology ikn their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. The book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction."--The Journal of Law Enforcement, Spring 2011 "What sets this effort apart is that it offers a comprehensive list of local enterprise-level suggestion and remedies as well as a plan that is scalable to protect national level infrastructure. What's more, the material is well-written and concisely presented. The author sets out his plan in sufficient detail but without miring the reader in technical details.I highly recommend this book for all intermediate-level and above security practitioners in IT and non-IT positions."--Security Management Magazine, September 2011, p. 168

ISBN 0-123849-17-9, ISBN 0-12-384917-9, ISBN 0-12384-917-9, ISBN 0-123-84917-9, ISBN 0-1238-4917-9

ISBN 978-0-123849-17-5, ISBN 978-0-12-384917-5, ISBN 978-0-12384-917-5, ISBN 978-0-123-84917-5, ISBN 978-0-1238-4917-5

Sparen Sie Versandkosten beim Kauf weiterer Artikel dieses Buchhändlers.

NETWORKING 2012 Workshops International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at von Becvar, Zdenek (Herausgeber); Bestak, Robert (Herausgeber); Kencl, Lukas (Herausgeber)
74,99 EUR

New Frontiers in Information and Software as Services Service and Application Design Challenges in t von Agrawal, Divyakant (Herausgeber); Candan, K. Selcuk (Herausgeber); Li, Wen-Syan (Herausgeber)
74,89 EUR

Public Key Cryptography - PKC 2011 14th International Conference on Practice and Theory in Public Ke von Catalano, Dario (Herausgeber); Fazio, Nelly (Herausgeber); Gennaro, Rosario (Herausgeber); Nicolosi,
74,89 EUR
Scaling Networks v6 Labs & Study Guide von Cisco Networking Academy; Johnson, Allan
50,50 EUR
Configuring Microsoft (R) SharePoint (R) 2010 MCTS Self-Paced Training Kit (Exam 70-667) von Holme, Dan; Matthews, Alastair; Castle, Bob; Thomas, Orin
68,49 EUR

38,06 EUR
Meine zuletzt angesehenen antiquarischen und neue Bücher
Meine letzten Buch Suchanfragen
    Noch keine Suchanfragen vorhanden.

© 2003 - 2018 by whSoft GmbH
Entdecken Sie außerdem: Antiquariatsportal · Achtung-Bücher.de · Booklink · Buchhai - Bücher Preisvergleich
Alle genannten Preise sind Bruttopreise und enthalten, soweit nicht anders vom Verkäufer angegeben, die gesetzliche Umsatzsteuer.