Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare
The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the vario...
Saved in:
Other Authors: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton
CRC Press
2015
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-558653 | ||
005 | 2018310104743 | ||
020 | # | # | |a 9781482239225 |q hardback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a QA76.9 |b .C93 2015 |
245 | 1 | 0 | |a Cybersecurity |b protecting critical infrastructures from cyber attack and cyber warfare |c Edited by Thomas A Johnson |
264 | # | 1 | |a Boca Raton |b CRC Press |c 2015 |
264 | # | 4 | |c ©2015 |
300 | # | # | |a xv, 347 pages |c 25 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
520 | # | # | |a The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Cyberterrorism |x Prevention |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Information warfare |x Prevention |
700 | 1 | # | |a Johnson, Thomas A |e editor |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=558653 |
998 | # | # | |a 00264#1a006.2.2||00264#1b006.2.2||00300##a006.2.2||00300##b006.2.2||00300##c006.2.2||00520##a006.2.2||00520##b006.2.2|| |