Logo

Cyber Infrastructure Protection

Large book cover: Cyber Infrastructure Protection

Cyber Infrastructure Protection
by

Publisher: Strategic Studies Institute
ISBN/ASIN: B00507PPQ2
Number of pages: 324

Description:
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(12486 views)
Book cover: An Introduction to Computer Security: The NIST HandbookAn Introduction to Computer Security: The NIST Handbook
by
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(14033 views)
Book cover: Security and Privacy in Wireless and Mobile NetworksSecurity and Privacy in Wireless and Mobile Networks
by - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(1549 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(14987 views)