TY - BOOK AU - Anderson,Robert H. TI - Securing the U.S. Defense Information Infrastructure: : a propose approach SN - 0-8330-2713-1 KW - Tecnologías de la Información y de la Comunicación KW - Seguridad de la información N1 - "Prepared for the Office of the Security of Defense, National Security Agency, Defense Advanced Research Projects Agency. National Defense Research Institute RAND"; Texto en inglés N2 - Preface. Figures. Tables. Summary. Acknowledgments. Acronyms and Abbreviations. Glossary. Chapter One. INTRODUCCITION. Problem and Purpose. Focus. Chapter Two. THE INFORMATION WARFARE THREAT AND THE MEII RESPONDE. Chapter three. VULNERABILITIES. Chapter Four. RESPONSIVE SECURITY TECHNIQUES. Chapter Five. IDENTIFYING SECURITY TECHNIQUES. Chapter Six. DISTRIBUTION OF RESEARCH EFFORT. Chapter Seven. RECOMMENDATIONS. Appendix.. A. HISTORIAL NOTE ON THE U,S, MINIMUN ESSENTIAL EMERGENCY COMMNICATIONS NETWORK. B. HOW THREATS RELEVANT TO AN MEII DIFFER FRON HACKER NUISANCE ATTACKS. C. BIOLOGICAL ANALOOGIES FOR INFORMATION SYSTEMS. E. ON DECEPTION. F. MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES. G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED. References ER -