logo

Securing the U.S. Defense Information Infrastructure : a propose approach Robert H. Anderson [et al.]

Contributor(s): Material type: TextDescription: 157 p. gráf. col. 26 cmISBN:
  • 0-8330-2713-1
Subject(s): Summary: Preface. Figures. Tables. Summary. Acknowledgments. Acronyms and Abbreviations. Glossary. Chapter One. INTRODUCCITION. Problem and Purpose. Focus. Chapter Two. THE INFORMATION WARFARE THREAT AND THE MEII RESPONDE. Chapter three. VULNERABILITIES. Chapter Four. RESPONSIVE SECURITY TECHNIQUES. Chapter Five. IDENTIFYING SECURITY TECHNIQUES. Chapter Six. DISTRIBUTION OF RESEARCH EFFORT. Chapter Seven. RECOMMENDATIONS. Appendix.. A. HISTORIAL NOTE ON THE U,S, MINIMUN ESSENTIAL EMERGENCY COMMNICATIONS NETWORK. B. HOW THREATS RELEVANT TO AN MEII DIFFER FRON HACKER NUISANCE ATTACKS. C. BIOLOGICAL ANALOOGIES FOR INFORMATION SYSTEMS. E. ON DECEPTION. F. MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES. G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED. References.
Item type: Monografías
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Academia de Oficiales de la Guardia Civil AOGC - Sala 5473 (Browse shelf(Opens below)) Available 2015364
Total holds: 0

"Prepared for the Office of the Security of Defense, National Security Agency, Defense Advanced Research Projects Agency. National Defense Research Institute RAND".

Texto en inglés.

Preface.
Figures.
Tables.
Summary.
Acknowledgments.
Acronyms and Abbreviations.
Glossary.
Chapter One.
INTRODUCCITION.
Problem and Purpose.
Focus.
Chapter Two.
THE INFORMATION WARFARE THREAT AND THE MEII RESPONDE.
Chapter three.
VULNERABILITIES.
Chapter Four.
RESPONSIVE SECURITY TECHNIQUES.
Chapter Five.
IDENTIFYING SECURITY TECHNIQUES.
Chapter Six.
DISTRIBUTION OF RESEARCH EFFORT.
Chapter Seven.
RECOMMENDATIONS.
Appendix..
A. HISTORIAL NOTE ON THE U,S, MINIMUN ESSENTIAL EMERGENCY COMMNICATIONS NETWORK.
B. HOW THREATS RELEVANT TO AN MEII DIFFER FRON HACKER NUISANCE ATTACKS.
C. BIOLOGICAL ANALOOGIES FOR INFORMATION SYSTEMS.
E. ON DECEPTION.
F. MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES.
G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED.
References.

There are no comments on this title.

to post a comment.
Share