Securing the U.S. Defense Information Infrastructure : a propose approach Robert H. Anderson [et al.]
Material type:
TextDescription: 157 p. gráf. col. 26 cmISBN: - 0-8330-2713-1
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Academia de Oficiales de la Guardia Civil AOGC - Sala | 5473 (Browse shelf(Opens below)) | Available | 2015364 |
"Prepared for the Office of the Security of Defense, National Security Agency, Defense Advanced Research Projects Agency. National Defense Research Institute RAND".
Texto en inglés.
Preface.
Figures.
Tables.
Summary.
Acknowledgments.
Acronyms and Abbreviations.
Glossary.
Chapter One.
INTRODUCCITION.
Problem and Purpose.
Focus.
Chapter Two.
THE INFORMATION WARFARE THREAT AND THE MEII RESPONDE.
Chapter three.
VULNERABILITIES.
Chapter Four.
RESPONSIVE SECURITY TECHNIQUES.
Chapter Five.
IDENTIFYING SECURITY TECHNIQUES.
Chapter Six.
DISTRIBUTION OF RESEARCH EFFORT.
Chapter Seven.
RECOMMENDATIONS.
Appendix..
A. HISTORIAL NOTE ON THE U,S, MINIMUN ESSENTIAL EMERGENCY COMMNICATIONS NETWORK.
B. HOW THREATS RELEVANT TO AN MEII DIFFER FRON HACKER NUISANCE ATTACKS.
C. BIOLOGICAL ANALOOGIES FOR INFORMATION SYSTEMS.
E. ON DECEPTION.
F. MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES.
G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED.
References.
There are no comments on this title.
