000 01586nam a22001937a 4500
005 20151203093122.0
008 151103p us ||||f |||| 00| 0 eng d
020 _a0-8330-2713-1
040 _aES-ArAOG
245 0 0 _aSecuring the U.S. Defense Information Infrastructure
_b: a propose approach
_cRobert H. Anderson [et al.]
300 _a157 p.
_bgráf. col.
_c26 cm
500 _a"Prepared for the Office of the Security of Defense, National Security Agency, Defense Advanced Research Projects Agency. National Defense Research Institute RAND".
500 _aTexto en inglés.
520 _aPreface. Figures. Tables. Summary. Acknowledgments. Acronyms and Abbreviations. Glossary. Chapter One. INTRODUCCITION. Problem and Purpose. Focus. Chapter Two. THE INFORMATION WARFARE THREAT AND THE MEII RESPONDE. Chapter three. VULNERABILITIES. Chapter Four. RESPONSIVE SECURITY TECHNIQUES. Chapter Five. IDENTIFYING SECURITY TECHNIQUES. Chapter Six. DISTRIBUTION OF RESEARCH EFFORT. Chapter Seven. RECOMMENDATIONS. Appendix.. A. HISTORIAL NOTE ON THE U,S, MINIMUN ESSENTIAL EMERGENCY COMMNICATIONS NETWORK. B. HOW THREATS RELEVANT TO AN MEII DIFFER FRON HACKER NUISANCE ATTACKS. C. BIOLOGICAL ANALOOGIES FOR INFORMATION SYSTEMS. E. ON DECEPTION. F. MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES. G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED. References.
650 0 _912849
_aTecnologías de la Información y de la Comunicación
650 0 _913686
_aSeguridad de la información
700 1 _913687
_aAnderson, Robert H.
942 _2udc
_cBK
999 _c17076
_d17079