| 000 | 01586nam a22001937a 4500 | ||
|---|---|---|---|
| 005 | 20151203093122.0 | ||
| 008 | 151103p us ||||f |||| 00| 0 eng d | ||
| 020 | _a0-8330-2713-1 | ||
| 040 | _aES-ArAOG | ||
| 245 | 0 | 0 |
_aSecuring the U.S. Defense Information Infrastructure _b: a propose approach _cRobert H. Anderson [et al.] |
| 300 |
_a157 p. _bgráf. col. _c26 cm |
||
| 500 | _a"Prepared for the Office of the Security of Defense, National Security Agency, Defense Advanced Research Projects Agency. National Defense Research Institute RAND". | ||
| 500 | _aTexto en inglés. | ||
| 520 | _aPreface. Figures. Tables. Summary. Acknowledgments. Acronyms and Abbreviations. Glossary. Chapter One. INTRODUCCITION. Problem and Purpose. Focus. Chapter Two. THE INFORMATION WARFARE THREAT AND THE MEII RESPONDE. Chapter three. VULNERABILITIES. Chapter Four. RESPONSIVE SECURITY TECHNIQUES. Chapter Five. IDENTIFYING SECURITY TECHNIQUES. Chapter Six. DISTRIBUTION OF RESEARCH EFFORT. Chapter Seven. RECOMMENDATIONS. Appendix.. A. HISTORIAL NOTE ON THE U,S, MINIMUN ESSENTIAL EMERGENCY COMMNICATIONS NETWORK. B. HOW THREATS RELEVANT TO AN MEII DIFFER FRON HACKER NUISANCE ATTACKS. C. BIOLOGICAL ANALOOGIES FOR INFORMATION SYSTEMS. E. ON DECEPTION. F. MAPPING SECURITY SOLUTION TECHNIQUES TO VULNERABILITIES. G. INFORMATION ASSURANCE RESEARCH PROJECTS EXAMINED. References. | ||
| 650 | 0 |
_912849 _aTecnologías de la Información y de la Comunicación |
|
| 650 | 0 |
_913686 _aSeguridad de la información |
|
| 700 | 1 |
_913687 _aAnderson, Robert H. |
|
| 942 |
_2udc _cBK |
||
| 999 |
_c17076 _d17079 |
||