Advances in cyber security : technology, operations, and experiences /
The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. This book collects the wisdom of cyber security profession...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
New York :
Fordham University Press,
2013
|
Edition: | First edition. |
Subjects: | |
Online Access: | CONNECT CONNECT |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | mig00005520230 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 130425s2013 nyua ob 001 0 eng d | ||
005 | 20230818142837.5 | ||
010 | |z 2012039718 | ||
019 | |a 861559250 |a 871194196 |a 1055358656 |a 1066420063 |a 1162481476 |a 1175640869 |a 1228610623 |a 1290098408 |a 1303485255 | ||
020 | |a 9780823250325 |q (electronic bk.) | ||
020 | |a 0823250326 |q (electronic bk.) | ||
020 | |a 9780823244591 |q (electronic bk.) | ||
020 | |a 0823244598 |q (electronic bk.) | ||
020 | |z 9780823244577 |q (pbk. ; |q alk. paper) | ||
020 | |z 0823244571 |q (pbk. ; |q alk. paper) | ||
020 | |z 9780823244560 |q (cloth ; |q alk. paper) | ||
020 | |z 0823244563 |q (cloth ; |q alk. paper) | ||
020 | |z 9781299940703 | ||
020 | |z 1299940706 | ||
020 | |a 0823268942 | ||
020 | |a 9780823268948 | ||
035 | |a 1WRLDSHRocn840820211 | ||
035 | |a (OCoLC)840820211 |z (OCoLC)861559250 |z (OCoLC)871194196 |z (OCoLC)1055358656 |z (OCoLC)1066420063 |z (OCoLC)1162481476 |z (OCoLC)1175640869 |z (OCoLC)1228610623 |z (OCoLC)1290098408 |z (OCoLC)1303485255 | ||
037 | |a 525321 |b MIL | ||
037 | |a 22573/ctt132k15x |b JSTOR | ||
040 | |a FER |b eng |e pn |c FER |d FER |d E7B |d IDEBK |d P@U |d YDXCP |d OCLCO |d COO |d OCLCQ |d OCLCO |d CUS |d STBDS |d IYU |d MOR |d OTZ |d OCLCQ |d EBLCP |d DEBSZ |d CDX |d N$T |d JSTOR |d CCO |d COCUF |d CNNOR |d LOA |d K6U |d STF |d MERUC |d IGB |d IOG |d AGLDB |d ICG |d EZ9 |d CUY |d ZCU |d D6H |d N$T |d OCLCF |d OCLCQ |d VTS |d AUW |d MHW |d BTN |d INTCL |d SNK |d VT2 |d AU@ |d OCLCQ |d WYU |d G3B |d LVT |d S8J |d S9I |d TKN |d LEAUB |d DKC |d OCLCQ |d INARC |d VLY |d UX1 |d AJS |d OCLCO |d DGITA |d OCL |d OCLCO |d OCLCQ |d KMS |d SFB |d OCLCQ | ||
049 | |a TXMM | ||
050 | 4 | |a TK5105.875.I57 |b A343 2013eb | |
082 | 0 | 4 | |a 005.8 |2 23 |
245 | 0 | 0 | |a Advances in cyber security : |b technology, operations, and experiences / |c edited by D. Frank Hsu and Dorothy Marinucci. |
250 | |a First edition. | ||
264 | 1 | |a New York : |b Fordham University Press, |c 2013 | |
300 | |a 1 online resource (xi, 257 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. This book collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security - including details of real-life operations. The useful knowledge and experience shared in this volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. -- Publisher description. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Building a secure and sustainable cyberspace ecosystem : an overview / D. Frank Hsu -- Technology. Improving cyber security / Ruby B. Lee ; Practical vulnerabilities of the Tor Anonymity network / Paul Syverson ; Defending software systems against cyber attacks throughout their lifecycle / Hira Agrawal, Thomas F. Bowen, Sanjai Narain ; Improve availability of networks : internet exchange points and their role in cyberspace / Akio Sugeno -- Operations. Tor : uses and limitations of online anonymity / Andrew Lewman ; Authoritative data sources : cyber security intelligence perspectives / Kuan-Tsae Huang and Hwai-Jan Wu ; The evolving consumer online threat landscape : creating an effective response / Adam Palmer ; Partners in cybercrime / Eileen Monsma, Vincent Buskens, Melvin Soudijn, and Paul Nieuwbeerta -- Experiences. Securing IT networks incorporating medical devices : risk management and compliance in health care cyber security / Nicholas J. Mankovich ; Computer forensics from a law enforcement perspective / Kevin Kelly ; Computer crime incidents and responses in the private sector / Edward M. Stroz ; Information technology for a safe and secure society in Japan : toward a cyber-physical solution / Kazuo Takaragi -- Partnership, policy and sustainability. Public-private partnerships changing the world / Kathleen L. Kiernan and Dyann Bradbury ; Cyber security : protecting our cyber citizens / Preet Bharara ; Cyber security : safeguarding our cyberspace / Robert S. Mueller III ; Cyber security : securing our cyber ecosystem / Howard A. Schmidt. | |
588 | 0 | |a Print version record. | |
546 | |a English. | ||
500 | |a Project MUSE Universal EBA Ebooks |5 TMurS | ||
500 | |a Books at JSTOR Evidence Based Acquisitions |5 TMurS | ||
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Cyberspace |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
700 | 1 | |a Hsu, D. Frank |q (Derbiau Frank), |d 1948- | |
700 | 1 | |a Marinucci, Dorothy. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |t Advances in cyber security : technology, operations, and experiences. |d New York : Fordham University Press, 2013 |z 9780823244560 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://muse.jhu.edu/book/22215 |z CONNECT |3 Project MUSE |t 0 |
856 | 4 | 0 | |u https://ezproxy.mtsu.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctt13x07xx |z CONNECT |3 JSTOR |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s ac014755-0b76-411e-9fe1-dc5a8f791c3d |i fc734305-1e6f-4dfd-af4d-cec18b06bfc6 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e TK5105.875.I57 A343 2013eb |h Library of Congress classification |