Cyber Attacks : (Record no. 912753)

001 - CONTROL NUMBER
control field EBL610561
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics a|||||s|||||||| ||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 800623|uuuuuuuuxx||||||s |||||||eng||
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123849182
Terms of availability 113.31 (UA),75.54 (1U)
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)610561
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)677828684
040 ## - CATALOGING SOURCE
Original cataloging agency AU-PeEL
Language of cataloging eng
Transcribing agency AU-PeEL
Modifying agency AU-PeEL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.2 .A47 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.32590046
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) HV6773.2 .A47 2011
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Amoroso, Edward.
245 10 - TITLE STATEMENT
Title Cyber Attacks :
Remainder of title Protecting National Infrastructure
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Saint Louis :
Name of publisher, distributor, etc Elsevier Science,
Date of publication, distribution, etc 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (246 p.)
490 0# - SERIES STATEMENT
Series statement eBooks on Demand
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover; Cyber Attacks: Protecting National Infrastructure; Copyright Page; Contents; Preface; Acknowledgment; Chapter 1 Introduction; National Cyber Threats, Vulnerabilities, and Attacks; Botnet Threat; National Cyber Security Methodology Components; Deception; Separation; Diversity; Consistency; Depth; Discretion; Collection; Correlation; Awareness; Response; Implementing the Principles Nationally; Chapter 2 Deception; Scanning Stage; Deliberately Open Ports; Discovery Stage; Deceptive Documents; Exploitation Stage; Procurement Tricks; Exposing Stage
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Interfaces Between Humans and ComputersNational Deception Program; Chapter 3 Separation; What Is Separation?; Functional Separation; National Infrastructure Firewalls; DDOS Filtering; SCADA Separation Architecture; Physical Separation; Insider Separation; Asset Separation; Multilevel Security (MLS); Chapter 4 Diversity; Diversity and Worm Propagation; Desktop Computer System Diversity; Diversity Paradox of Cloud Computing; Network Technology Diversity; Physical Diversity; National Diversity Program; Chapter 5 Commonality; Meaningful Best Practices for Infrastructure Protection
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Locally Relevant and Appropriate Security PolicyCulture of Security Protection; Infrastructure Simplification; Certification and Education; Career Path and Reward Structure; Responsible Past Security Practice; National Commonality Program; Chapter 6 Depth; Effectiveness of Depth; Layered Authentication; Layered E-Mail Virus and Spam Protection; Layered Access Controls; Layered Encryption; Layered Intrusion Detection; National Program of Depth; Chapter 7 Discretion; Trusted Computing Base; Security Through Obscurity; Information Sharing; Information Reconnaissance; Obscurity Layers
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Organizational CompartmentsNational Discretion Program; Chapter 8 Collection; Collecting Network Data; Collecting System Data; Security Information and Event Management; Large-Scale Trending; Tracking a Worm; National Collection Program; Chapter 9 Correlation; Conventional Security Correlation Methods; Quality and Reliability Issues in Data Correlation; Correlating Data to Detect a Worm; Correlating Data to Detect a Botnet; Large-Scale Correlation Process; National Correlation Program; Chapter 10 Awareness; Detecting Infrastructure Attacks; Managing Vulnerability Information
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Cyber Security Intelligence ReportsRisk Management Process; Security Operations Centers; National Awareness Program; Chapter 11 Response; Pre-Versus Post-Attack Response; Indications and Warning; Incident Response Teams; Forensic Analysis; Law Enforcement Issues; Disaster Recovery; National Response Program; Appendix: Sample National Infrastructure Protection Requirements; Sample Deception Requirements (Chapter 2); Sample Separation Requirements (Chapter 3); Sample Diversity Requirements (Chapter 4); Sample Commonality Requirements (Chapter 5); Sample Depth Requirements (Chapter 6)
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Sample Discretion Requirements (Chapter 7)
520 ## - SUMMARY, ETC.
Summary, etc No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in att
588 ## -
-- Description based upon print version of record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security - United States.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security -- United States.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism - United States - Prevention.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism -- United States -- Prevention.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element National security - United States.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element National security -- United States.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Amoroso, Edward
Title Cyber Attacks : Protecting National Infrastructure
Place, publisher, and date of publication Saint Louis : Elsevier Science,c2014
International Standard Book Number 9780123849175
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://uttyler.eblib.com/patron/FullRecord.aspx?p=610561">http://uttyler.eblib.com/patron/FullRecord.aspx?p=610561</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform EBL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 11/30/2015   HV6773.2 .A47 2011 EBL610561 11/30/2015 http://uttyler.eblib.com/patron/FullRecord.aspx?p=610561 11/30/2015 Electronic Book