Provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyber power, a discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concerning the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.in Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz, Eds., Cyberpower and National Security, Washington, DC: Center for ... Dan Gonzales et al., aNetwork- Centric Operations Case Study: Air-to-Air Combat With and Without Link 16, a Santa Monica, ... John Markoff, aVast Spy System Loots Computers in 103 Countries, a New York Times, March 29, 2009. 12. Emad Aboelela, aNetwork Simulation Experiments Manual, a Amsterdam: Morgan Kaufmann Publishers, 3rd Ed., June 2003.
|Title||:||Cyber Infrastructure Protection|
|Author||:||Tarek Saadawi, Louis H Jordan|
|Publisher||:||Strategic Studies Institute - 2011-05|