Suggested Topics within your search.
Suggested Topics within your search.
1
[Vol. 1:. - 2011. - VI,315 S. - ISBN 1-58487-468-6
Vol. 2: - 2013. - VIII,267 S. - ISBN 1-58487-571-2
vol I. - Chapter 1. Introduction / Tarek Saadawi and Louis Jordan 1. - PART I: STRATEGY AND POLICY ASPECTS . - Chapter 2. Developing a Theory of Cyberpower / Stuart H. Starr 15. - Chapter 3. Survivability of the Internet / Michael J. Chumer 29. - Chapter 4. Are Large Scale Data Breaches Inevitable? / Douglas E. Salane 51. - Chapter 5. The Role of Cyberpower in Humanitarian Assistance/Disaster Relief (HA/DR) and Stability and Reconstruction Operations / Larry Wentz 81. - PART II: SOCIAL AND LEGAL ASPECTS. - Chapter 6. The Information Polity: Social and Legal Frameworks for Critical Cyber Infrastructure Protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling 129. - Chapter 7. The Attack Dynamics of Political and Religiously Motivated Hackers / Thomas J. Holt 159. - PART III: TECHNICAL ASPECTS. - Chapter 8. Resilience of Data Centers / Yehia H. Khalil and Adel S. Elmaghraby 183. - Chapter 9. Developing High Fidelity Sensors for Intrusion Activity on Enterprise Networks / Edward Wagner and Anup K. Ghosh 207. - Chapter 10. Voice over IP: Risks, Threats, and Vulnerabilities / Angelos D. Keromytis 223. - Chapter 11. Toward Foolproof IP Network Configuration Assessments / Rajesh Talpade 263. - Chapter 12. On the New Breed of Denial of Service (DoS) Attacks in the Internet / Nirwan Ansari and Amey Shevtekar 279. - Vol. II. - 1. Introduction / Tarek Saadawi, Louis H. Jordan, Jr., and Vincent Boudreau 1. - PART I: ECONOMICS AND SOCIAL ASPECTS OF CYBER SECURITY . - 2. Exploring the Economics of the MaliciouscSoftware Market / Thomas J. Holt 17. - 3. The Emergence of the Civilian Cyber Warrior / Max Kilger 53. - PART II: LAW AND CYBERCRIME. - 4. Changing the Game: Social and Justice Models for Enhanced Cyber Security / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling 85. - 5. An Institutional and Developmental Analysis of the Data Breach Disclosure Laws / Melissa Dark 107. - 6. Cyber Security and Identity: Solutions for Critical Infrastructure that Protect Civil Liberties and Enhance Security / Joshua Gruenspecht 139. - 7. Exploring the Utility of Open Source Data to Predict Malicious Software Creation / George W. Burruss, Thomas J. Holt, and Adam M. Bossler 183. - PART III: CYBER INFRASTRUCTURE. - 8. ISP Grade Threat Monitoring / Abhrajit Ghosh 221. - 9. The Challenges Associated with Assessing Cyber Issues / Stuart H. Starr 235
Vol. 2: - 2013. - VIII,267 S. - ISBN 1-58487-571-2
vol I. - Chapter 1. Introduction / Tarek Saadawi and Louis Jordan 1. - PART I: STRATEGY AND POLICY ASPECTS . - Chapter 2. Developing a Theory of Cyberpower / Stuart H. Starr 15. - Chapter 3. Survivability of the Internet / Michael J. Chumer 29. - Chapter 4. Are Large Scale Data Breaches Inevitable? / Douglas E. Salane 51. - Chapter 5. The Role of Cyberpower in Humanitarian Assistance/Disaster Relief (HA/DR) and Stability and Reconstruction Operations / Larry Wentz 81. - PART II: SOCIAL AND LEGAL ASPECTS. - Chapter 6. The Information Polity: Social and Legal Frameworks for Critical Cyber Infrastructure Protection / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling 129. - Chapter 7. The Attack Dynamics of Political and Religiously Motivated Hackers / Thomas J. Holt 159. - PART III: TECHNICAL ASPECTS. - Chapter 8. Resilience of Data Centers / Yehia H. Khalil and Adel S. Elmaghraby 183. - Chapter 9. Developing High Fidelity Sensors for Intrusion Activity on Enterprise Networks / Edward Wagner and Anup K. Ghosh 207. - Chapter 10. Voice over IP: Risks, Threats, and Vulnerabilities / Angelos D. Keromytis 223. - Chapter 11. Toward Foolproof IP Network Configuration Assessments / Rajesh Talpade 263. - Chapter 12. On the New Breed of Denial of Service (DoS) Attacks in the Internet / Nirwan Ansari and Amey Shevtekar 279. - Vol. II. - 1. Introduction / Tarek Saadawi, Louis H. Jordan, Jr., and Vincent Boudreau 1. - PART I: ECONOMICS AND SOCIAL ASPECTS OF CYBER SECURITY . - 2. Exploring the Economics of the MaliciouscSoftware Market / Thomas J. Holt 17. - 3. The Emergence of the Civilian Cyber Warrior / Max Kilger 53. - PART II: LAW AND CYBERCRIME. - 4. Changing the Game: Social and Justice Models for Enhanced Cyber Security / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling 85. - 5. An Institutional and Developmental Analysis of the Data Breach Disclosure Laws / Melissa Dark 107. - 6. Cyber Security and Identity: Solutions for Critical Infrastructure that Protect Civil Liberties and Enhance Security / Joshua Gruenspecht 139. - 7. Exploring the Utility of Open Source Data to Predict Malicious Software Creation / George W. Burruss, Thomas J. Holt, and Adam M. Bossler 183. - PART III: CYBER INFRASTRUCTURE. - 8. ISP Grade Threat Monitoring / Abhrajit Ghosh 221. - 9. The Challenges Associated with Assessing Cyber Issues / Stuart H. Starr 235
Book
2
3
Subjects:
“...gnd Information warfare...”
Article
4
by:
Siboni, Gabi
Published: Tel Aviv : Institute for National Security Studies, 2016
Subjects:
“...gnd Information warfare...”Published: Tel Aviv : Institute for National Security Studies, 2016
Volltext
eBook
5
by:
Gaycken, Sandro, 1973-
Published: München : Goldmann, 2013
Subjects:
“...gnd Information warfare...”Published: München : Goldmann, 2013
Book
6
by:
Matsuzaki, Miyuki
Published: Tokyo : Institute for International Policy Studies, 2016
Subjects:
“...gnd Information warfare...”Published: Tokyo : Institute for International Policy Studies, 2016
Volltext
eBook
7
by:
Hruza, Petr
Published: Winter Garden/Fla : International Institute of Informatics and Systemics, 2014
Subjects:
“...gnd Information warfare...”Published: Winter Garden/Fla : International Institute of Informatics and Systemics, 2014
Volltext
eBook
8
9
by:
Malyarenko, Tatyana
Published: [Washington, DC] : PONARS Eurasia, 2022
Subjects:
“...gnd Information warfare...”Published: [Washington, DC] : PONARS Eurasia, 2022
kostenfrei
eBook
10
Subjects:
“...gnd Information warfare...”
Article
11
Subjects:
“...gnd Information warfare...”
Article
12
13
Cyber: buzzword or game changer? : How the digital space affects national and international security
Subjects:
“...gnd Information warfare...”
Article
14
15
by:
Kestner, Peter
Published: Wiesbaden ; [Heidelberg] : Springer, 2023
Subjects:
“...gnd Information warfare...”Published: Wiesbaden ; [Heidelberg] : Springer, 2023
Inhaltstext
Unbekannt
lizenzpflichtig
Book
16
Published: Santa Monica, CA : RAND, 2012
Subjects:
“...misc Information warfare...”lizenzpflichtig
eBook
17
by:
Bendiek, Annegret, 1970-
Published: Berlin : SWP, 2023
Subjects:
“...gnd Information warfare...”Published: Berlin : SWP, 2023
kostenfrei
kostenfrei
kostenfrei
kostenfrei
kostenfrei
kostenfrei
eBook
18
by:
Bendiek, Annegret, 1970-
Published: Berlin : SWP, 2023
Subjects:
“...gnd Information warfare...”Published: Berlin : SWP, 2023
kostenfrei
kostenfrei
kostenfrei
kostenfrei
kostenfrei
kostenfrei
eBook