000 04771nam a22005053i 4500
001 EBC501456
003 MiAaPQ
005 20181121154015.0
006 m o d |
007 cr cnu||||||||
008 181113s2009 xx o ||||0 eng d
020 _a9781607505174
_q(electronic bk.)
020 _z9781607500742
035 _a(MiAaPQ)EBC501456
035 _a(Au-PeEL)EBL501456
035 _a(CaPaEBR)ebr10375700
035 _a(CaONFJC)MIL260096
035 _a(OCoLC)591162494
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aQA76.9.D314 -- M64 2009eb
082 0 _a004
100 1 _aGori, U.
245 1 0 _aModelling Cyber Security :
_bApproaches, Methodology, Strategies.
264 1 _aAmsterdam :
_bIOS Press,
_c2009.
264 4 _c©2009.
300 _a1 online resource (240 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aNATO Science for Peace and Security Series E: Human and Societal Dynamics, v. 59 ;
_vv.v. 59
505 0 _aTitle page -- Introduction -- Contents -- Approaching Security -- Conceptual Approaches to Security -- Thoughts on the Open Information Society: Does the Concept of ``Privacy of an Organisation'' Exist? -- Striking the Balance: Security vs. Utility -- Secure Software Engineering: Developing the New Generation of Secure Systems by Introducing a Security Focus Throughout the Development Lifecycle -- Current Methods Applied to Security -- A Fuzzy Approach to Security Codes: Cryptography Between Technological Evolution and Human Perception -- Cryptography and Security: Evolutionary Information Theory and Prime Numbers Genetics -- A Note on Public-Key Cryptosystems and Their Underlying Mathematical Problems -- Intrusion in a Mission Critical Network: A Tutorial on Intrusion Detection Systems and Intrusion Prevention Systems -- A World-Wide Financial Infrastructure to Confront Cyber Terrorism -- A Pragmatic and Foolproof Approach for Connecting Critical/Industrial Networks to External Less Secure Networks -- A Cyber Security Approach for Smart Meters at ERDF -- Understanding Terrorism and Its Interaction with Critical Infrastructures -- Facing Terrorist Attacks and Attacks to Critical Infrastructures -- Al-Qaeda: Its Global Marketing Strategy -- A New Paradigm for Countering Jihadism -- Modelling Deterrence in Cyberia -- The Cutting Edge of Cyber Network Development - A Paradigm to Translate and Predict the Network Strategies of Avant-Garde Cyber Criminals -- Protecting Critical Infrastructures from Cyber Attacks Involving Malware -- Police and Military Force Operations and Approaches -- Protecting Critical Information Infrastructures: Domestic Experience and Competencies of the Postal and Communication Service of the Italian National Police -- Fighting Terrorism in Cyberspace -- Cyberspace Control: How to Avert a Cyber World War.
505 8 _aEuropean Measures and Legal Aspects -- The Role of Europe in Matching Today's Asymmetric Threats -- Information Sharing in the Context of European Union Critical Information Infrastructure Protection -- Defining Critical Information Infrastructure in the Context of Cyber Threats: The Privacy Perspective -- Crimen Ex Machina: A Legal Approach -- Curricula Vitae of the Authors -- List of Participants. NATO ARW - Operational Network Intelligence: Today and Tomorrow -- Subject Index -- Author Index.
520 _aCyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0 _aComputer security -- Congresses.
650 0 _aCryptography -- Congresses.
650 0 _aData encryption (Computer science) -- Congresses.
655 4 _aElectronic books.
700 1 _aNATO Advanced Research Workshop on Operational Network Intelligence Today and Tomorrow,.
700 1 _aIOS Press,.
776 0 8 _iPrint version:
_aGori, U.
_tModelling Cyber Security : Approaches, Methodology, Strategies
_dAmsterdam : IOS Press,c2009
_z9781607500742
797 2 _aProQuest (Firm)
830 0 _aNATO Science for Peace and Security Series E: Human and Societal Dynamics, v. 59
856 4 0 _uhttps://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=501456
_zClick to View
999 _c72873
_d72873