Cyber Attacks
27%
off

Cyber Attacks : Protecting National Infrastructure, STUDENT EDITION

4 (1 rating by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 11 business days
When will my order arrive?

Description

Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment.

In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more.

This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc.
show more

Product details

  • Hardback | 336 pages
  • 190.5 x 238.76 x 22.86mm | 879.96g
  • Butterworth-Heinemann Inc
  • Woburn, United States
  • English
  • Student edition
  • Student ed.
  • colour line drawings, figures
  • 0123918553
  • 9780123918550
  • 2,130,175

Table of contents

Chapter One: Introduction

Chapter Two: Deception

Chapter Three: Separation

Chapter Four: Diversity

Chapter Five: Commonality

Chapter Six: Depth

Chapter Seven: Discretion

Chapter Eight: Collection

Chapter Nine: Correlation

Chapter Ten: Awareness

Chapter Eleven: Response

Appendix A: Case Studies

Appendix B: National Requirements
show more

Review Text

"Dr. Amoroso must be commended for his effort in trying to build a national strategy document...The material is worthy of being debated in public policy circles."-- Security Management, June 2013

"The book puts forward a good set of high-level principles for protecting enterprise scale assets against cyber-attack, which provide the necessary formal, rigorous approach for anyone holding ultimate responsibility in this area. The treatment of these topics is conceptual rather than technical with minimal discussion of implementation, although this is understandable enough as there will be considerable variation between different enterprises and systems in practice...[T]his is an excellent introduction or high-level guide for anyone involved in the management of infrastructure security or learning the basic principles of enterprise information security." --BCS.org

" Cyber Attacks Protecting National Infrastructure is a very readable and engaging book on one of the most important topics the US is currently facing. While Amoroso lays out the technical issues, he also notes that the only way to remediate them is via a commitment to infrastructure protection; based on a top-down approach from management. If management is supportive of information security, and understands its significant, the security teams ability to secure the infrastructure will be inordinately easier. For those looking for a reference that provides both the breadth and depth on the topic, Cyber Attacks Protecting National Infrastructure is an invaluable resource written by one of the smartest minds in the industry"-- RSA Conference's Security Reading Room
show more

Review quote

"Dr. Amoroso must be commended for his effort in trying to build a national strategy document...The material is worthy of being debated in public policy circles..."--Security Management, June 2013

"The book puts forward a good set of high-level principles for protecting enterprise scale assets against cyber-attack, which provide the necessary formal, rigorous approach for anyone holding ultimate responsibility in this area. The treatment of these topics is conceptual rather than technical with minimal discussion of implementation, although this is understandable enough as there will be considerable variation between different enterprises and systems in practice...[T]his is an excellent introduction or high-level guide for anyone involved in the management of infrastructure security or learning the basic principles of enterprise information security."--BCS.org

"Cyber Attacks Protecting National Infrastructure is a very readable and engaging book on one of the most important topics the US is currently facing. While Amoroso lays out the technical issues, he also notes that the only way to remediate them is via a commitment to infrastructure protection; based on a top-down approach from management. If management is supportive of information security, and understands its significant, the security teams ability to secure the infrastructure will be inordinately easier. For those looking for a reference that provides both the breadth and depth on the topic, Cyber Attacks Protecting National Infrastructure is an invaluable resource written by one of the smartest minds in the industry"--RSA Conference's Security Reading Room
show more

About Edward Amoroso

Edward Amoroso is currently Senior Vice President and Chief Security Officer of AT&T, where he has worked in cyber security for the past twenty-five years. He has also held the adjunct professor position in the computer science department at the Stevens Institute of Technology for the past twenty years. Edward has written four previous books on computer security, and his writings and commentary have appeared in major national newspapers, television shows, and books. He holds a BS degree in physics from Dickinson College, and the MS/PhD degrees in computer science from Stevens Institute of Technology. He is also a graduate of the Columbia Business School.
show more

Rating details

1 ratings
4 out of 5 stars
5 0% (0)
4 100% (1)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X