Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
5,467
result(s) for
"Computer security United States."
Sort by:
Defensive security handbook : best practices for securing infrastructure
by
Brotherston, Lee, author
,
Berlin, Amanda, author
in
Computer networks Security measures United States.
,
Computer security United States Planning.
,
Computer security United States Management.
2017
\"Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system adminstrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.\" --Back cover.
Critical Infrastructure Protection in Homeland Security
2014
\"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs.\" (Computing Reviews.com, March 22, 2007) \"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment.\" (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.
Cyber-security and threat politics : US efforts to secure the information age
by
Dunn Cavelty, Myriam
in
Computer networks
,
Computer networks -- Security measures -- United States
,
Computer security
2008,2007
This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.
Cybersecurity and cyberwar : what everyone needs to know
by
Singer, Peter W.
,
Friedman, Allan
in
Computer networks
,
Computer networks -- Security measures -- United States
,
Computer security
2014
In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do?.
Fixing American cybersecurity : creating a strategic public-private partnership
by
Clinton, Larry, 1951- editor, author
,
Todt, Kiersten, writer of foreword
in
Computer security Government policy United States.
,
Computer security United States.
,
Data protection.
2023
\"Incentivizing Cybersecurity goes beyond books that simply describe cybersecurity technology or law to provide a coherent and comprehensive explanation of why we are making so little progress in addressing the threat, and it lays out a specific path to address the threat in a new, more effective fashion. The book calls for a new market-based \"social contract\" between the public and private sectors. Since virtually every aspect of modern life is dependent on these cyber systems, cybersecurity is everybody's issue. It should be required reading for both industry and government leaders, as well as cybersecurity practitioners. The book is a collaborative effort of the Board of Directors of the Internet Security Alliance. Each author is a recognized expert in cybersecurity typically with substantial frontline responsibility for addressing the most sophisticated cyber attackers. Taken together, these authors bring elite-level cybersecurity expertise into one coherent volume\"-- Provided by publisher.
A Cyberworm that Knows No Boundaries
by
McKay, Shawn
,
Porche III, Isaac R
,
Sollinger, Jerry M
in
Computer networks
,
Computer security
,
Computer viruses, Trojans and worms
2011
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Information Technology for Counterterrorism
by
National Research Council (U.S.) Committee on the Role of Information Technology in Responding to Terrorism
,
Patterson, David A.
,
Lin, Herbert
in
Computer networks
,
Computer networks -- Security measures -- United States
,
Computer security
2003,2004
Information technology (IT) is essential to virtually all of the nation's critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nation's communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.