Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
Is Full-Text AvailableIs Full-Text Available
-
YearFrom:-To:
-
More FiltersMore FiltersSubjectCountry Of PublicationPublisherSourceLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
71
result(s) for
"Cyberinfrastructure -- Security measures"
Sort by:
Fixing American cybersecurity : creating a strategic public-private partnership
by
Clinton, Larry, 1951- editor, author
,
Todt, Kiersten, writer of foreword
in
Computer security Government policy United States.
,
Computer security United States.
,
Data protection.
2023
\"Incentivizing Cybersecurity goes beyond books that simply describe cybersecurity technology or law to provide a coherent and comprehensive explanation of why we are making so little progress in addressing the threat, and it lays out a specific path to address the threat in a new, more effective fashion. The book calls for a new market-based \"social contract\" between the public and private sectors. Since virtually every aspect of modern life is dependent on these cyber systems, cybersecurity is everybody's issue. It should be required reading for both industry and government leaders, as well as cybersecurity practitioners. The book is a collaborative effort of the Board of Directors of the Internet Security Alliance. Each author is a recognized expert in cybersecurity typically with substantial frontline responsibility for addressing the most sophisticated cyber attackers. Taken together, these authors bring elite-level cybersecurity expertise into one coherent volume\"-- Provided by publisher.
The Internet in Everything
by
DeNardis, Laura
in
Communication Studies
,
Computer security
,
Cyberinfrastructure -- Security measures
2020
A compelling argument that the Internet of things threatens human rights and security and that suggests policy prescriptions to protect our future The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things-connecting everything from cars to cardiac monitors to home appliances-there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. Laura DeNardis argues that this diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and she offers new cyber-policy solutions. In her discussion, she makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future.
Systems and Network Infrastructure Integration
IT infrastructures are now essential in all areas and sectors of human activity; they are the cornerstone of any information system.Thus, it is clear that the greatest of care must be given to their design, implementation, security and supervision in order to ensure optimum functionality and better performance.
A Cyberworm that Knows No Boundaries
by
McKay, Shawn
,
Porche III, Isaac R
,
Sollinger, Jerry M
in
Computer networks
,
Computer security
,
Computer viruses, Trojans and worms
2011
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Professionalizing the Nation's Cybersecurity Workforce?
by
Council, National Research
,
Sciences, Division on Engineering and Physical
,
Board, Computer Science and Telecommunications
in
Armed Forces
,
Computer industry
,
Computer networks
2013
\"Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making\" considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment tools, certification, licensing, and other means for assessing and enhancing professionalization; and emerging approaches, such as performance-based measures. It also examines requirements for the federal (military and civilian) workforce, the private sector, and state and local government. The report focuses on three essential elements: (1) understanding the context for cybersecurity workforce development, (2) considering the relative advantages, disadvantages, and approaches to professionalizing the nation's cybersecurity workforce, and (3) setting forth criteria that can be used to identify which, if any, specialty areas may require professionalization and set forth criteria for evaluating different approaches and tools for professionalization. \"Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making\" characterizes the current landscape for cybersecurity workforce development and sets forth criteria that the federal agencies participating in the National Initiative for Cybersecurity Education--as well as organizations that employ cybersecurity workers--could use to identify which specialty areas may require professionalization and to evaluate different approaches and tools for professionalization. The following are appended: (1) Biographies of Committee Members; (2) Workshop Agendas; and (3) Speakers and Participants at Workshops Organized by the Committee. [This report was written by: Committee on Professionalizing the Nation's Cybersecurity Workforce: Criteria for Future Decision-Making; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council.]
Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland
by
Cordesman
in
Computer networks
,
Computer networks -- Security measures -- United States
,
Electronic data processing
2001,2002
During the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy response. After examining the dangers posed by information warfare and efforts at threat assessment, Cordesman considers the growing policy response on the part of various federal agencies, state and local governments, and the private sector. The changing nature of the threats is leading these actors to reassess the role they must play in critical infrastructure protection. Government at all levels, industry, and even friendly and neutral foreign governments are learning that an effective response requires coordination in deterrence, defense, and counterattack.
Practical Network Scanning
2018,2024
Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the.
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
by
National Research Council (U.S.). Computer Science and Telecommunications Board
,
Dam, Kenneth W.
,
National Research Council (U.S.). Committee on Offensive Information Warfare
in
Computer networks
,
Computer networks -- Security measures -- Government policy -- United States
,
Computer networks -- Security measures -- United States
2009
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.
Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.
Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Hands-On Spring Security 5 for Reactive Applications
by
John, Tomcy
in
Application software-Development
,
Computer security
,
COMPUTERS / Programming / General
2018,2024
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
Toward Effective Cyber Defense in Accordance with the Rules of Law
by
Hadji-Janev, Metodi
,
Brill, Alan
in
Business enterprises-Computer networks-Security measures-Law and legislation
,
Cyberinfrastructure-Law and legislation
2020
Information and communication technologies now play a big part in the daily personal and professional lives of us all.Cyberspace - the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education - is part of all our lives.