Modelling cyber security : approaches, methodology, strategies /
Modelling cyber security : approaches, methodology, strategies /
Modeling cyber security
edited by Umberto Gori.
- Amsterdam ; Washington, D.C. : Ios Press, ©2009.
- 1 online resource (xxiii, 215 pages) : illustrations
- NATO science for peace and security series. E: Human and societal dynamics ; v. 59 .
- NATO science for peace and security series. E, Human and societal dynamics ; v. 59. .
Includes bibliographical references and indexes.
Title page; Introduction; Contents; Approaching Security; Understanding Terrorism and Its Interaction with Critical Infrastructures; European Measures and Legal Aspects; Curricula Vitae of the Authors; List of Participants. NATO ARW -- Operational Network Intelligence: Today and Tomorrow; Subject Index; Author Index.
Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.
English.
9781607505174 1607505177 1282600966 9781282600966 6612600969 9786612600968
978-1-60750-517-4 IOS Press http://www.iospress.nl
Computer security--Congresses.
Cryptography--Congresses.
Data encryption (Computer science)--Congresses.
Sécurité informatique--Congrès.
Cryptographie--Congrès.
Chiffrement (Informatique)--Congrès.
COMPUTERS--Reference.
COMPUTERS--Machine Theory.
COMPUTERS--Computer Literacy.
COMPUTERS--Information Technology.
COMPUTERS--Data Processing.
COMPUTERS--Computer Science.
COMPUTERS--Hardware--General.
Computer security
Cryptography
Data encryption (Computer science)
Conference papers and proceedings
QA76.9.D314 / M64 2009
004
Includes bibliographical references and indexes.
Title page; Introduction; Contents; Approaching Security; Understanding Terrorism and Its Interaction with Critical Infrastructures; European Measures and Legal Aspects; Curricula Vitae of the Authors; List of Participants. NATO ARW -- Operational Network Intelligence: Today and Tomorrow; Subject Index; Author Index.
Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security.
English.
9781607505174 1607505177 1282600966 9781282600966 6612600969 9786612600968
978-1-60750-517-4 IOS Press http://www.iospress.nl
Computer security--Congresses.
Cryptography--Congresses.
Data encryption (Computer science)--Congresses.
Sécurité informatique--Congrès.
Cryptographie--Congrès.
Chiffrement (Informatique)--Congrès.
COMPUTERS--Reference.
COMPUTERS--Machine Theory.
COMPUTERS--Computer Literacy.
COMPUTERS--Information Technology.
COMPUTERS--Data Processing.
COMPUTERS--Computer Science.
COMPUTERS--Hardware--General.
Computer security
Cryptography
Data encryption (Computer science)
Conference papers and proceedings
QA76.9.D314 / M64 2009
004