请选择 进入手机版 | 继续访问电脑版

科研迷论坛

 找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
查看: 82|回复: 1

Cyber Security and Global Information Assurance Threat Analysis and Response Solutions (Advances in Information Security and Privacy)-[1]-[2009]-[pdf]-[Kenneth J. Knapp]

[复制链接]

该用户从未签到

0

主题

0

小红花

127

学币

管理员

Rank: 9

积分
0
发表于 2020-1-12 03:41:10 | 显示全部楼层 |阅读模式
★★★闹不够看这里★★★1、每个同学都有一个独一无二的推广链接,请点击这里来获取
2、把你的推广链接告诉你的同学、同事、朋友,让他们注册,或者分享到你的微博,微信朋友圈、博客或者其他的论坛,让更多人的通过你的链接进来注册,那么你会获得非常可观的学币
3、每一个用户,通过你的链接来到论坛进行注册后,你都会获得10个学币!即便用户没有注册,他只要点击了你给的链接,浏览了科研迷论坛,你也能获得1个学币
4、通过分享资料,资料上传分享成功会获得5~10个学币!其他用户下载还会获得额外的学币哦!


免费下载30页预览文件

书籍信息:
书名: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (Advances in Information Security and Privacy)
语言: English
格式: pdf
大小: 7.0M
页数: 459
年份: 2009
作者: Kenneth J. Knapp
版次: 1
系列: Advances in Information Security and Privacy
出版社: Information Science Reference

简介

The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.


目录
Title
......Page 2
Table of Contents......Page 7
Detailed Table of Contents......Page 10
Foreword......Page 17
Preface......Page 19
Acknowledgment......Page 23
Dynamic Modeling of the
Cyber Security Threat Problem:
The Black Market for Vulnerabilities......Page 26
An Attack Graph Based
Approach for Threat
Identification of an
Enterprise Network......Page 48
Insider Threat Prevention,
Detection and Mitigation......Page 73
An Autocorrelation
Methodology for the
Assessment of Security
Assurance......Page 100
Security Implications for
Management from the Onset of
Information Terrorism......Page 122
The Adoption of
Information Security
Management Standards:
A Literature Review......Page 144
Data Smog, Techno Creep and
the Hobbling of the Cognitive
Dimension......Page 166
Balancing the Public Policy
Drivers in the Tension between
Privacy and Security......Page 189
Human Factors in Security:
The Role of Information Security
Professionals within Organizations......Page 209
Diagnosing Misfits, Inducing
Requirements, and Delineating
Transformations within
Computer Network Operations
Organizations......Page 226
An Approach to Managing
Identity Fraud......Page 258
A Repeatable Collaboration
Process for Incident Response
Planning......Page 275
Pandemic Influenza, Worker
Absenteeism and Impacts on
Critical Infrastructures:
Freight Transportation as an Illustration......Page 290
Information Sharing:
A Study of Information Attributes and their
Relative Significance During
Catastrophic Events......Page 308
An Overview of the Community
Cyber Security Maturity Model......Page 331
Server Hardening Model
Development:
A Methodology-Based Approach to
Increased System Security......Page 344
Trusted Computing:
Evolution and Direction......Page 368
Introduction, Classification and
Implementation of Honeypots......Page 396
Compilation of References......Page 408
About the Contributors......Page 445
Index......Page 455

电子书下载地址(Ebook download address)回复可见:
游客,如果您要查看本帖隐藏内容请回复

回复

使用道具 举报

  • TA的每日心情

    前天 08:09
  • 签到天数: 61 天

    [LV.6]常住居民II

    5

    主题

    0

    小红花

    9065

    学币

    VIP学者

    Rank: 9

    积分
    1217
    发表于 2020-8-27 17:18:26 | 显示全部楼层
    每天进步一点点
    回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    本版积分规则

    关闭

    站长推荐上一条 /1 下一条

    Archiver|手机版|小黑屋|科研迷论坛 ( 闽ICP备17033831号-3 ) hello xym!!

    GMT+8, 2020-10-1 14:36 , Processed in 0.025345 second(s), 10 queries , Redis On.

    Powered by Discuz! X3.4

    Copyright © 2001-2020, Tencent Cloud.

    快速回复 返回顶部 返回列表