Research and Markets: Cyber Attacks: Technical, Architectural, and Management Approach
Research and Markets (http://www.researchandmarkets.com/research/jgp4wz/cyber_attacks) has announced the addition of Elsevier Science and Technology's new book "Cyber Attacks" to their offering.
This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment.
The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.
- Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges
- Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues
- Includes instructor slides for each chapter as well as an instructor's manual with sample syllabi and test bank
Key Topics Covered:
Chapter One: Introduction
Chapter Two: Deception
Chapter Three: Separation
Chapter Four: Diversity
Chapter Five: Commonality
Chapter Six: Depth
Chapter Seven: Discretion
Chapter Eight: Collection
Chapter Nine: Correlation
Chapter Ten: Awareness
Chapter Eleven: Response
For more information visit http://www.researchandmarkets.com/research/jgp4wz/cyber_attacks
Source: Elsevier Science and Technology