|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
177817
|
|
|
Summary/Abstract |
This paper is an assessment of cybersecurity principles within the nuclear arsenal of the United States, specifically the nuclear-armed intercontinental ballistic missile forces. Ongoing modernizations will introduce new components, and potentially new vulnerabilities, into U.S. nuclear forces. The principles for achieving secure operations from the fields of computer security, dependable computing, and systems analysis, and the extent to which they are addressed within the management of U.S. nuclear intercontinental ballistic missiles is discussed. This paper then considers the types of vulnerabilities that may be overlooked during modernizations, followed by a critique of U.S. nuclear command and control policy choices that could make the consequences of these vulnerabilities more catastrophic.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
112575
|
|
|
Publication |
New York, CRC Press, 2011.
|
Description |
xv, 325p.Pbk
|
Standard Number |
9781439851234
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
056534 | 005.8/GRA 056534 | Main | On Shelf | General | |
|
|
|
|
3 |
ID:
120288
|
|
|
Publication |
2013.
|
Summary/Abstract |
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
112576
|
|
|
Publication |
Australia, Course Technology, 2012.
|
Description |
xxiv, 500p.Pbk
|
Standard Number |
9781435481695
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
056531 | 005.8/SHO 056531 | Main | On Shelf | General | |
|
|
|
|
5 |
ID:
071369
|
|
|
Publication |
New York, Nova Science Publishers, 2005.
|
Description |
viii, 138p.
|
Standard Number |
1594547289
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
051181 | 005.8/CHO 051181 | Main | On Shelf | General | |
|
|
|
|
6 |
ID:
054494
|
|
|
Publication |
DelhI, Authorpress, 2003.
|
Description |
327p.Hardbound
|
Standard Number |
8172731167
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
046457 | 364.168/VEN 046457 | Main | On Shelf | General | |
|
|
|
|
7 |
ID:
074865
|
|
|
Publication |
Amsterdam, IOS Press, 2006.
|
Description |
xiv, 159p.
|
Series |
NATO Security Through Sciences Series; Vol. 4
|
Standard Number |
1586036122
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
051889 | 355.343/CAR 051889 | Main | On Shelf | General | |
|
|
|
|
8 |
ID:
152952
|
|
|
Publication |
Burlington, Jones and Barlett Learning, 2014.
|
Description |
xxiv, 544p.pbk
|
Series |
Information Systems Security and Assurance Series
|
Standard Number |
9781284031621
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
059062 | 005.8/KIM 059062 | Main | On Shelf | General | |
|
|
|
|
9 |
ID:
046097
|
|
|
Publication |
Boston, Artech House Inc., 2001.
|
Standard Number |
1580531768
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
046754 | 005.8/CAN 046754 | Main | On Shelf | General | |
|
|
|
|
10 |
ID:
059783
|
|
|
11 |
ID:
047032
|
|
|
Publication |
Boca Raton, Auerbach, 2001.
|
Description |
xi, 281p.
|
Standard Number |
0849308801
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
044489 | 005.8/PEL 044489 | Main | On Shelf | General | |
|
|
|
|
12 |
ID:
048989
|
|
|
Publication |
Gaithersburg, National Institute of Standards and Technology, 1995.
|
Description |
xi, 276p.
|
Contents |
National Institute of Standards and Technology Special Publication 800-12
|
Standard Number |
0160484189
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
039733 | 004/GUT 039733 | Main | On Shelf | General | |
|
|
|
|
13 |
ID:
068054
|
|
|
Publication |
Hershey, Idea Group Publishing, 2005.
|
Description |
xiv, 229p.Hbk
|
Standard Number |
1591405831
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
050939 | 658.478/JAN 050939 | Main | On Shelf | General | |
|
|
|
|
14 |
ID:
001787
|
|
|
Publication |
London, macmillan Press, 1997.
|
Description |
xx,210p.
|
Standard Number |
9780333692608
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
039143 | 303.4833/DHI 039143 | Main | On Shelf | General | |
|
|
|
|
15 |
ID:
081922
|
|
|
Publication |
Hampshire, Ashgate Publishing Limited, 2007.
|
Description |
xiv, 165p.
|
Standard Number |
9780754670889
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
053558 | 005.8/CAV 053558 | Main | On Shelf | General | |
|
|
|
|
16 |
ID:
108867
|
|
|
Publication |
2011.
|
Summary/Abstract |
The Internet is not the only critical infrastructure that relies on the participation of unorganized and technically inexpert end users. Transportation, health, waste management, and disaster preparedness are other areas where cooperation between unorganized citizens who lack experience with the domain has increased resiliency, reduced social costs, and helped meet shared goals. Theories of community-based production and management of the commons explain this type of cooperation, both offline and online. This essay examines these two complementary approaches to organizing the cybercitizen for cybersecurity. Cybersecurity discourse has reasonably focused on centralized parties and network operators. From domain name registrars to network service providers, solutions are sought through incentives, regulation, and even law enforcement. However great the ability of these centralized entities to implement change, the end user plays a crucial role. The Internet must remain open to enable innovation and diffusion of innovation; thus, the end user will continue to be important. What is the role of the citizen in cybersecurity? What socio-technical characteristics might enable a system that encourages and empowers users to create a secure infrastructure?
|
|
|
|
|
|
|
|
|
|
17 |
ID:
053644
|
|
|
Edition |
2nd ed.
|
Publication |
Upper Saddle River, Prentice Hall, 1997.
|
Description |
xii, 574p.
|
Standard Number |
0133374866
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
045685 | 005.8/PFL 045685 | Main | On Shelf | General | |
|
|
|
|
|
|
|
|
|