Query Result Set
Skip Navigation Links
   ActiveUsers:1632Hits:18302710Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
COMPUTER SECURITY (17) answer(s).
 
SrlItem
1
ID:   177817


Assessing priorities towards achieving dependable and secure computing in the U.S. ICBM Force / Borja, Lauren J   Journal Article
Borja, Lauren J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper is an assessment of cybersecurity principles within the nuclear arsenal of the United States, specifically the nuclear-armed intercontinental ballistic missile forces. Ongoing modernizations will introduce new components, and potentially new vulnerabilities, into U.S. nuclear forces. The principles for achieving secure operations from the fields of computer security, dependable computing, and systems analysis, and the extent to which they are addressed within the management of U.S. nuclear intercontinental ballistic missiles is discussed. This paper then considers the types of vulnerabilities that may be overlooked during modernizations, followed by a critique of U.S. nuclear command and control policy choices that could make the consequences of these vulnerabilities more catastrophic.
        Export Export
2
ID:   112575


Cyber Security Essentials / Graham, James (ed); Howard, Richard (ed); Olson, Ryan (ed) 2011  Book
Graham, James (ed) Book
0 Rating(s) & 0 Review(s)
Publication New York, CRC Press, 2011.
Description xv, 325p.Pbk
Standard Number 9781439851234
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056534005.8/GRA 056534MainOn ShelfGeneral 
3
ID:   120288


Cyber war is inevitable (Unless We Build Security In) / McGraw, Gary   Journal Article
McGraw, Gary Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.
        Export Export
4
ID:   112576


Cybersecurity: essential body of knowledge / Shoemaker, Dan; Conklin, Arthur Wm. 2012  Book
Shoemaker, Dan Book
0 Rating(s) & 0 Review(s)
Publication Australia, Course Technology, 2012.
Description xxiv, 500p.Pbk
Standard Number 9781435481695
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056531005.8/SHO 056531MainOn ShelfGeneral 
5
ID:   071369


Cybersecurity and homeland security / Choi, Lin V (ed.) 2005  Book
Choi, Lin V Book
0 Rating(s) & 0 Review(s)
Publication New York, Nova Science Publishers, 2005.
Description viii, 138p.
Standard Number 1594547289
Key Words Cyber Security  Computer Security 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
051181005.8/CHO 051181MainOn ShelfGeneral 
6
ID:   054494


Cyber-terrorism / Venkatesh, S 2003  Book
Venkatesh, S Book
0 Rating(s) & 0 Review(s)
Publication DelhI, Authorpress, 2003.
Description 327p.Hardbound
Standard Number 8172731167
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046457364.168/VEN 046457MainOn ShelfGeneral 
7
ID:   074865


Cyberwar netwar: security in the information age / Carvalho, Fernando Duarte (ed); De Silva, Eduardo Mateus (ed) 2006  Book
Carvalho, Fernando Duarte Book
0 Rating(s) & 0 Review(s)
Publication Amsterdam, IOS Press, 2006.
Description xiv, 159p.
Series NATO Security Through Sciences Series; Vol. 4
Standard Number 1586036122
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
051889355.343/CAR 051889MainOn ShelfGeneral 
8
ID:   152952


Fundamentals of information systems security / Kim, David; Solomon, Michael G 2014  Book
Kim, David Book
0 Rating(s) & 0 Review(s)
Publication Burlington, Jones and Barlett Learning, 2014.
Description xxiv, 544p.pbk
Series Information Systems Security and Assurance Series
Standard Number 9781284031621
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059062005.8/KIM 059062MainOn ShelfGeneral 
9
ID:   046097


Fundamentals of network security / Canavan, John E 2001  Book
Canavan, John E Book
0 Rating(s) & 0 Review(s)
Publication Boston, Artech House Inc., 2001.
Standard Number 1580531768
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046754005.8/CAN 046754MainOn ShelfGeneral 
10
ID:   059783


Holistic View of the Revolution in Military Affairs (RMA) / Joshi, Akshay Feb 1999  Journal Article
Joshi, Akshay Journal Article
0 Rating(s) & 0 Review(s)
Publication Feb 1999.
        Export Export
11
ID:   047032


Information security risk analysis / Peltier, Thomas R 2001  Book
Peltier, Thomas R. Book
0 Rating(s) & 0 Review(s)
Publication Boca Raton, Auerbach, 2001.
Description xi, 281p.
Standard Number 0849308801
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
044489005.8/PEL 044489MainOn ShelfGeneral 
12
ID:   048989


Introduction to computer security: the NIST handbook: the NIST handbook / Guttman, Barbara; Roback, Edward A 1995  Book
Guttman, Barbara Book
0 Rating(s) & 0 Review(s)
Publication Gaithersburg, National Institute of Standards and Technology, 1995.
Description xi, 276p.
Contents National Institute of Standards and Technology Special Publication 800-12
Standard Number 0160484189
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
039733004/GUT 039733MainOn ShelfGeneral 
13
ID:   068054


Managerial guide for handling cyber-terrorism and information warfare / Janczewski, Lech J; Colarik, Andrew M 2005  Book
Janczewski, Lech J Book
0 Rating(s) & 0 Review(s)
Publication Hershey, Idea Group Publishing, 2005.
Description xiv, 229p.Hbk
Standard Number 1591405831
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
050939658.478/JAN 050939MainOn ShelfGeneral 
14
ID:   001787


Managing information system security / Dhillon, Gurpreet 1997  Book
Dhillon, Gurpreet Book
0 Rating(s) & 0 Review(s)
Publication London, macmillan Press, 1997.
Description xx,210p.
Standard Number 9780333692608
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
039143303.4833/DHI 039143MainOn ShelfGeneral 
15
ID:   081922


Power and security in the information age: investigating the role of the state in cyberspcae / Cavelty, Myriam Dunn (ed); Mauer, Victor (ed); Krishna-Hensel, Sai Felicia (ed) 2007  Book
Cavelty, Myriam Dunn Book
0 Rating(s) & 0 Review(s)
Publication Hampshire, Ashgate Publishing Limited, 2007.
Description xiv, 165p.
Standard Number 9780754670889
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
053558005.8/CAV 053558MainOn ShelfGeneral 
16
ID:   108867


Reconceptualizing the role of security user / Camp, J Jean   Journal Article
Camp, J Jean Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract The Internet is not the only critical infrastructure that relies on the participation of unorganized and technically inexpert end users. Transportation, health, waste management, and disaster preparedness are other areas where cooperation between unorganized citizens who lack experience with the domain has increased resiliency, reduced social costs, and helped meet shared goals. Theories of community-based production and management of the commons explain this type of cooperation, both offline and online. This essay examines these two complementary approaches to organizing the cybercitizen for cybersecurity. Cybersecurity discourse has reasonably focused on centralized parties and network operators. From domain name registrars to network service providers, solutions are sought through incentives, regulation, and even law enforcement. However great the ability of these centralized entities to implement change, the end user plays a crucial role. The Internet must remain open to enable innovation and diffusion of innovation; thus, the end user will continue to be important. What is the role of the citizen in cybersecurity? What socio-technical characteristics might enable a system that encourages and empowers users to create a secure infrastructure?
Key Words Security  Cyberspace  Computer Security  Social Capital 
        Export Export
17
ID:   053644


Security in Computing / Pfleeger, Charles P. 1997  Book
Pfleeger, Charles P. Book
0 Rating(s) & 0 Review(s)
Edition 2nd ed.
Publication Upper Saddle River, Prentice Hall, 1997.
Description xii, 574p.
Standard Number 0133374866
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
045685005.8/PFL 045685MainOn ShelfGeneral