Normale Ansicht MARC ISBD

Threat level red : cybersecurity research programs of the US government / Michael Erbschloe

Von: Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Verlag: Boca Raton : Taylor & Francis, CRC Press, 2017Beschreibung: 1 Online-RessourceSchlagwörter: Andere physische Formen: 1138052809. | 9781138052802. | 1351683322. | 9781351683326. | 1315167557. | 9781315167558. | Erscheint auch als: Kein Titel Druck-Ausgabe | Print version: Kein Titel LOC-Klassifikation:
  • TK5105.59
Online-Ressourcen: Zusammenfassung: "There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity."--Provided by publisherZusammenfassung: 1.8 The Growing Necessity for Diverse and Specialized Research1.9 Summary; 1.10 Seminar Discussion Topics; Key Terms; References; 2. The Department of Homeland Security Cybersecurity Research Programs; 2.1 DHS CSD Research; 2.2 Anonymous Networks and Currencies; 2.3 Cyber-Physical Systems Security; 2.4 Data Privacy Technologies; 2.5 Distributed Denial of Service Defense; 2.6 Talent Development Research; 2.7 Cybersecurity Metrics; 2.8 Experimental Research Testbed, Experiments, and Pilots; 2.9 Internet Measurement, Attack Modeling, and Cyber ForensicsZusammenfassung: 3.8 The National Information Assurance Partnership3.9 Summary; 3.10 Seminar Discussion Topics; Key Terms; References; 4. The Defense Advanced Research Projects Agency; 4.1 The DARPA Organization; 4.2 The Cyber Grand Challenge; 4.3 Active Authentication; 4.4 Active Cyber Defense; 4.5 Automated Program Analysis for Cybersecurity; 4.6 Clean-Slate Design of Resilient, Adaptive, Secure Hosts; 4.7 Cyber Fault-Tolerant Attack Recovery; 4.8 Edge-Directed Cyber Technologies for Reliable Mission Communication; 4.9 Enhanced Attribution; 4.10 Extreme DDoS DefenseZusammenfassung: 4.11 High-Assurance Cyber Military Systems4.12 Integrated Cyber Analysis System; 4.13 Mission-Oriented Resilient Clouds; 4.14 Rapid Attack Detection, Isolation, and Characterization Systems; 4.15 Space/Time Analysis for Cybersecurity; 4.16 Transparent Computing; 4.17 Vetting Commodity IT Software and Firmware (VET); 4.18 DARPA's Request for Information: CSO R 4.19 Summary; 4.20 Seminar Discussion Topics; Key Terms; References; 5. Intelligence Advanced Research Projects Activity and In-Q-Tel; 5.1 The IARPA Organization; 5.2 IARPA Cyber-Attack Automated Unconventional Sensor EnvironmentZusammenfassung: Cover; Half Title; Title Page; Copyright Page; Contents; Foreword; Acknowledgments; About the Author; Introduction; 1. The U.S. Federal Government Initiatives on Cybersecurity Research; 1.1 Evolving toward Coordinated Cybersecurity Research; 1.2 The Comprehensive National Cybersecurity Initiative; 1.3 The Federal Information Security Modernization Act of 2014; 1.4 The Cybersecurity Act of 2015 and Automated Indicator Sharing; 1.5 The Cybersecurity National Action Plan; 1.6 The Strategic Plan for the Federal Cybersecurity Research and Development Program; 1.7 2016 Federal Cybersecurity RDSPZusammenfassung: "There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity."--Provided by publisherPPN: PPN: 898048737Package identifier: Produktsigel: ZDB-4-NLEBK
Dieser Titel hat keine Exemplare

Powered by Koha