In this Book

  • Advances in Cyber Security: Technology, Operations, and Experiences
  • Book
  • Edited by D. Frank Hsu, and Dorothy Marinucci
  • 2013
  • Published by: Fordham University Press
summary

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat.

The world’s foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to
FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation.

The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security—including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks.

Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public–private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber
ecosystem.

Table of Contents

restricted access Download Full Book
  1. Title Page, Copyright
  2. pp. i-iv
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-vi
  3. restricted access
    • Download PDF Download
  1. Figures
  2. pp. vii-viii
  3. restricted access
    • Download PDF Download
  1. Preface
  2. pp. ix-xiv
  3. restricted access
    • Download PDF Download
  1. Building a Secure and Sustainable Cyberspace Ecosystem:An Overview
  2. pp. 1-34
  3. restricted access
    • Download PDF Download
  1. Part I: Technology
  1. Improving Cyber Security
  2. pp. 37-59
  3. restricted access
    • Download PDF Download
  1. Practical Vulnerabilities of the Tor Anonymity Network
  2. pp. 60-73
  3. restricted access
    • Download PDF Download
  1. Defending Software Systems against Cyber Attacksthroughout Their Lifecycle
  2. pp. 74-89
  3. restricted access
    • Download PDF Download
  1. Improve Availability of Networks: Internet Exchange Pointsand Their Role in Cyberspace
  2. pp. 90-106
  3. restricted access
    • Download PDF Download
  1. Part II: Operations
  1. Tor: Uses and Limitations of Online Anonymity
  2. pp. 109-120
  3. restricted access
    • Download PDF Download
  1. Authoritative Data Sources:Cyber Security Intelligence Perspectives
  2. pp. 121-138
  3. restricted access
    • Download PDF Download
  1. The Evolving Consumer Online Threat Landscape:Creating an Effective Response
  2. pp. 139-145
  3. restricted access
    • Download PDF Download
  1. Partners in Cybercrime
  2. pp. 146-170
  3. restricted access
    • Download PDF Download
  1. Part III: Experiences
  1. Securing IT Networks Incorporating Medical Devices:Risk Management and Compliance inHealth Care Cyber Security
  2. pp. 173-187
  3. restricted access
    • Download PDF Download
  1. Computer Forensics from a Law Enforcement Perspective
  2. pp. 188-199
  3. restricted access
    • Download PDF Download
  1. Computer Crime Incidents and Responses in the Private Sector
  2. pp. 200-206
  3. restricted access
    • Download PDF Download
  1. Information Technology for aSafe and Secure Society in Japan:Toward a Cyber- Physical Solution
  2. pp. 207-218
  3. restricted access
    • Download PDF Download
  1. Part IV: Partnership, Policy, and Sustainability
  1. Public- Private Partnerships Changing the World
  2. pp. 221-225
  3. restricted access
    • Download PDF Download
  1. Cyber Security: Protecting Our Cyber Citizens
  2. pp. 226-234
  3. restricted access
    • Download PDF Download
  1. Cyber Security: Safeguarding Our Cyberspace
  2. pp. 235-240
  3. restricted access
    • Download PDF Download
  1. Cyber Security: Securing Our Cyber Ecosystem
  2. pp. 241-244
  3. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. 245-250
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 251-258
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.