LEADER 04224nam 2200769 450 001 9910452497903321 005 20200520144314.0 010 $a0-8232-4457-1 010 $a0-8232-4458-X 010 $a0-8232-6894-2 010 $a0-8232-5032-6 010 $a0-8232-4459-8 035 $a(CKB)2550000001123604 035 $a(EBL)3239802 035 $a(SSID)ssj0000834836 035 $a(PQKBManifestationID)11460204 035 $a(PQKBTitleCode)TC0000834836 035 $a(PQKBWorkID)10989403 035 $a(PQKB)10378289 035 $a(StDuBDS)EDZ0001193190 035 $a(OCoLC)840820211 035 $a(MdBmJHUP)muse19467 035 $a(MiAaPQ)EBC3239802 035 $a(MiAaPQ)EBC4803841 035 $a(MiAaPQ)EBC1274307 035 $a(MiAaPQ)EBC1481013 035 $a(Au-PeEL)EBL4803841 035 $a(CaPaEBR)ebr11343645 035 $a(OCoLC)861559250 035 $a(Au-PeEL)EBL1481013 035 $a(EXLCZ)992550000001123604 100 $a20170227h20132013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAdvances in cyber security $etechnology, operations, and experiences /$fedited by D. Frank Hsu and Dorothy Marinucci 205 $aFirst edition. 210 1$aNew York, [New York] :$cFordham University Press,$d2013. 210 4$dİ2013 215 $a1 online resource (272 p.) 300 $aIncludes index. 311 $a0-8232-4456-3 311 $a1-299-94070-6 320 $aIncludes bibliographical references and index. 327 $a""Cover""; ""Contents""; ""List of Figures""; ""Preface""; ""Building a Secure and Sustainable Cyberspace Ecosystem: An Overview""; ""Part I: Technology""; ""Improving Cyber Security""; ""Practical Vulnerabilities of the Tor Anonymity Network""; ""Defending Software Systems against Cyber Attacks throughout Their Lifecycle""; ""Improve Availability of Networks: Internet Exchange Points and Their Role in Cyberspace""; ""Part II: Operations""; ""Tor: Uses and Limitations of Online Anonymity""; ""Authoritative Data Sources: Cyber Security Intelligence Perspectives"" 327 $a""The Evolving Consumer Online Threat Landscape: Creating an Effective Response""""Partners in Cybercrime""; ""Part III: Experiences""; ""Securing IT Networks Incorporating Medical Devices: Risk Management and Compliance in Health Care Cyber Security""; ""Computer Forensics from a Law Enforcement Perspective""; ""Computer Crime Incidents and Responses in the Private Sector""; ""Information Technology for a Safe and Secure Society in Japan: Toward a Cyber-Physical Solution""; ""Part IV: Partnership, Policy, and Sustainability""; ""Public-Private Partnerships Changing the World"" 327 $a""Cyber Security: Protecting Our Cyber Citizens""""Cyber Security: Safeguarding Our Cyberspace""; ""Cyber Security: Securing Our Cyber Ecosystem""; ""List of Contributors""; ""Index""; ""A""; ""B""; ""C""; ""D""; ""E""; ""F""; ""G""; ""H""; ""I""; ""J""; ""K""; ""L""; ""M""; ""N""; ""O""; ""P""; ""R""; ""S""; ""T""; ""U""; ""V""; ""W""; ""Z"" 330 8 $aThe proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. This book collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. 606 $aInternet$xSecurity measures 606 $aCyberspace$xSecurity measures 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aInternet$xSecurity measures. 615 0$aCyberspace$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 702 $aHsu$b D. Frank$g(Derbiau Frank),$f1948- 702 $aMarinucci$b Dorothy 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452497903321 996 $aAdvances in Cyber Security$92083331 997 $aUNINA