Protecting Critical Infrastructures Against Cyber-Attack Protecting Critical Infrastructures Against Cyber-Attack
Adelphi series

Protecting Critical Infrastructures Against Cyber-Attack

    • 24,99 €
    • 24,99 €

Description de l’éditeur

The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

GENRE
Informatique et Internet
SORTIE
2020
28 octobre
LANGUE
EN
Anglais
LONGUEUR
100
Pages
ÉDITIONS
Taylor and Francis
TAILLE
2,8
Mo

Plus de livres similaires

Addressing Cyber Instability Addressing Cyber Instability
2013
Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack (EMP), Countermeasures, Warfighter Cyber Security, Network Centric Warfare Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack (EMP), Countermeasures, Warfighter Cyber Security, Network Centric Warfare
2016
Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV) Unmanned Tactical Autonomous Control and Collaboration (UTACC) Threat and Vulnerability Assessment - Impersonation or Spoofing an Unmanned Ground Vehicle (UGV) or Unmanned Aerial Vehicle (UAV)
2016
Cyber Security Planning Guide, Small Business Information Security Fundamentals: Privacy and Data Security, Scams and Fraud, Network Security, Website Security, Email, Mobile Devices, Employees Cyber Security Planning Guide, Small Business Information Security Fundamentals: Privacy and Data Security, Scams and Fraud, Network Security, Website Security, Email, Mobile Devices, Employees
2014
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
2009
Homeland Security, Second Edition: A Complete Guide Homeland Security, Second Edition: A Complete Guide
2012

Autres livres de cette série

Iran-Saudi Arabia Relations and Regional Order Iran-Saudi Arabia Relations and Regional Order
2014
Protracted Refugee Situations Protracted Refugee Situations
2013
The Islamist Impasse The Islamist Impasse
2021
Asia’s New Geopolitics Asia’s New Geopolitics
2021
The Responsibility to Defend The Responsibility to Defend
2021
The Digital Silk Road The Digital Silk Road
2022