LCCN2012-039718
ReviewsCaptures the thought of cyber security leaders from government, industry, and academia, who have practical and hands-on experience in various aspect of cyberspace ecosystems. Thought and experience cover the life cycle of security mechanisms including the design, development, management, and most importantly sustainment of these mechanisms. Well done, practical, and resourceful. -----Simon Y. Liu, Editor-in-Chief of IT Professional Magazine, "Captures the thought of cyber security leaders from government, industry, and academia who have practical and hands-on experience in various aspects of cyberspace ecosystems." Simon Y. Liu, Editor-in-Chief of IT Professional magazine, "Addresses a rapidly changing field to an audience looking for a snapshot of the current state of cyber security regulations, international legal framework, and cyber security technologies." --Marek Rusinkiewicz, Telcordia Technologies, "Addresses a rapidly changing field to an audience looking for a snapshot of the current state of cyber security regulations, international legal framework, and cyber security technologies."-Marek Rusinkiewicz, Telcordia Technologies "Captures the thought of cyber security leaders from government, industry, and academia, who have practical and hands-on experience in various aspect of cyberspace ecosystems. Thought and experience cover the life cycle of security mechanisms including the design, development, management, and most importantly sustainment of these mechanisms. Well done, practical, and resourceful."-Simon Y. Liu, Editor-in-Chief of IT Professional Magazine, Captures the thought of cyber security leaders from government, industry, and academia, who have practical and hands-on experience in various aspect of cyberspace ecosystems. Thought and experience cover the life cycle of security mechanisms including the design, development, management, and most importantly sustainment of these mechanisms. Well done, practical, and resourceful., "Addresses a rapidly changing field to an audience looking for a snapshot of the current state of cyber security regulations, international legal framework, and cyber security technologies." -----Marek Rusinkiewicz, Telcordia Technologies
Dewey Decimal005.8
SynopsisAdvances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives of structure, function, and application. It also provides ways and means to secure and sustain this ecosystem by the collective wisdom of professionals and practitioners from government, academia, and industry across national and international boundaries., As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security--including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.