|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Ted G. LewisPublisher: John Wiley and Sons Ltd Imprint: Wiley-Blackwell (an imprint of John Wiley & Sons Ltd) Dimensions: Width: 16.70cm , Height: 2.70cm , Length: 24.40cm Weight: 0.859kg ISBN: 9780471786283ISBN 10: 0471786284 Pages: 486 Publication Date: 23 May 2006 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Out of Print Availability: Awaiting stock ![]() Table of ContentsPreface. About the Author. 1. Strategy. 2. Origins. 3. Challenges. 4. Networks. 5. Vulnerability Analysis. 6. Risk Analysis. 7. Water. 8. SCADA. 9. Power. 10. Energy. 11. Telecommunications. 12. Internet. 13. Cyber-Threats. 14. Cyber-Security.Reviews"""...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs."" (Computing Reviews.com, March 22, 2007) ""The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment."" (Homeland Security Watch, August 17, 2006)" ...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs. (Computing Reviews.com, March 22, 2007) The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment. (Homeland Security Watch, August 17, 2006) Author InformationTED G. LEWIS, PHD, is Professor of Computer Science and Academic Associate of the Homeland Defense and Security curriculum at the Naval Postgraduate School. Dr. Lewis is the former senior vice president of Digital Development for Eastman Kodak. Tab Content 6Author Website:Countries AvailableAll regions |