Shop

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

eBook (PDF), 370 Pages
This item has not been rated yet
Price: Free
Cyber Security: Beyond the Maginot Line. Recently the FBI reported that computer crime has skyrocketed costing over $67B in 2005 and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific agency mission. Broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can... More > architect a secure cyberspace.< Less
Available in PDF Format

Ratings & Reviews

Log in to review this item
There are no reviews for the current version of this product
Refreshing...
There are no reviews for previous versions of this product
Refreshing...

Product Details

Edition
First
Publisher
Frederick Sheldon
Published
May 26, 2006
Language
English
Pages
370
File Format
PDF
File Size
30.8 MB

Formats for this Ebook

PDF
Required Software Any PDF Reader, Apple Preview
Supported Devices Windows PC/PocketPC, Mac OS, Linux OS, Apple iPhone/iPod Touch... (See More)
# of Devices Unlimited
Flowing Text / Pages Pages
Printable? Yes
Report This Content to Lulu >

Moderation of Questionable Content

Thank you for your interest in helping us moderate questionable content on Lulu. If you need assistance with an order or the publishing process, please contact our support team directly.

How does this content violate the Lulu Membership Agreement?

Keywords

Listed In

More From Frederick Sheldon et al.