A Cyberworm that Knows No Boundaries
dc.contributor.author | Porche III, Isaac R. | |
dc.contributor.author | Sollinger, Jerry M. | |
dc.contributor.author | McKay, Shawn | |
dc.date.accessioned | 2023-10-05T10:21:25Z | |
dc.date.available | 2023-10-05T10:21:25Z | |
dc.date.issued | 2011 | |
dc.identifier | ONIX_20231005_9780833059802_749 | |
dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/114975 | |
dc.description.abstract | It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions. | |
dc.language | English | |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security::URJ Computer viruses, Trojans and worms | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UR Computer security | en_US |
dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world: consumer and user guides | en_US |
dc.subject.other | Technology | |
dc.title | A Cyberworm that Knows No Boundaries | |
dc.type | book | |
oapen.identifier.doi | 10.7249/OP342OSD | |
oapen.relation.isPublishedBy | 47ac0b54-b121-491c-a9c8-5ca6776e27cb | |
oapen.relation.isbn | 9780833059802 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |