Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Jeffrey Bardin"'
Autor:
Jeffrey Bardin
Publikováno v:
Current and Emerging Trends in Cyber Operations ISBN: 9781349557837
The Middle East cyber domain is as explosive as the current physical environment. Rife with constant change, new threat actors, virtual safe havens, and the expansion of extremist views are creeping into once protected virtual domains. The advent of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9170c294dc437a716c051e142221bcec
https://doi.org/10.1057/9781137455550.0012
https://doi.org/10.1057/9781137455550.0012
Autor:
Claudio Agostino Ardagna, Jeffrey Bardin, Sanjay Bavisi, Stefan Berthold, Gerald Beuchelt, Rahul Bhaskar, Chiara Braghin, Albert Caballero, Erdal Cayirci, Thomas M. Chen, Hongbing Cheng, Lauren Collins, Marco Cremonini, Samuel J.J. Curry, Christopher Day, Sabrina De Capitani Di Vimercati, Scott R. Ellis, Michael Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W. Fulp, Anna Granova, Yong Guan, Cem Gurkok, Feng Hao, James T. Harmening, Markus Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan Kapoor, Sokratis K. Katsikas, Dalia Khader, Larry Korba, Kameswari Kotapati, Thomas F. LaPorta, Jean Lancrenon, Peng Liu, Tewfiq El Maliki, John Mallery, Bill Mansoor, Luther Martin, John McDonald, John McGowan, Peter F. Nicoletti, Kevin Noble, Pramod Pandya, Harsh Kupwade Patil, Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo Piuri, Henrik Plate, Daniel Ramsbrock, Chunming Rong, Robert Rounsavall, Peter Y.A. Ryan, Mario Santana, Steve Schneider, Jean-Marc Seigneur, Marco Slaviero, Daniel S. Soper, Terence Spies, William Stallings, Alex Tsow, Jesse Walker, Patrick J. Walsh, Xinyuan Wang, Michael West, Dan Wing, Zhe Xia, George O.M. Yee, Liang Yan, Gansen Zhao
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d36b3ab8addb188b277194c169dd5da4
https://doi.org/10.1016/b978-0-12-394397-2.00078-7
https://doi.org/10.1016/b978-0-12-394397-2.00078-7
Autor:
Jeffrey Bardin
This chapter discusses satellite cyber attacks with regard to hacking, interference, and jamming. For the past several years, we have been notified that sunspot activity could disrupt Earth’s communications. In fact, there have been numerous cell p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d89d7ab5fb82991ace33720d27b53472
https://doi.org/10.1016/b978-0-12-803843-7.00089-2
https://doi.org/10.1016/b978-0-12-803843-7.00089-2
One thing to consider is that the most probable avenue of attack in a SAN is through the hosts connected to the SAN. There are potentially thousands of host, application, and operating system-specific security considerations that are beyond the scope
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::007ab344040b170e6872cb4ce8acbd70
https://doi.org/10.1016/b978-0-12-394397-2.00051-9
https://doi.org/10.1016/b978-0-12-394397-2.00051-9
Publisher Summary Security is a complex and constantly evolving practice in the IT industry. Companies must recognize that threats to information infrastructures require vigilance on the part of IT managers and the vendors they rely on. As with any I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a352afa6f6b410b1155a61fc59e9929d
https://doi.org/10.1016/b978-0-12-374354-1.00033-9
https://doi.org/10.1016/b978-0-12-374354-1.00033-9