Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Cyber Resiliency, Security & Cloud Computing Suitability in Military Information Technology
Hardback

Cyber Resiliency, Security & Cloud Computing Suitability in Military Information Technology

$923.99
Sign in or become a Readings Member to add this title to your wishlist.

The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilising cyber capabilities in combination with all of their military and intelligence capabilities. While the Department of Defense takes great care to secure the use and operation of the hardware of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This book provides recommendations for a workable framework; details about how the Department could prepare to operate in a cyber-contested environment; and the task force describes the specific aspects of the cloud computing configuration that are relevant to avoid the simple choice of public or private clouds.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Hardback
Publisher
Nova Science Publishers Inc
Country
United States
Date
1 March 2014
Pages
206
ISBN
9781629488684

The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilising cyber capabilities in combination with all of their military and intelligence capabilities. While the Department of Defense takes great care to secure the use and operation of the hardware of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This book provides recommendations for a workable framework; details about how the Department could prepare to operate in a cyber-contested environment; and the task force describes the specific aspects of the cloud computing configuration that are relevant to avoid the simple choice of public or private clouds.

Read More
Format
Hardback
Publisher
Nova Science Publishers Inc
Country
United States
Date
1 March 2014
Pages
206
ISBN
9781629488684