Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilising cyber capabilities in combination with all of their military and intelligence capabilities. While the Department of Defense takes great care to secure the use and operation of the hardware of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This book provides recommendations for a workable framework; details about how the Department could prepare to operate in a cyber-contested environment; and the task force describes the specific aspects of the cloud computing configuration that are relevant to avoid the simple choice of public or private clouds.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilising cyber capabilities in combination with all of their military and intelligence capabilities. While the Department of Defense takes great care to secure the use and operation of the hardware of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This book provides recommendations for a workable framework; details about how the Department could prepare to operate in a cyber-contested environment; and the task force describes the specific aspects of the cloud computing configuration that are relevant to avoid the simple choice of public or private clouds.