{
"item_title" : "Technology Assessment",
"item_author" : [" Government Accountability Office "],
"item_description" : "Many cybersecurity technologies that can be used to protect critical infrastructures from cyber attack are currently available, while other technologies are still being researched and developed. These technologies, including access control technologies, system integrity technologies, cryptography, audit and monitoring tools, and configuration management and assurance technologies, can help to protect information that is being processed, stored, and transmitted in the networked computer systems that are prevalent in critical infrastructures.",
"item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/49/275/093/149275093X_b.jpg",
"price_data" : {
"retail_price" : "20.25", "online_price" : "20.25", "our_price" : "20.25", "club_price" : "20.25", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Technology Assessment : Cybersecurity for Critical Infrastructure Protection
Overview
Many cybersecurity technologies that can be used to protect critical infrastructures from cyber attack are currently available, while other technologies are still being researched and developed. These technologies, including access control technologies, system integrity technologies, cryptography, audit and monitoring tools, and configuration management and assurance technologies, can help to protect information that is being processed, stored, and transmitted in the networked computer systems that are prevalent in critical infrastructures.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9781492750932
- ISBN-10: 149275093X
- Publisher: Createspace Independent Publishing Platform
- Publish Date: September 2013
- Dimensions: 11.02 x 8.5 x 0.47 inches
- Shipping Weight: 1.17 pounds
- Page Count: 224
Related Categories
