Hacking the Homeland: Investigating Cybersecurity Vulnerabilities at the Department of Homeland Security
The Internet has brought our friends close and our enemies closer. As each day passes, another incident reminds us that our information and our IT infrastructures are vulnerable.
Cases in point: Estonia, a technically savvy country, was brought to its knees by hackers who took down government Web sites.
The Pentagon recently asserted that China is developing viruses to attack computer systems to obtain electromagnetic dominance early in a conflict.
The incident formerly classified as Titan Rain suggested that the Chinese have been coordinating attacks against the Department of Defense networks for years.
This subcommittee has been holding a series of hearings on cybersecurity, and it has become very clear the infiltration of Federal Government networks and the possible theft or exploitation of our information is one of the most critical issues confronting our Nation today.
1111650536
Cases in point: Estonia, a technically savvy country, was brought to its knees by hackers who took down government Web sites.
The Pentagon recently asserted that China is developing viruses to attack computer systems to obtain electromagnetic dominance early in a conflict.
The incident formerly classified as Titan Rain suggested that the Chinese have been coordinating attacks against the Department of Defense networks for years.
This subcommittee has been holding a series of hearings on cybersecurity, and it has become very clear the infiltration of Federal Government networks and the possible theft or exploitation of our information is one of the most critical issues confronting our Nation today.
Hacking the Homeland: Investigating Cybersecurity Vulnerabilities at the Department of Homeland Security
The Internet has brought our friends close and our enemies closer. As each day passes, another incident reminds us that our information and our IT infrastructures are vulnerable.
Cases in point: Estonia, a technically savvy country, was brought to its knees by hackers who took down government Web sites.
The Pentagon recently asserted that China is developing viruses to attack computer systems to obtain electromagnetic dominance early in a conflict.
The incident formerly classified as Titan Rain suggested that the Chinese have been coordinating attacks against the Department of Defense networks for years.
This subcommittee has been holding a series of hearings on cybersecurity, and it has become very clear the infiltration of Federal Government networks and the possible theft or exploitation of our information is one of the most critical issues confronting our Nation today.
Cases in point: Estonia, a technically savvy country, was brought to its knees by hackers who took down government Web sites.
The Pentagon recently asserted that China is developing viruses to attack computer systems to obtain electromagnetic dominance early in a conflict.
The incident formerly classified as Titan Rain suggested that the Chinese have been coordinating attacks against the Department of Defense networks for years.
This subcommittee has been holding a series of hearings on cybersecurity, and it has become very clear the infiltration of Federal Government networks and the possible theft or exploitation of our information is one of the most critical issues confronting our Nation today.
9.99
In Stock
5
1
Hacking the Homeland: Investigating Cybersecurity Vulnerabilities at the Department of Homeland Security
Hacking the Homeland: Investigating Cybersecurity Vulnerabilities at the Department of Homeland Security
9.99
In Stock
Product Details
BN ID: | 2940013852129 |
---|---|
Publisher: | U.S. House of Representatives |
Publication date: | 12/18/2011 |
Sold by: | Barnes & Noble |
Format: | eBook |
File size: | 357 KB |
From the B&N Reads Blog