References
Abend, V., et al. (2008). Cybersecurity for the banking and finance sector. In Wiley Handbook of Science and Technology for Homeland Security, ed. J. G. Voeller. Hoboken, NJ: John Wiley & Sons, Inc.
Acohido, B. and J. Swartz (2008). Zero Day Threat. New York: Sterling Publishing Co., Inc.
Adair, S., R. Deibert, et al. (2010). Shadows in the cloud: Investigating Cyber Espionage 2.0. A joint report of the Information Warfare Monitor and Shadowserver Foundation.
Alexander, K. (2011). Congressional testimony. House Armed Services Committee. Washington, DC.
Alperovitch, D. (2011). Revealed: Operation shady RAT, McAfee.
Amoroso, E. (1999). Intrusion Detection. Sparta, NJ: Intrusion.Net Books.
Amoroso, E. (2006). Cyber Security. Summit, NJ: Silicon Press.
Amoroso, E. (2010). Cyber Attacks. Burlington, MA: Butterworth-Heinemann.
ANSI and ISA (2010). The financial management of cyber risk. An Implementation Framework for CFOs, American National Standards Institute (ANSI) and the Internet Security Alliance (ISA).
Assante, M. (2009). Critical cyber asset identification letter. Chief Information Security Officer, North American Electric Reliability Corporation (NERC).
ASTM (2009). ASTM Standard F2761 Integrated Clinical Environment, or ICE. From http://www.astm.org, ASTM International, West Conshohocken, PA.
Baker, W., A. Hutton, et al. (2011). Data breach investigations report. From http://www.verizonbusiness.com/go/2011dbir, Verizon Business.
Barrera, D. and P. Van Oorschot (2011). ...
Get Cyber Security Policy Guidebook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.