default search action
Best Practices in Computer Network Defense 2014
- Melissa E. Hathaway:
Best Practices in Computer Network Defense: Incident Detection and Response. NATO Science for Peace and Security Series - D: Information and Communication Security 35, IOS Press 2014, ISBN 978-1-61499-371-1 - Melissa E. Hathaway:
Introduction. 1-2 - Melissa E. Hathaway:
Advanced Research Workshop Findings. 3-18 - Andrea Rigoni, Gustav Lindstrom:
Computer Network Defense: New Threats and Trends. 19-29 - John N. Stewart:
Advanced Technologies/Tactics Techniques, Procedures: Closing the Attack Window, and Thresholds for Reporting and Containment. 30-42 - Dave McMahon:
Beyond Perimeter Defense: Defense-in-Depth Leveraging Upstream Security. 43-53 - Felix "FX" Lindner, Sandro Gaycken:
Back to Basics: Beyond Network Hygiene. 54-64 - Matthew W. Holt:
Aligning National Cyber Security Strategies to International Guidance: A First Step Toward Improving Incident Response Capabilities Across NATO. 65-80 - Olaf Kruidhof:
Evolution of National and Corporate CERTs - Trust, the Key Factor. 81-96 - Steve Purser:
Standards for Cyber Security. 97-106 - William Pelgrin:
A Model For Positive Change: Influencing Positive Change in Cyber Security Strategy, Human Factor, and Leadership. 107-117 - Elly van den Heuvel, Gerben Klein Baltink:
Coordination and Cooperation in Cyber Network Defense: the Dutch Efforts to Prevent and Respond. 118-129 - Melissa E. Hathaway, John N. Stewart:
Conclusions. 130-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.