In today's heavily networked environment, you must guard against both obvious and subtle intrusions that can delete or corrupt vital data. Ideally, your security measures will allow critical system operation even when you're under attack.

[1]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[2]  John P. McDermott,et al.  Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[3]  Bev Littlewood,et al.  Predictably Dependable Computing Systems , 2012, ESPRIT Basic Research Series.

[4]  Anish Arora,et al.  Designing masking fault-tolerance via nonmasking fault-tolerance , 1995, Proceedings. 14th Symposium on Reliable Distributed Systems.

[5]  John P. McDermott,et al.  Storage Jamming , 1995, DBSec.

[6]  Peter G. Neumann,et al.  Computer-related risks , 1994 .

[7]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[8]  Hermann Kopetz,et al.  Fault tolerance, principles and practice , 1990 .

[9]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.