Critical Information Infrastructure Security
Editat de Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusenen Limba Engleză Paperback – oct 2013
Preț: 290.79 lei
Preț vechi: 363.48 lei
-20% Nou
Puncte Express: 436
Preț estimativ în valută:
51.46€ • 60.34$ • 45.19£
51.46€ • 60.34$ • 45.19£
Carte tipărită la comandă
Livrare economică 04-18 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642414756
ISBN-10: 3642414753
Pagini: 240
Ilustrații: XII, 227 p. 56 illus.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.37 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642414753
Pagini: 240
Ilustrații: XII, 227 p. 56 illus.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.37 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Ten National Cyber Security Strategies: A Comparison.- Analysis of Dependencies in Critical Infrastructures.- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.- An Innovative Approach to Emergency Management in Large Infrastructures.- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation.- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation.- Sub-optimal Topological Protection Strategy from Advanced Malware.- The Insider Threat in Cloud Computing.- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects.- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools.- Petri Net Modelling of Physical Vulnerability.- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant.- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example.- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure.- The Contribution of NEISAS to EP3R.- Policies to Improve Resilience against Major Industrial Accidents.- Fuzzy Input-Output Inoperability Model.- Dependencies Discovery and Analysis in Distributed Systems.- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation.- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis.- Countermeasures Selection via Evidence Theory.- The Robustness of Assortativity.