Critical infrastructure security : (Record no. 78)

MARC details
000 -LEADER
fixed length control field 04779cam a22003617a 4500
001 - CONTROL NUMBER
control field 16584999
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230808174312.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101220s2012 enka b 000 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010943114
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB109635
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015734667
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781845645625 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781845645632
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1845645626 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781845645632 (ebk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn781385330
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Language of cataloging eng
Transcribing agency BUL
Modifying agency BUL
-- BUL
-- BUL
-- BUL
-- BUL
-- BUL
-- BUL
-- BUL
-- BUL
-- BUL
-- BUL
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C748 2012
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.8
Edition number 22
Item number CRI
245 00 - TITLE STATEMENT
Title Critical infrastructure security :
Remainder of title assessment, prevention, detection, response /
Statement of responsibility, etc. edited by Francesco Flammini.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Southampton ;
-- Boston :
Name of publisher, distributor, etc. WIT Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent 303 p. :
Other physical details ill. ;
Dimensions 25 cm.
490 0# - SERIES STATEMENT
Series statement Information & communication technologies
500 ## - GENERAL NOTE
General note Contents<br/>PART I: Fundamentals of security risk and Vulnerability Assessment<br/>1: Model-based risk analysis for critical infrastructures<br/> 1. Introduction<br/> 2. The critical infrastructure problem<br/> 3. Tools<br/> 4. Multi-criterion tools (CARVER and MSRAM)<br/> 5. CI/KR as a network<br/>Etc.<br/><br/>2: Physical vulnerability assessment<br/> 1. Introduction<br/> 2. Common techniques for finding vulnerabilities<br/> 3. VA best practices<br/> 4. Vulnerability myths and mistakes<br/><br/>PART II: Modelling and simulation Tools for critical infrastructures<br/> 3: Modelling and simulation of critical infrastructures<br/> 1.Introduction<br/> 2.Interdependency modelling<br/> 3.Holistic Approaches<br/> 4.Critical infrastructures as complex systems<br/> 5.Simulative approaches<br/>Etc.<br/><br/>4:Graphical formalism for modelling critical infrastructures<br/> 1.Introduction<br/> 2.Requirements for CI modelling and simulation<br/> 3.Graphical formalisation for CI modelling and simulation<br/> 4.Practical Experiences in modelling CIs: meeting the requirements with SAN<br/> 5.Conclusions<br/><br/>5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project<br/> 1.Introduction<br/> 2.Related works and initiatives<br/> 3.DIESIS project<br/> 4.Conclusion<br/>Etc.<br/><br/>6: Game theory in infrastructure security<br/> 1.Introduction<br/> 2.Game-theoretic models<br/> 3.Limitations of game-theoretic models<br/> 4.Conclusion<br/>Etc.<br/><br/>PART III: Cybersecurity in Information and SCADA Systems<br/>7: Modelling, measuring and managing information technology risks <br/> 1.Introduction<br/> 2.What is risk with respect to information systems?<br/> 3.Why is it important to manage risk?<br/> 4.Managing risk at organizational level<br/> 5.How is risk assessed?<br/>Etc.<br/><br/>8: trustworthiness evaluation of critical information infrastructures<br/> 1.Introduction<br/> 2.Dependability and security evaluation approaches<br/> 3.On the evaluation of Financial Infrastructure protection (FIP)<br/> 4.On the evaluation of CIIP<br/> 5.Conclusion<br/>Etc.<br/><br/>9: Network resilience<br/> 1.Introduction<br/> 2.A component-based framework for improving network resilience in CIs<br/> 3.Intrusion detection and reaction in satellite networks<br/> 4.Detection and remediation of a distributed attack over an IP-based network<br/> 5.Diagnosis-driven reconfiguration of WSNs<br/>Etc.<br/><br/>10: Wireless sensor networks for critical infrastructure protection<br/> 1.Introduction<br/> 2.Security threat analysis<br/> 3.Survey of the state of the art<br/> 4.Conclusions and identification of further research topics<br/><br/>PART IV: Monitoring and Surveillance Technologies<br/>11: Intelligent video surveillance<br/> 1.Introduction<br/> 2.Architecture of an IVS system<br/> 3.Examples of applications<br/>Etc.<br/><br/>12: Audio Surveillance<br/> 1.Introduction<br/> 2.Sound recognition for audio surveillance<br/> 3.A representative picture of the related literature<br/>Etc.<br/><br/>13: Terahertz for weapon and explosive detection<br/> 1.Introduction<br/> 2.Terahertz technology<br/> 3.Terahertz for weapon detection<br/>Etc.<br/><br/>14:Structural health monitoring<br/>1. introduction<br/>2. structural evaluation<br/>3. sensor selection, etc <br/><br/>15: Networks of simple sensors foe detecting emplacement of improvised explosive devices<br/>1. clues to IED emplacement<br/>2. sensor management <br/>3. experiments, etc<br/><br/>Part V Security systems integration and Alarm Management<br/><br/>16 : Security systems, Design and Integration<br/><br/>17. multisource information fusion for critical infrastructure situation awareness<br/><br/>18 Simulation-Based learning in the physical security industry<br/><br/>19. Frameworks and tools for imergence response and crisis management<br/><br/><br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Management.
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Flammini, Francesco.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 006.8
Item part 1
Call number prefix CRI
Call number suffix 006.8 CRI
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 01/20/2021 PURCHASED 0015906   006.8 CRI BUML23080401 01/20/2021 1 01/20/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 01/20/2021   0015907   006.8 CRI BUML23080402 01/20/2021 2 01/20/2021 Book Open Access