MARC details
000 -LEADER |
fixed length control field |
04779cam a22003617a 4500 |
001 - CONTROL NUMBER |
control field |
16584999 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230808174312.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
101220s2012 enka b 000 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010943114 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBB109635 |
Source |
bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
Record control number |
015734667 |
Source |
Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781845645625 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781845645632 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1845645626 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781845645632 (ebk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn781385330 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Language of cataloging |
eng |
Transcribing agency |
BUL |
Modifying agency |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
-- |
BUL |
Description conventions |
rda |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
C748 2012 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.8 |
Edition number |
22 |
Item number |
CRI |
245 00 - TITLE STATEMENT |
Title |
Critical infrastructure security : |
Remainder of title |
assessment, prevention, detection, response / |
Statement of responsibility, etc. |
edited by Francesco Flammini. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Southampton ; |
-- |
Boston : |
Name of publisher, distributor, etc. |
WIT Press, |
Date of publication, distribution, etc. |
c2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
303 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
490 0# - SERIES STATEMENT |
Series statement |
Information & communication technologies |
500 ## - GENERAL NOTE |
General note |
Contents<br/>PART I: Fundamentals of security risk and Vulnerability Assessment<br/>1: Model-based risk analysis for critical infrastructures<br/> 1. Introduction<br/> 2. The critical infrastructure problem<br/> 3. Tools<br/> 4. Multi-criterion tools (CARVER and MSRAM)<br/> 5. CI/KR as a network<br/>Etc.<br/><br/>2: Physical vulnerability assessment<br/> 1. Introduction<br/> 2. Common techniques for finding vulnerabilities<br/> 3. VA best practices<br/> 4. Vulnerability myths and mistakes<br/><br/>PART II: Modelling and simulation Tools for critical infrastructures<br/> 3: Modelling and simulation of critical infrastructures<br/> 1.Introduction<br/> 2.Interdependency modelling<br/> 3.Holistic Approaches<br/> 4.Critical infrastructures as complex systems<br/> 5.Simulative approaches<br/>Etc.<br/><br/>4:Graphical formalism for modelling critical infrastructures<br/> 1.Introduction<br/> 2.Requirements for CI modelling and simulation<br/> 3.Graphical formalisation for CI modelling and simulation<br/> 4.Practical Experiences in modelling CIs: meeting the requirements with SAN<br/> 5.Conclusions<br/><br/>5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project<br/> 1.Introduction<br/> 2.Related works and initiatives<br/> 3.DIESIS project<br/> 4.Conclusion<br/>Etc.<br/><br/>6: Game theory in infrastructure security<br/> 1.Introduction<br/> 2.Game-theoretic models<br/> 3.Limitations of game-theoretic models<br/> 4.Conclusion<br/>Etc.<br/><br/>PART III: Cybersecurity in Information and SCADA Systems<br/>7: Modelling, measuring and managing information technology risks <br/> 1.Introduction<br/> 2.What is risk with respect to information systems?<br/> 3.Why is it important to manage risk?<br/> 4.Managing risk at organizational level<br/> 5.How is risk assessed?<br/>Etc.<br/><br/>8: trustworthiness evaluation of critical information infrastructures<br/> 1.Introduction<br/> 2.Dependability and security evaluation approaches<br/> 3.On the evaluation of Financial Infrastructure protection (FIP)<br/> 4.On the evaluation of CIIP<br/> 5.Conclusion<br/>Etc.<br/><br/>9: Network resilience<br/> 1.Introduction<br/> 2.A component-based framework for improving network resilience in CIs<br/> 3.Intrusion detection and reaction in satellite networks<br/> 4.Detection and remediation of a distributed attack over an IP-based network<br/> 5.Diagnosis-driven reconfiguration of WSNs<br/>Etc.<br/><br/>10: Wireless sensor networks for critical infrastructure protection<br/> 1.Introduction<br/> 2.Security threat analysis<br/> 3.Survey of the state of the art<br/> 4.Conclusions and identification of further research topics<br/><br/>PART IV: Monitoring and Surveillance Technologies<br/>11: Intelligent video surveillance<br/> 1.Introduction<br/> 2.Architecture of an IVS system<br/> 3.Examples of applications<br/>Etc.<br/><br/>12: Audio Surveillance<br/> 1.Introduction<br/> 2.Sound recognition for audio surveillance<br/> 3.A representative picture of the related literature<br/>Etc.<br/><br/>13: Terahertz for weapon and explosive detection<br/> 1.Introduction<br/> 2.Terahertz technology<br/> 3.Terahertz for weapon detection<br/>Etc.<br/><br/>14:Structural health monitoring<br/>1. introduction<br/>2. structural evaluation<br/>3. sensor selection, etc <br/><br/>15: Networks of simple sensors foe detecting emplacement of improvised explosive devices<br/>1. clues to IED emplacement<br/>2. sensor management <br/>3. experiments, etc<br/><br/>Part V Security systems integration and Alarm Management<br/><br/>16 : Security systems, Design and Integration<br/><br/>17. multisource information fusion for critical infrastructure situation awareness<br/><br/>18 Simulation-Based learning in the physical security industry<br/><br/>19. Frameworks and tools for imergence response and crisis management<br/><br/><br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
General subdivision |
Management. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
General subdivision |
Management. |
Source of heading or term |
fast |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Flammini, Francesco. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Closed Access |
Classification part |
006.8 |
Item part |
1 |
Call number prefix |
CRI |
Call number suffix |
006.8 CRI |