000 | 04779cam a22003617a 4500 | ||
---|---|---|---|
001 | 16584999 | ||
003 | OSt | ||
005 | 20230808174312.0 | ||
008 | 101220s2012 enka b 000 0 eng d | ||
010 | _a 2010943114 | ||
015 |
_aGBB109635 _2bnb |
||
016 | 7 |
_a015734667 _2Uk |
|
020 | _a9781845645625 (hbk.) | ||
020 | _a9781845645632 | ||
020 | _a1845645626 (hbk.) | ||
020 | _z9781845645632 (ebk.) | ||
035 | _a(OCoLC)ocn781385330 | ||
040 |
_aBUL _beng _cBUL _dBUL _dBUL _dBUL _dBUL _dBUL _dBUL _dBUL _dBUL _dBUL _dBUL _dBUL _erda |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bC748 2012 |
082 | 0 | 4 |
_a006.8 _222 _bCRI |
245 | 0 | 0 |
_aCritical infrastructure security : _bassessment, prevention, detection, response / _cedited by Francesco Flammini. |
260 |
_aSouthampton ; _aBoston : _bWIT Press, _cc2012. |
||
300 |
_a303 p. : _bill. ; _c25 cm. |
||
490 | 0 | _aInformation & communication technologies | |
500 | _aContents PART I: Fundamentals of security risk and Vulnerability Assessment 1: Model-based risk analysis for critical infrastructures 1. Introduction 2. The critical infrastructure problem 3. Tools 4. Multi-criterion tools (CARVER and MSRAM) 5. CI/KR as a network Etc. 2: Physical vulnerability assessment 1. Introduction 2. Common techniques for finding vulnerabilities 3. VA best practices 4. Vulnerability myths and mistakes PART II: Modelling and simulation Tools for critical infrastructures 3: Modelling and simulation of critical infrastructures 1.Introduction 2.Interdependency modelling 3.Holistic Approaches 4.Critical infrastructures as complex systems 5.Simulative approaches Etc. 4:Graphical formalism for modelling critical infrastructures 1.Introduction 2.Requirements for CI modelling and simulation 3.Graphical formalisation for CI modelling and simulation 4.Practical Experiences in modelling CIs: meeting the requirements with SAN 5.Conclusions 5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project 1.Introduction 2.Related works and initiatives 3.DIESIS project 4.Conclusion Etc. 6: Game theory in infrastructure security 1.Introduction 2.Game-theoretic models 3.Limitations of game-theoretic models 4.Conclusion Etc. PART III: Cybersecurity in Information and SCADA Systems 7: Modelling, measuring and managing information technology risks 1.Introduction 2.What is risk with respect to information systems? 3.Why is it important to manage risk? 4.Managing risk at organizational level 5.How is risk assessed? Etc. 8: trustworthiness evaluation of critical information infrastructures 1.Introduction 2.Dependability and security evaluation approaches 3.On the evaluation of Financial Infrastructure protection (FIP) 4.On the evaluation of CIIP 5.Conclusion Etc. 9: Network resilience 1.Introduction 2.A component-based framework for improving network resilience in CIs 3.Intrusion detection and reaction in satellite networks 4.Detection and remediation of a distributed attack over an IP-based network 5.Diagnosis-driven reconfiguration of WSNs Etc. 10: Wireless sensor networks for critical infrastructure protection 1.Introduction 2.Security threat analysis 3.Survey of the state of the art 4.Conclusions and identification of further research topics PART IV: Monitoring and Surveillance Technologies 11: Intelligent video surveillance 1.Introduction 2.Architecture of an IVS system 3.Examples of applications Etc. 12: Audio Surveillance 1.Introduction 2.Sound recognition for audio surveillance 3.A representative picture of the related literature Etc. 13: Terahertz for weapon and explosive detection 1.Introduction 2.Terahertz technology 3.Terahertz for weapon detection Etc. 14:Structural health monitoring 1. introduction 2. structural evaluation 3. sensor selection, etc 15: Networks of simple sensors foe detecting emplacement of improvised explosive devices 1. clues to IED emplacement 2. sensor management 3. experiments, etc Part V Security systems integration and Alarm Management 16 : Security systems, Design and Integration 17. multisource information fusion for critical infrastructure situation awareness 18 Simulation-Based learning in the physical security industry 19. Frameworks and tools for imergence response and crisis management | ||
504 | _aIncludes bibliographical references. | ||
650 | 0 |
_aComputer security _xManagement. |
|
650 | 7 |
_aComputer security _xManagement. _2fast |
|
700 | 1 | _aFlammini, Francesco. | |
942 |
_2ddc _cBOOK-CA _h006.8 _i1 _kCRI _m006.8 CRI |
||
999 |
_c78 _d78 |