000 04779cam a22003617a 4500
001 16584999
003 OSt
005 20230808174312.0
008 101220s2012 enka b 000 0 eng d
010 _a 2010943114
015 _aGBB109635
_2bnb
016 7 _a015734667
_2Uk
020 _a9781845645625 (hbk.)
020 _a9781845645632
020 _a1845645626 (hbk.)
020 _z9781845645632 (ebk.)
035 _a(OCoLC)ocn781385330
040 _aBUL
_beng
_cBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_dBUL
_erda
042 _alccopycat
050 0 0 _aQA76.9.A25
_bC748 2012
082 0 4 _a006.8
_222
_bCRI
245 0 0 _aCritical infrastructure security :
_bassessment, prevention, detection, response /
_cedited by Francesco Flammini.
260 _aSouthampton ;
_aBoston :
_bWIT Press,
_cc2012.
300 _a303 p. :
_bill. ;
_c25 cm.
490 0 _aInformation & communication technologies
500 _aContents PART I: Fundamentals of security risk and Vulnerability Assessment 1: Model-based risk analysis for critical infrastructures 1. Introduction 2. The critical infrastructure problem 3. Tools 4. Multi-criterion tools (CARVER and MSRAM) 5. CI/KR as a network Etc. 2: Physical vulnerability assessment 1. Introduction 2. Common techniques for finding vulnerabilities 3. VA best practices 4. Vulnerability myths and mistakes PART II: Modelling and simulation Tools for critical infrastructures 3: Modelling and simulation of critical infrastructures 1.Introduction 2.Interdependency modelling 3.Holistic Approaches 4.Critical infrastructures as complex systems 5.Simulative approaches Etc. 4:Graphical formalism for modelling critical infrastructures 1.Introduction 2.Requirements for CI modelling and simulation 3.Graphical formalisation for CI modelling and simulation 4.Practical Experiences in modelling CIs: meeting the requirements with SAN 5.Conclusions 5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project 1.Introduction 2.Related works and initiatives 3.DIESIS project 4.Conclusion Etc. 6: Game theory in infrastructure security 1.Introduction 2.Game-theoretic models 3.Limitations of game-theoretic models 4.Conclusion Etc. PART III: Cybersecurity in Information and SCADA Systems 7: Modelling, measuring and managing information technology risks 1.Introduction 2.What is risk with respect to information systems? 3.Why is it important to manage risk? 4.Managing risk at organizational level 5.How is risk assessed? Etc. 8: trustworthiness evaluation of critical information infrastructures 1.Introduction 2.Dependability and security evaluation approaches 3.On the evaluation of Financial Infrastructure protection (FIP) 4.On the evaluation of CIIP 5.Conclusion Etc. 9: Network resilience 1.Introduction 2.A component-based framework for improving network resilience in CIs 3.Intrusion detection and reaction in satellite networks 4.Detection and remediation of a distributed attack over an IP-based network 5.Diagnosis-driven reconfiguration of WSNs Etc. 10: Wireless sensor networks for critical infrastructure protection 1.Introduction 2.Security threat analysis 3.Survey of the state of the art 4.Conclusions and identification of further research topics PART IV: Monitoring and Surveillance Technologies 11: Intelligent video surveillance 1.Introduction 2.Architecture of an IVS system 3.Examples of applications Etc. 12: Audio Surveillance 1.Introduction 2.Sound recognition for audio surveillance 3.A representative picture of the related literature Etc. 13: Terahertz for weapon and explosive detection 1.Introduction 2.Terahertz technology 3.Terahertz for weapon detection Etc. 14:Structural health monitoring 1. introduction 2. structural evaluation 3. sensor selection, etc 15: Networks of simple sensors foe detecting emplacement of improvised explosive devices 1. clues to IED emplacement 2. sensor management 3. experiments, etc Part V Security systems integration and Alarm Management 16 : Security systems, Design and Integration 17. multisource information fusion for critical infrastructure situation awareness 18 Simulation-Based learning in the physical security industry 19. Frameworks and tools for imergence response and crisis management
504 _aIncludes bibliographical references.
650 0 _aComputer security
_xManagement.
650 7 _aComputer security
_xManagement.
_2fast
700 1 _aFlammini, Francesco.
942 _2ddc
_cBOOK-CA
_h006.8
_i1
_kCRI
_m006.8 CRI
999 _c78
_d78