|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910830149303321 |
|
|
Autore |
Lewis T. G (Theodore Gyle), <1941-> |
|
|
Titolo |
Critical infrastructure protection in homeland security [[electronic resource] ] : defending a networked nation / / Ted G. Lewis |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : Wiley-Interscience, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-280-41147-3 |
9786610411474 |
0-470-36282-0 |
0-471-78954-2 |
0-471-78953-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (488 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures - United States |
Computer security - United States - Planning |
Terrorism - United States - Prevention |
Terrorism - Government policy - United States |
Civil defense - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Published simultaneously in Canada"--T.p. verso. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Strategy -- Origins -- Challenges -- Networks -- Vulnerability analysis -- Risk analysis -- Water -- SCADA -- Power -- Energy -- Telecommunications -- Internet -- Cyber-threats -- Cyber-security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
A scientific approach to the new field of critical infrastructure protectionThis book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnera |
|
|
|
|
|
|
|