05475nam 2200637 450 99646589850331620220606184146.01-283-43791-097866134379143-540-89173-010.1007/978-3-540-89173-4(CKB)2550000000011534(SSID)ssj0000399461(PQKBManifestationID)11955140(PQKBTitleCode)TC0000399461(PQKBWorkID)10376364(PQKB)10205972(DE-He213)978-3-540-89173-4(MiAaPQ)EBC3065275(MiAaPQ)EBC6511685(Au-PeEL)EBL6511685(OCoLC)1204040486(PPN)149040520(EXLCZ)99255000000001153420211008d2008 uy 0engurnn#008mamaatxtccrCritical information infrastructures security second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers /Javier Lopez, Bernhard M. Hämmerli (eds.)1st ed. 2008.Berlin, Germany ;New York, New York :Springer,[2008]©20081 online resource (XI, 362 p.)Security and Cryptology ;5141Includes index.3-540-89095-5 Includes bibliographical references and index.Session 1: R&D Agenda -- Towards a European Research Agenda for CIIP: Results from the CI2RCO Project -- ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research -- Session 2: Communication Risk and Assurance I -- An Analysis of Cyclical Interdependencies in Critical Infrastructures -- A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures -- Designing Information System Risk Management Framework Based on the Past Major Failures in the Japanese Financial Industry -- Advanced Reaction Using Risk Assessment in Intrusion Detection Systems -- Session 3: Communication Risk and Assurance II -- Managing Critical Infrastructures through Virtual Network Communities -- The Structure of the Sense of Security, Anshin -- Securing Agents against Malicious Host in an Intrusion Detection System -- Session 4: Code of Practice and Metrics -- UML Diagrams Supporting Domain Specification Inside the CRUTIAL Project -- Expert System CRIPS: Support of Situation Assessment and Decision Making -- Using Dependent CORAS Diagrams to Analyse Mutual Dependency -- A Methodology to Estimate Input-Output Inoperability Model Parameters -- Session 5: Information Sharing and Exchange -- Efficient Access Control for Secure XML Query Processing in Data Streams -- An Approach to Trust Management Challenges for Critical Infrastructures -- Session 6: Continuity of Services and Resiliency -- Detecting DNS Amplification Attacks -- LoRDAS: A Low-Rate DoS Attack against Application Servers -- Intra Autonomous System Overlay Dedicated to Communication Resilience -- A Proposal for the Definition of Operational Plans to Provide Dependability and Security -- Session 7: SCADA and Embedded Security -- Application of Kohonen Maps to Improve Security Tests on Automation Devices -- Ideal Based Cyber Security Technical Metrics for Control Systems -- Designing Critical Infrastructure Cyber Security Segmentation Architecture by Balancing Security with Reliability and Availability -- Session 8: Threats and Attacks Modeling -- A General Model and Guidelines for Attack Manifestation Generation -- A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications -- Attack Modeling of SIP-Oriented SPIT -- A Malware Detector Placement Game for Intrusion Detection -- Session 9: Information Exchange and Modelling -- Modeling and Simulating Information Security Management -- Design of a Platform for Information Exchange on Protection of Critical Infrastructures -- Towards a Standardised Cross-Sector Information Exchange on Present Risk Factors.This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are organized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling.Security and Cryptology ;5141ComputersAccess controlCongressesComputer securityCongressesComputersAccess controlComputer security005.8López Javier(Javier López-Muñoz),Hämmerli Bernhard M.MiAaPQMiAaPQMiAaPQBOOK996465898503316Critical Information Infrastructures Security2584647UNISA01291nam0 22002891i 450 UON0050583020231205105435.27620210714d1953 |0itac50 baengUS|||| 1||||Rebels and ancestorsthe American novel, 1890-1915Frank Norris, Stephen Crane, Jack London, Ellen Glasgow, Theodore Dreiserby Maxwell GeismarBostonHoughton Mifflin ; CambridgeThe Riverside Press1953xii, 435 p.21 cmNARRATIVA AMERICANASec. 19.-20.StudiUONC048203FIUSBostonUONL000139USCambridge (Mass.)UONL000262813. 5209Narrativa americana in lingua inglese. 1900-1945. Storia, descrizione, studi critici21GEISMARMaxwellUONV154716199982Houghton, Mifflin & Co.UONV247409650The Riverside PressUONV264299650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00505830SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI NordA V C 120 SI MR 54671 5 120 Rebels and ancestors47957UNIOR01363nam0 22003131i 450 UON0010409620231205102606.88320020107d1973 |0itac50 balatNL|||| |||||Aristoteles Latinus XXVI, 1-3, fasciculus quartusEthica Nicomacheatranslatio Roberti Grosseteste Lincolniensis sive "Liber ethicorum" B. Recensio recognitaeditit Renatus Antonius GauthierBruxellesParisDesclee de Brouwer1973P. 375-58826 cmBEBruxellesUONL000128FRParisUONL002984AristotelesUONV0557874207GAUTHIERRenatus AntoniusUONV066647Desclée de BrouwerUONV248271650ARISTOTELEAristotelesUONV005797ARASTUAristotelesUONV005800ARISTOTELE : di#StagiraAristotelesUONV055789PSEUDO ARISTOTELEAristotelesUONV055790ITSOL20250214RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00104096SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI P 5 0126 012 SI MC 6276 5 Aristoteles Latinus XXVI, 1-3, fasciculus quartus1311526UNIOR