LEADER 05720nam 2200721 450 001 9910460547103321 005 20200903223051.0 010 $a1-61499-478-1 035 $a(CKB)3710000000337576 035 $a(EBL)1920288 035 $a(SSID)ssj0001454935 035 $a(PQKBManifestationID)11820778 035 $a(PQKBTitleCode)TC0001454935 035 $a(PQKBWorkID)11500381 035 $a(PQKB)11667896 035 $a(MiAaPQ)EBC1920288 035 $a(Au-PeEL)EBL1920288 035 $a(CaPaEBR)ebr11007154 035 $a(CaONFJC)MIL691806 035 $a(OCoLC)903970796 035 $a(EXLCZ)993710000000337576 100 $a20141107h20152015 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComprehensive approach as 'sine qua non' for critical infrastructure protection /$f[edited by] Denis Caleta, Slavo Radosevic 210 1$aWashington, District of Columbia :$cIOS Press,$d[2015] 210 4$dİ2015 215 $a1 online resource (308 p.) 225 1 $aNATO science for peace and security series - d: information and communication security,$x1874-6268 ;$vvolume 39 300 $aDescription based upon print version of record. 311 $a1-61499-477-3 320 $aIncludes bibliographical references and index. 327 $a""COMPREHENSIVE APPROACH AS a???SINE QUA NONa??? FOR CRITICAL INFRASTRUCTURE PROTECTION""; ""Editorial""; ""Contents""; ""Section 1: Strategic Environment and Critical Infrastructure Protection""; ""Contemporary Aspects in Critical Infrastructure Protection and Combating Terrorism ""; ""Corruption: From Generally Accepted Business Practice to Serious Threat to Critical Infrastructure Protection ""; ""Outsourcing as an Important Source of Risk in the Management of Terrorist Threats ""; ""Towards a Resilient Critical Infrastructure System against the Risk of Terrorism "" 327 $a""The Risk of Terrorist and Violent Extremist Attacks against Schools """"Use of the Enhanced Structural Model for Attack Analysis and Education ""; ""Section 2: Information Security and Counter Terrorism Considerations""; ""Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats ""; ""Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat? ""; ""Security of Classified Information as Part of the National Critical Infrastructure Protection: Macedonian Experience "" 327 $a""Security Vetting in Relation to the Critical Infrastructure """"Section 3: Terrorist Threats to Critical Infrastructure Operation a??? Environmental Aspects""; ""Environmental Terrorism as a Threat to the Serbian Water Infrastructure Sector-through the Lens of Regional Perspective ""; ""Assuring Food Security in Agricultural Production in the Republic of Bulgaria under the Conditions of General Globalization ""; ""Safety & Security Assessment to Prevent a Terrorism Attack in the Centralized Facility for Radioactive Waste Management in Albania"" 327 $a""Bioterrorism as a Threat to Food Supply Systems """"Potential Vulnerability and Threats of Natural Disasters or Malicious Human Activity to the Water Supply Network: A Case Study of Chernivtsi, Ukraine ""; ""Section 4: Energy Security as a Key Factor of Critical Infrastructure Protection""; ""Tailor-Made Education: Environmental vs. Energy Security and Sustainable Development Paradigm ""; ""The Combined Threat of Terrorism and Organized Crime for and in South East Europe ""; ""Section 5: National Approaches to Critical Infrastructure Protection"" 327 $a""Protection of the Critical Infrastructure from Terrorism: Case Study of the Republic of Croatia""""Terrorist Threats to Critical Infrastructure in BiH and Protection Measures""; ""Challenges in Defining Critical Infrastructure in Montenegro""; ""Risk Management of Terrorist Attacks in the Tunnels as Critical Points of Corridor 5c Infrastructure - Trans-European Road Network Through Bosnia and Herzegovina""; ""Subject Index""; ""Author Index"" 330 $aThe world in which we live is becoming ever more complex, both from the viewpoint of ensuring security, and also because of our level of dependence on technology, as represented by so-called critical infrastructure. Despite the efforts of national security entities in the national and international context, terrorist attacks will probably never be completely preventable. This makes it necessary to prepare the functioning of our systems for the occurrence of a terrorist attack so that they will operate quickly and effectively even in this type of crisis. This book presents the papers delivered 410 0$aNATO science for peace and security series.$nSub-series D,$pInformation and communication security ;$vv. 39. 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 606 $aInformation networks$xSecurity measures$vCongresses 606 $aData protection$vCongresses 606 $aCyberterrorism$xPrevention$vCongresses 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures 615 0$aComputer security 615 0$aInformation networks$xSecurity measures 615 0$aData protection 615 0$aCyberterrorism$xPrevention 676 $a340.5/4 702 $aC?aleta$b Denis 702 $aRadovic?$b Vesela 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910460547103321 996 $aComprehensive approach as 'sine qua non' for critical infrastructure protection$92462012 997 $aUNINA