LEADER 06003nam 2200793 450 001 9910787944403321 005 20200520144314.0 010 $a1-118-81766-4 010 $a1-118-81770-2 035 $a(CKB)2670000000570927 035 $a(EBL)1813343 035 $a(SSID)ssj0001347274 035 $a(PQKBManifestationID)11761540 035 $a(PQKBTitleCode)TC0001347274 035 $a(PQKBWorkID)11352096 035 $a(PQKB)11631544 035 $a(PQKBManifestationID)16041311 035 $a(PQKB)23311877 035 $a(DLC) 2014019059 035 $a(Au-PeEL)EBL1813343 035 $a(CaPaEBR)ebr10953251 035 $a(CaONFJC)MIL650904 035 $a(OCoLC)879851997 035 $a(CaSebORM)9781118817667 035 $a(MiAaPQ)EBC1813343 035 $a(EXLCZ)992670000000570927 100 $a20141023h20152015 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCritical infrastructure protection in homeland security $edefending a networked nation /$fTed G. Lewis 205 $aSecond edition. 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons, Inc.,$d2015. 210 4$dİ2015 215 $a1 online resource (399 p.) 300 $aIncludes index. 311 $a1-118-81763-X 311 $a1-322-19624-9 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCritical Infrastructure Protection in Homeland Security: Defending a Networked Nation; Copyright; Contents; Preface; How to Use this Book; Acknowledgment; Part I Origins of Homeland Security and Critical Infrastructure Protection Policy; Chapter 1 Origins of Critical Infrastructure Protection; 1.1 Recognition; 1.2 Natural Disaster Recovery; 1.3 Definitional Phase; 1.4 Public-Private Cooperation; 1.5 Federalism: Whole of Government; 1.6 Infrastructure Protection within DHS; 1.7 Implementing a Risk Strategy; 1.7.1 Risk-Informed Decision-Making; 1.7.2 Resilience-Informed Decision-Making 327 $a1.7.3 Prevention or Response? 1.8 Analysis; 1.8.1 The PPP Conundrum; 1.8.2 The Information-Sharing Conundrum; 1.8.3 Climate Change Conundrum; 1.8.4 The Funding Conundrum; 1.8.5 Spend 80% on 20% of the Country; 1.9 Exercises; References; Part II Theory and Foundations; Chapter 2 Risk Strategies; 2.1 EUT; 2.1.1 Threat-Asset Pairs; 2.2 PRA and Fault Trees; 2.2.1 An Example: Your Car; 2.3 MBRA and Resource Allocation; 2.3.1 Another Example: Redundant Power; 2.4 PRA in the Supply Chain; 2.5 Protection versus Response; 2.6 Threat Is an Output; 2.7 Bayesian Belief Networks; 2.8 A BN for Threat 327 $a2.9 Risk of a Natural Disaster 2.10 Earthquakes; 2.11 Black Swans and Risk; 2.12 Black Swan Floods; 2.13 Are Natural Disasters Getting Worse?; 2.14 Black Swan al Qaeda Attacks; 2.15 Black Swan Pandemic; 2.16 Risk and Resilience; 2.17 Exercises; References; Chapter 3 Theories of Catastrophe; 3.1 NAT; 3.2 Blocks and Springs; 3.3 Bak's Punctuated Equilibrium Theory; 3.4 TOC; 3.4.1 The State Space Diagram; 3.5 The U.S. Electric Power Grid; 3.6 POE; 3.6.1 The Great Recessions; 3.6.2 Too Much Money; 3.7 Competitive Exclusion; 3.7.1 Gause's Law; 3.7.2 The Self-Organizing Internet; 3.7.3 A Monoculture 327 $a3.8 POR 3.9 Resilience of Complex Infrastructure Systems; 3.9.1 Expected Utility and Risk; 3.9.2 SOC; 3.9.3 TOC; 3.9.4 POE and nonlinearity; 3.9.5 CEP and loss of redundancy; 3.9.6 POR and percolation; 3.10 Emergence; 3.10.1 Opposing Forces in Emergent CIKR; 3.11 Exercises; References; Chapter 4 Complex CIKR Systems; 4.1 CIKR as Networks; 4.1.1 Emergence; 4.1.2 Classes of CIKR Networks; 4.1.3 Self-Organized Networks; 4.2 Cascading CIKR Systems; 4.2.1 The Fundamental Resilience Equation; 4.2.2 Targeted Attacks; 4.3 Network Flow Resilience; 4.4 Paradox of Redundancy 327 $a4.4.1 Link Percolation and Robustness 4.4.2 Node Percolation and Robustness; 4.4.3 Blocking Nodes; 4.5 Network Risk; 4.5.1 Crude Oil and KeystoneXL; 4.5.2 MBRA Network Resource Allocation; 4.6 Exercises; Reference; Part III Individual Sectors; Chapter 5 Communications; 5.1 Early Years; 5.2 Regulatory Structure; 5.3 The Architecture of the Communication Sector; 5.3.1 Physical Infrastructure; 5.3.2 Wireless Networks; 5.3.3 Extraterrestrial Communication; 5.3.4 LESs; 5.3.5 Cellular Networks; 5.3.6 Generations; 5.3.7 Wi-Fi Technology; 5.4 Risk Analysis; 5.4.1 Importance of Carrier Hotels 327 $a5.4.2 Network Analysis 330 $a""...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs."" (Computing Reviews.com, March 22, 2007)""The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment."" (Homeland Security Watch, August 17, 2006)While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific 606 $aComputer networks$xSecurity measures$zUnited States 606 $aComputer security$zUnited States$xPlanning 606 $aTerrorism$zUnited States$xPrevention 606 $aTerrorism$xGovernment policy$zUnited States 606 $aCivil defense$zUnited States 606 $aPublic utilities$xProtection$zUnited States 615 0$aComputer networks$xSecurity measures 615 0$aComputer security$xPlanning. 615 0$aTerrorism$xPrevention. 615 0$aTerrorism$xGovernment policy 615 0$aCivil defense 615 0$aPublic utilities$xProtection 676 $a005.8 700 $aLewis$b T. G$g(Theodore Gyle),$f1941-$0857489 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787944403321 996 $aCritical infrastructure protection in homeland security$91978108 997 $aUNINA