LEADER 00997nam0 22002651i 450 001 UON00114808 005 20231205102652.42 100 $a20020107d1981 |0itac50 ba 101 $aper 102 $aIR 105 $a|||| 1|||| 200 1 $aPanj dastan$fJalal Al-e Ahmad 210 $aTehran$cRovaq$d1360h [1981] 215 $a87 p.$d21 cm 620 $aIR$dTihra?n$3UONL005570 686 $aIRA VI AEZ$cIRAN - LETTERATURA - PERSIANO - TESTI LETTERARI - PERIODO MODERNO E CONTEMPORA$2A 700 1$aAL-E AHMAD$bJalal$3UONV010589$0638119 712 $aRovaq-Falaq$3UONV261771$4650 790 1$aAHMAD, Jalal Al-e$zAL-E AHMAD, Jalal$3UONV005112 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00114808 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI IRA VI AEZ 013 $eSI SA 33517 7 013 996 $aPanj dastan$91308746 997 $aUNIOR LEADER 02788nam 22006254a 450 001 9910830149303321 005 20221206154011.0 010 $a1-280-41147-3 010 $a9786610411474 010 $a0-470-36282-0 010 $a0-471-78954-2 010 $a0-471-78953-4 035 $a(CKB)1000000000354587 035 $a(EBL)257072 035 $a(OCoLC)71295472 035 $a(SSID)ssj0000132646 035 $a(PQKBManifestationID)11129734 035 $a(PQKBTitleCode)TC0000132646 035 $a(PQKBWorkID)10040317 035 $a(PQKB)10799442 035 $a(MiAaPQ)EBC257072 035 $a(EXLCZ)991000000000354587 100 $a20050914d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCritical infrastructure protection in homeland security$b[electronic resource] $edefending a networked nation /$fTed G. Lewis 210 $aHoboken, N.J. $cWiley-Interscience$dc2006 215 $a1 online resource (488 p.) 300 $a"Published simultaneously in Canada"--T.p. verso. 311 $a0-471-78628-4 320 $aIncludes bibliographical references and index. 327 $aStrategy -- Origins -- Challenges -- Networks -- Vulnerability analysis -- Risk analysis -- Water -- SCADA -- Power -- Energy -- Telecommunications -- Internet -- Cyber-threats -- Cyber-security. 330 $aA scientific approach to the new field of critical infrastructure protectionThis book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnera 606 $aComputer networks$xSecurity measures$zUnited States 606 $aComputer security$zUnited States$xPlanning 606 $aTerrorism$zUnited States$xPrevention 606 $aTerrorism$xGovernment policy$zUnited States 606 $aCivil defense$zUnited States 615 0$aComputer networks$xSecurity measures 615 0$aComputer security$xPlanning. 615 0$aTerrorism$xPrevention. 615 0$aTerrorism$xGovernment policy 615 0$aCivil defense 676 $a005.8 700 $aLewis$b T. G$g(Theodore Gyle),$f1941-$0857489 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830149303321 996 $aCritical infrastructure protection in homeland security$94079451 997 $aUNINA