LEADER 04145nam 22007935 450 001 996466252903316 005 20210709121220.0 010 $a3-642-28920-7 024 7 $a10.1007/978-3-642-28920-0 035 $a(CKB)3360000000365956 035 $a(SSID)ssj0000666026 035 $a(PQKBManifestationID)11371210 035 $a(PQKBTitleCode)TC0000666026 035 $a(PQKBWorkID)10664026 035 $a(PQKB)11770640 035 $a(DE-He213)978-3-642-28920-0 035 $a(MiAaPQ)EBC3070077 035 $a(PPN)168313197 035 $a(EXLCZ)993360000000365956 100 $a20120315d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCritical Infrastructure Protection$b[electronic resource] $eAdvances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense /$fedited by Javier Lopez, Roberto Setola, Stephen Wolthusen 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIV, 357 p.) 225 1 $aSecurity and Cryptology ;$v7130 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-28919-3 320 $aIncludes bibliographical references and author index. 330 $aThe present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of  pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community. 410 0$aSecurity and Cryptology ;$v7130 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aAlgorithms 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aAlgorithms. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aLopez$b Javier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSetola$b Roberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWolthusen$b Stephen$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466252903316 996 $aCritical infrastructure protection$92658893 997 $aUNISA