LEADER 01309cac0 22003011 450 001 LAEC00019121 005 20110502104258.0 100 $a20110502f0000 |||||ita|0103 ba 102 $aFR 110 $ab 200 1 $aCollection idées 801 0$aIT$bUNISOB$c20110502$gRICA 912 $aLAEC00019121 940 $aC 121 Collana SBN 941 $aC 996 $aCOLLECTION Idees$9617063 997 $aUNISOB 998 \\$1001E600200022164$12001 $amilleottocentoquarantotto 998 \\$1001E600200022965$12001 $a<>grandes doctrines de l'Histoire$eDe Confucius à Toynbee 998 \\$1001E600200032227$12001 $a<>conditions de l'esprit scientifique 998 \\$1001E600200032902$12001 $a<>homme et la technique 998 \\$1001E600200039348$12001 $a<>travail en miettes$espécialisation et loisirs. Nouvelle édition revue et augmentée 998 \\$1001E600200039350$12001 $aAliénation et société industrielle 998 \\$1001E600200039715$12001 $aDix-huit leçons sur la société industrielle 998 \\$1001E600200040686$12001 $aMarx, Engels et la politique internationale 998 \\$1001E600200060767$12001 $aJ.-J. Rousseau 998 \\$1001E600200066354$12001 $aLeibniz et Spinoza 998 \\$1001SOB022330$12001 $a<>Ancien Régime et la Révolution LEADER 05048nam 2200613 450 001 9910820389703321 005 20230803220830.0 010 $a1-118-65183-9 010 $a1-118-65170-7 035 $a(CKB)2550000001189685 035 $a(EBL)1598810 035 $a(SSID)ssj0001154731 035 $a(PQKBManifestationID)11689335 035 $a(PQKBTitleCode)TC0001154731 035 $a(PQKBWorkID)11176750 035 $a(PQKB)10781515 035 $a(MiAaPQ)EBC1598810 035 $a(Au-PeEL)EBL1598810 035 $a(CaPaEBR)ebr10829813 035 $a(CaONFJC)MIL568610 035 $a(OCoLC)868964494 035 $a(EXLCZ)992550000001189685 100 $a20140209h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCommunications and information infrastructure security /$fedited by John G. Voeller 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons,$d2014. 210 4$d©2014 215 $a1 online resource (124 p.) 300 $aDescription based upon print version of record. 311 $a1-118-65197-9 311 $a1-306-37359-X 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Contents; Preface; Chapter 1 Telecommunication: Critical Infrastructure Protection; 1.1 Introduction; 1.2 Overview; 1.3 Evolutionary Forces That Shape the Sector; 1.3.1 Unregulated Beginnings; 1.3.2 The Telecom War; 1.3.3 Regulatory Period; 1.7.1 The Hubs: Telecom Hotels; 1.3.4 Deregulated Oligopolies; 1.4 Major Components of the Sector; 1.5 Resiliency of Networks; 1.5.1 Hubs, Clusters, and Betweeners; 1.5.2 Betweenness; 1.6 Resilience Results; 1.6.1 Cascade Resiliency; 1.6.2 Flow Resiliency; 1.7 Telecommunications Criticality; 1.7.2 Self-Organized Criticality 327 $a1.8 Final AnalysisReferences; Further Reading; Chapter 2 Strategies for Protecting the Telecommunications Sector; 2.1 Introduction; 2.2 Background; 2.2.1 A Historical Perspective; 2.2.2 What Makes Up The Telecommunications Sector?; 2.2.3 How Do We Secure the Telecommunications Sector?; 2.2.4 What are Critical Telecommunications Infrastructure Systems and Assets?; 2.2.5 What is the U.S. Policy on Protecting National Critical Telecommunications Services and Computer-Driven Systems?; 2.3 Threats, Challenges, and Continuous Improvement; 2.3.1 The General Threat Assessment 327 $a2.3.2 The Threat to America's Telecommunications Components2.3.3 The Threat to America's Internet Networks; 2.4 Telecommunications Challenges and Continuous Improvement; 2.5 Conclusions; 2.5.1 Performance, Reliability and Efficiency; 2.5.2 The Threat to America's Telecommunications Sector; 2.5.3 Future Research Direction; 2.5.4 The Prospects for the Future; References; Further Reading; Chapter 3 Wireless Security; 3.1 Scientific Overview; 3.1.1 Voice-Centric Networks; 3.1.2 Data-Centric Networks; 3.2 Mobile and Wireless Security Landscape; 3.2.1 Federal Legislation and Regulation 327 $a3.2.2 Federal Standards and Guidance Publications3.2.3 Industry Standards and Guidance Organizations; 3.2.4 Governmental Wireless Communications Initiatives; 3.3 Critical Needs Analysis; 3.3.1 Intrusion Prevention Systems; 3.3.2 Internet-Based Security Protocols; 3.4 Research Directions; 3.4.1 Intrusion Prevention Systems; 3.4.2 Internet-Based Security Protocols; 3.4.3 Overlaying Security Services over IP-based Access Networks; 3.4.4 Mobile Device Security; References; Further Reading; Chapter 4 Detection of Hidden Information, Covert Channels and Information Flows; 4.1 Introduction 327 $a4.2 Scientific Overview4.2.1 Hiding Information; 4.3 Countermeasures; 4.3.1 Countermeasures: Detection; 4.3.2 Countermeasures: Disruption; 4.4 Research and Development Trends; 4.4.1 Research Trends; 4.4.2 Development Trends; 4.5 Critical Needs Analysis; 4.6 Research Directions; References; Further Reading; Other Suggested Reading; Chapter 5 Inherently Secure Next-Generation Computing and Communication Networks for Reducing Cascading Impacts; 5.1 Introduction; 5.2 Standards, Guidelines, and Best Practices; 5.3 Standards; 5.3.1 Guidelines; 5.4 Best Practice 327 $a5.4.1 Cyber and Control Systems Security Standards in Common Use 330 $a Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed. 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 676 $a005.8 701 $aVoeller$b John G$0864507 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820389703321 996 $aCommunications and information infrastructure security$94111175 997 $aUNINA