Muutke küpsiste eelistusi

E-raamat: Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection IV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, and Risk Management. This book is the fourth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at the National Defense University, Washington, DC, USA in the spring of 2010. Critical Infrastructure Protection IV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Tyler Moore is a Postdoctoral Fellow at the Center for Research on Computation and Society, Harvard University, Cambridge, Massachusetts, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Contributing Authors ix
Preface xvii
PART I THEMES AND ISSUES
1 Security At What Cost?
3(14)
Neil Robinson
Dimitris Potoglou
Chong Kim
Peter Burge
Richard Warnes
2 Foreign Direct Investment in an Era of Increased Threats to Critical Infrastructures
17(12)
Dan Assaf
3 Critical Information Infrastructure Protection in the Developing World
29(14)
Jan Ellefsen
Sebastiaan von Solms
PART II CONTROL SYSTEMS SECURITY
4 Modeling Control System Failures and Attacks. The Waterloo Campaign to Oil Pipelines
43(20)
Jonathan Butts
Mason Rice
Sujeet Shenoi
5 High Security with Low Latency in Legacy SCADA Systems
63(18)
Rouslan Solomakhm
Patrick Tsang
Sean Smith
6 Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes
81(14)
Thomas McEroy
Stephen Wolthusen
7 Distributed Intrusion Detection System for SCADA Protocols
95(18)
Igor Nai Fovino
Marcelo Masera
Michele Guglielmi
Andrea Carcano
Alberto Trombetta
PART III INFRASTRUCTURE SECURITY
8 Distributed IP Watchlist Generation for Intrusion Detection in the Electrical Smart Grid
113(14)
Ray Klump
Matthew Kwiatkowski
9 Security Analysis of the MPLS Label Distribution Protocol
127(14)
Daniel Guernsey
Aaron Engel
Jonathan Butts
Sujeet Shenoi
10 U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials
141(16)
Mark Hartong
Rajni Goel
Duminda Wijesekera
11 Protecting the Food Supply Chain from Terrorist Attack
157(14)
Maria Jesus Alvarez
Ainara Alvarez
Maria Carla De Maggio
Ainhoa Oses
Marcella Trombetta
Roberto Setola
PART IV INFRASTRUCTURE MODELING AND SIMULATION
12 Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments
171(14)
Nils Lunden
Robin Sveen
Hans Lund
Nils Svendsen
Stephen Wolthusen
13 Assessing the Economic Loss and Social Impact of Information System Breakdowns
185(14)
Fabio Bisogni
Simona Cavallini
14 Modeling Inoperability Propagation Using Bayesian Networks
199(16)
Zaw Zaw Aung
Kenji Watanabe
PART V RISK MANAGEMENT
15 Resilience in Risk Analysis and Risk Assessment
215(14)
Stig Johnsen
16 A Manufacturer-Specific Security Assessment Methodology for Critical Infrastructure Components
229(16)
Thomas Brandstetter
Konstantin Knorr
Ute Rosenbaum
17 An Advanced Decision-Support Tool for Electricity Infrastructure Operations
245
Yousu Chen
Zhenyu Huang
Pak-Chung Wong
Patrick Mackey
Craig Allwardt
Jian Ma
Frank Greitzer