Critical Infrastructure Protection II -

Critical Infrastructure Protection II

Mauricio Papa, Sujeet Shenoi (Herausgeber)

Buch | Softcover
278 Seiten
2010 | Softcover reprint of hardcover 1st ed. 2008
Springer-Verlag New York Inc.
978-1-4419-4695-9 (ISBN)
106,99 inkl. MwSt
Describes research results and innovative applications in the interdisciplinary field of critical infrastructure protection. This title highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that helps secure information, computer and network assets in the various critical infrastructure sectors.
Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.


This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Themes And Issues.- Emergent Risks In Critical Infrastructures.- Cyberspace Policy For Critical Infrastructures.- Infrastructure Security.- Security Assessment Of A Turbo-Gas Power Plant.- Detecting Cyber Attacks On Nuclear Power Plants.- Control Systems Security.- Applying Trusted Network Technology To Process Control Systems.- Towards A Taxonomy Of Attacks Against Energy Control Systems.- Attribution Of Cyber Attacks On Process Control Systems.- Modeling And Detecting Anomalies In Scada Systems.- Assessing The Integrity Of Field Devices In Modbus Networks.- Designing Security-Hardened Microkernels For Field Devices.- Combating Memory Corruption Attacks On Scada Devices.- Mitigating Accidents In Oil And Gas Production Facilities.- Security Strategies.- Automated Assessment Of Compliance With Security Best Practices.- Collaborative Access Control For Critical Infrastructures.- Infrastructure Interdependencies.- Modeling Dependencies In Critical Infrastructures.- Metrics For Quantifying Interdependencies.- An Integrated Approach For Simulating Interdependencies.- Infrastructure Modeling And Simulation.- Simulation Of Advanced Train Control Systems.- An Integrated Methodology For Critical Infrastructure Modeling And Simulation.- Using 3D Models And Discrete Simulations In Infrastructure Security Applications.

Erscheint lt. Verlag 25.11.2010
Reihe/Serie IFIP International Federation for Information Processing ; 290
Zusatzinfo XVIII, 278 p.
Verlagsort New York, NY
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
ISBN-10 1-4419-4695-0 / 1441946950
ISBN-13 978-1-4419-4695-9 / 9781441946959
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00