Critical Infrastructure Protection II

Mauricio Papa, Sujeet Shenoi (Herausgeber)

Buch | Hardcover
278 Seiten
2008
Springer-Verlag New York Inc.
978-0-387-88522-3 (ISBN)

Lese- und Medienproben

Critical Infrastructure Protection II -
106,99 inkl. MwSt
Describes research results and innovative applications in the interdisciplinary field of critical infrastructure protection. This title highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that can help secure information, computer and network assets in various critical infrastructure sectors.
Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.


This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Themes And Issues.- Emergent Risks In Critical Infrastructures.- Cyberspace Policy For Critical Infrastructures.- Infrastructure Security.- Security Assessment Of A Turbo-Gas Power Plant.- Detecting Cyber Attacks On Nuclear Power Plants.- Control Systems Security.- Applying Trusted Network Technology To Process Control Systems.- Towards A Taxonomy Of Attacks Against Energy Control Systems.- Attribution Of Cyber Attacks On Process Control Systems.- Modeling And Detecting Anomalies In Scada Systems.- Assessing The Integrity Of Field Devices In Modbus Networks.- Designing Security-Hardened Microkernels For Field Devices.- Combating Memory Corruption Attacks On Scada Devices.- Mitigating Accidents In Oil And Gas Production Facilities.- Security Strategies.- Automated Assessment Of Compliance With Security Best Practices.- Collaborative Access Control For Critical Infrastructures.- Infrastructure Interdependencies.- Modeling Dependencies In Critical Infrastructures.- Metrics For Quantifying Interdependencies.- An Integrated Approach For Simulating Interdependencies.- Infrastructure Modeling And Simulation.- Simulation Of Advanced Train Control Systems.- An Integrated Methodology For Critical Infrastructure Modeling And Simulation.- Using 3D Models And Discrete Simulations In Infrastructure Security Applications.

Erscheint lt. Verlag 16.10.2008
Reihe/Serie IFIP International Federation for Information Processing ; 290
Zusatzinfo XVIII, 278 p.
Verlagsort New York, NY
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
ISBN-10 0-387-88522-6 / 0387885226
ISBN-13 978-0-387-88522-3 / 9780387885223
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich