Critical infrastructure protection in homeland security: defending a networked nation
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
Wiley
2015
|
Ausgabe: | 2. ed. |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028038859&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Includes index |
Umfang: | XIX, 376 S. Ill., graph. Darst., Kt. |
ISBN: | 9781118817636 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042605891 | ||
003 | DE-604 | ||
005 | 20150706 | ||
007 | t| | ||
008 | 150609s2015 xxuabd| |||| 00||| eng d | ||
010 | |a 014018628 | ||
020 | |a 9781118817636 |9 978-1-118-81763-6 | ||
035 | |a (OCoLC)915678031 | ||
035 | |a (DE-599)BVBBV042605891 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-83 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a ZG 9240 |0 (DE-625)156053: |2 rvk | ||
100 | 1 | |a Lewis, T. G. |d 1941- |e Verfasser |0 (DE-588)109078675 |4 aut | |
245 | 1 | 0 | |a Critical infrastructure protection in homeland security |b defending a networked nation |c Ted G. Lewis |
250 | |a 2. ed. | ||
264 | 1 | |a Hoboken, NJ |b Wiley |c 2015 | |
300 | |a XIX, 376 S. |b Ill., graph. Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 4 | |a Politik | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Computer security |z United States |x Planning | |
650 | 4 | |a Terrorism |z United States |x Prevention | |
650 | 4 | |a Terrorism |x Government policy |z United States | |
650 | 4 | |a Civil defense |z United States | |
650 | 4 | |a Public utilities |x Protection |z United States | |
650 | 0 | 7 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 3 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 4 | |a Internationaler Terrorismus |0 (DE-588)4162078-1 |D s |
689 | 0 | 5 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028038859&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028038859 |
Datensatz im Suchindex
_version_ | 1819369422377189376 |
---|---|
adam_text | Titel: Critical infrastructure protection in homeland security
Autor: Lewis, Theodore G
Jahr: 2015
CONTENTS
Preface xiv
How to Use this Book xvii
Acknowledgment xix
PART I ORIGINS OF HOMELAND SECURITY AND CRITICAL
INFRASTRUCTURE PROTECTION POLICY 1
1 Origins of Critical Infrastructure Protection 3
1.1 Recognition, 4
1.2 Natural Disaster Recovery, 5
1.3 Definitional Phase, 7
1.4 Public-Private Cooperation, 9
1.5 Federalism: Whole of Government, 10
1.6 Infrastructure Protection within DHS, 11
1.7 Implementing a Risk Strategy, 12
1.7.1 Risk-Informed Decision-Making, 12
1.7.2 Resilience-Informed Decision-Making, 14
1.7.3 Prevention or Response? 15
1.8 Analysis, 16
1.8.1 The PPP Conundrum, 17
1.8.2 The Information-Sharing Conundrum, 17
1.8.3 Climate Change Conundrum, 17
1.8.4 The Funding Conundrum, 17
1.8.5 Spend80%on20%oftheCountry, 18
1.9 Exercises, 18
References, 19
PART II THEORY AND FOUNDATIONS 21
2 Risk Strategies 23
2.1 EUT, 25
2.1.1 Threat-Asset Pairs, 25
2.2 PRA and Fault Trees, 27
2.2.1 An Example: Your Car, 27
vi CONTENTS
2.3 MBRA and Resource Allocation, 28
2.3.1 Another Example: Redundant Power, 29
2.4 PRA in the Supply Chain, 31
2.5 Protection versus Response, 31
2.6 Threat is an Output, 32
2.7 Bayesian Belief Networks, 33
2.8 A BN for Threat, 33
2.9 Risk of a Natural Disaster, 34
2.10 Earthquakes, 35
2.11 Black Swans and Risk, 36
2.12 Black Swan Floods, 36
2.13 Are Natural Disasters Getting Worse? 37
2.14 Black Swan AI Qaeda Attacks, 37
2.15 Black Swan Pandemic, 38
2.16 Risk and Resilience, 40
2.17 Exercises, 41
References, 42
3 Theories of Catastrophe 43
3.1 NAT, 44
3.2 Blocks and Springs, 46
3.3 Bak s Punctuated Equilibrium Theory, 47
3.4 TOC, 50
3.4.1 The State Space Diagram, 51
3.5 The U.S. Electric Power Grid, 52
3.6 POE, 53
3.6.1 The Great Recessions, 55
3.6.2 Too Much Money, 55
3.7 Competitive Exclusion, 56
3.7.1 Gause sLaw, 57
3.7.2 The Self-Organizing Internet, 57
3.7.3 A Monoculture, 58
3.8 POR, 58
3.9 Resilience of Complex Infrastructure Systems, 59
3.9.1 Expected Utility and Risk, 59
3.9.2 SOC, 59
3.9.3 TOC, 60
3.9.4 POE and nonlinearity, 60
3.9.5 CEP and loss of redundancy, 60
3.9.6 POR and percolation, 61
3.10 Emergence, 61
3.10.1 Opposing Forces in Emergent CIKR, 61
3.11 Exercises, 62
References, 63
4 Complex CIKR Systems 64
4.1 CIKR as Networks, 66
4.1.1 Emergence, 67
4.1.2 Classesof CIKR Networks, 71
4.1.3 Self-Organized Networks, 71
4.2 Cascading CIKR Systems, 73
4.2.1 The Fundamental Resilience Equation, 75
4.2.2 Targeted Attacks, 77
4.3 Network Flow Resilience, 79
CONTENTS
4.4 Paradox of Redundancy, 80
4.4.1 Link Percolation and Robustness, 80
4.4.2 Node Percolation and Robustness, 81
4.4.3 Blocking Nodes, 81
4.5 Network Risk, 83
4.5.1 Crude Oil and KeystoneXL, 84
4.5.2 MBRA Network Resource Allocation, 85
4.6 Exercises, 88
Reference, 89
PARTHI BSDIVIDUAL SECTORS 91
5 Communications 93
5.1 EarlyYears, 94
5.2 Regulatory Structure, 96
5.3 The Architecture of the Communication Sector, 98
5.3.1 Physical Infrastructure, 98
5.3.2 Wireless Networks, 99
5.3.3 Extraterrestrial Communication, 99
5.3.4 LESs, 100
5.3.5 Cellular Networks, 101
5.3.6 Generations, 101
5.3.7 Wi-Fi Technology, 102
5.4 Risk Analysis, 102
5.4.1 Importance of Carrier Hotels, 103
5.4.2 Network Analysis, 105
5.4.3 Flow Analysis, 107
5.4.4 Robustness, 107
5.4.5 HPMAttacks, 107
5.5 Cellular Network Threats, 108
5.5.1 Cyber Threats, 108
5.5.2 HPM-Like Threats, 108
5.5.3 Physical Threats, 109
5.6 Analysis, 109
5.7 Exercises, 109
References, 110
6 Internet 111
6.1 Internet as a Disruptive Technology, 113
6.2 The Autonomous System Network, 114
6.2.1 The AS500 Network, 114
6.3 Originsof TCP/IP, 116
6.3.1 DNS Basics, 117
6.4 Internet Standards, 118
6.4.1 Email, 118
6.4.2 TCP/IP, 118
6.5 Toward Commercialization, 119
6.6 The WWW, 120
6.7 Internet Governance, 121
6.7.1 IABandlETF, 121
6.7.2 ICANN Wars, 123
6.7.3 ISOC, 123
6.7.4 W3C, 124
6.7.5 A Final Example, 124
viii CONTENTS
6.8 Analysis, 126
6.9 Exercises, 126
References, 127
7 Cyber Threats 128
7.1 Script Kiddies and Black-Hats, 129
7.1.1 Script-Kiddies, 129
7.1.2 Black-Hats, 130
7.1.3 Weaponized Exploits, 130
7.2 Tools of the Trade, 130
7.2.1 The First Exploit, 131
7.2.2 TCP/IP Flaws, 132
7.2.3 Open Ports, 134
7.2.4 Buffer Overflow Exploits, 134
7.2.5 DDoSAttacks, 135
7.2.6 E-mail Exploits, 136
7.2.7 Flawed Application and System Software, 137
7.3 Botnets, 138
7.4 Cyber Risk Analysis, 138
7.5 Cyber Infrastructure Risk, 140
7.5.1 Blocking Node Analysis, 142
7.6 Analysis, 142
7.7 Exercises, 143
References, 144
8 Information Technology 145
8.1 Principles of IT Security, 146
8.2 Enterprise Systems, 147
8.2.1 Loss of Service, 147
8.2.2 Loss of Data, 147
8.2.3 Loss of Security, 148
8.3 Cyber Defense, 148
8.3.1 Authenticate Users, 149
8.3.2 TP, 149
8.3.3 Inside the DMZ, 150
8.4 Basics of Encryption, 151
8.4.1 DES, 152
8.4.2 3DES, 152
8.4.3 AES, 152
8.5 Asymmetrie Encryption, 153
8.5.1 Public Key Encryption, 154
8.6 RSA Illustrated, 156
8.7 PKI, 157
8.7.1 Definition of PKI, 157
8.7.2 Certificates, 157
8.8 Countermeasures, 159
8.9 Exercises, 161
References, 162
9 Cybersecurity Policy 163
9.1 A National Priority and a (Familiär) Call to Arms, 164
9.1.1 Infrastructure as Target: From Hypothetical Concern to a Growing Threat, 165
9.1.2 A Difficult Terrain: Convergence, Attribution, and the Production of Cyber Weapons, 166
CONTENTS
9.2 Rewriting Cybersecurity Policy: The Difficulty of Reform, 167
9.2.1 AFalse Start: The Cybersecurity Act of 2012, 167
9.2.2 EO 13636: Improving Critical Infrastructure Cybersecurity, 169
9.2.3 The MST Framework: The Peru and the Promise of Voluntary Standards, 169
9.2.4 ECS: The Possibilities and Limits of Information Sharing, 172
9.3 Cybersecurity, Critical Infrastructure, and Public Policy: An Ongoing—and Difficult—Evolution, 174
9.3.1 Policy Options: Looking Forward, 174
9.4 Exercises, 176
References, 176
10 Supervisory Control and Data Acquisition 179
10.1 What is SCADA? 180
10.2 SCADA versus Enterprise Computing Differences, 181
10.3 Common Threats, 182
10.4 Who is in Charge? 183
10.5 SCADA Everywhere, 184
10.6 SCADA Risk Analysis, 185
10.7 San Francisco Public Utilities Commission SCADA Redundancy, 189
10.7.1 Redundancy as a Resiliency Mechanism, 189
10.7.2 Risk Reduction and Resource Allocation, 191
10.8 Analysis, 192
10.9 Exercises, 194
11 Water and Water Treatment 195
11.1 From Germs to Terrorists, 196
11.1.1 SDWA, 197
11.1.2 The Water Information Sharing and Analysis Center, 197
11.2 Foundations: SDWA of 1974, 198
11.3 The Bioterrorism Act of 2002, 199
11.3.1 Is Water for Drinking?, 199
11.4 The Architecture of Water Systems, 200
11.4.1 The Law of the River, 200
11.5 The Hetch Hetchy Network, 201
11.5.1 Betweenness Analysis, 202
11.6 Cascade Analysis, 203
11.6.1 Multidimensional Analysis, 203
11.6.2 Blocking Nodes, 204
11.7 Hetch Hetchy Investment Strategies, 204
11.7.1 The Rational Actor Attacker, 205
11.8 Hetch Hetchy Threat Analysis, 207
11.8.1 Chem-Bio Threats, 208
11.8.2 Earthquake Threats, 209
11.8.3 Allocation to Harden Threat-Asset Pairs, 209
11.9 Analysis, 210
11.10 Exercises, 210
References, 212
12 Energy 213
12.1 Energy Fundamentals, 214
12.2 Regulatory Structure of the Energy Sector, 216
12.2.1 Evolution of Energy Regulation, 216
12.2.2 Other Regulation, 217
12.2.3 The Electric Sector ISAC, 217
x CONTENTS
12.3 Interdependent Coal, 218
12.3.1 Interdependency with Transportation, 218
12.4 The RiseofOil and the Automobile, 218
12.4.1 Oil, 219
12.4.2 NG, 220
12.5 Energy Supply Chains, 220
12.5.1 Petroleum Administration for Defense Districts, 221
12.5.2 Refineries, 221
12.5.3 Transmission, 222
12.5.4 Transport4, 222
12.5.5 Storage, 223
12.5.6 NG Supply Chains, 223
12.5.7 SCADA, 223
12.6 The CriticalGulfof Mexico Cluster, 223
12.6.1 Refineries, 224
12.6.2 Transmission Pipelines, 226
12.6.3 Storage, 226
12.7 Threat Analysis of the Gulf of Mexico Supply Chain, 229
12.8 Network Analysis of the Gulf of Mexico Supply Chain, 230
12.9 The KeystoneXL Pipeline Controversy, 232
12.10 The NG Supply Chain, 232
12.11 Analysis, 234
12.12 Exercises, 234
References, 235
13 Electric Power 236
13.1 The Grid, 237
13.2 From Death Rays to Vertical Integration, 238
13.2.1 Early Regulation, 239
13.2.2 Deregulation and EPACT 1992, 240
13.2.3 Energy Sector ISAC, 241
13.3 Out of Orders 888 and 889 Comes Chaos, 241
13.3.1 Economics versus Physics, 243
13.3.2 Betweenness Increases SOC, 244
13.4 The North American Grid, 244
13.4.1 ACE and Kirchhoff s Law, 245
13.5 Anatomy of a Blackout, 246
13.5.1 What Happened on August 14th, 2003, 248
13.6 Threat Analysis, 249
13.6.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants, 249
13.6.2 Attack Scenario 2: Destruction of Major Transformers, 250
13.6.3 Attack Scenario 3: Disruption of SCADA Communications, 250
13.6.4 Attack Scenario 4: Creation of a Cascading Transmission Failure, 250
13.7 Risk Analysis, 251
13.8 Analysis ofWECC, 252
13.9 Analysis, 254
13.10 Exercises, 255
References, 257
14 Healthcare and Public Health 258
14.1 The Sector Plan, 259
14.2 Roemer s Model, 260
14.2.1 Componentsof Roemer s Model, 261
CONTENTS
14.3 The Complexityof Public Health, 262
14.4 Risk Analysis ofHPHSector, 263
14.5 Bioterrorism, 263
14.5.1 Classification of Biological Agents, 263
14.6 Epidemiology, 266
14.6.1 The Kermack-McKendrick Model, 266
14.6.2 SARS, 267
14.7 Predicting Pandemics, 267
14.7.1 The Levy Flight Theory of Pandemics, 269
14.8 Biosurveillance, 270
14.8.1 Healthmap, 270
14.8.2 Big Data, 270
14.8.3 GeoSentinel, 271
14.9 Network Pandemics, 272
14.10 The World Travel Network, 273
14.11 Exercises, 274
References, 276
15 Transportation 277
15.1 Transportation under Transformation, 279
15.2 The Road to Prosperity, 281
15.2.1 Economic Impact, 282
15.2.2 TheNHS, 282
15.2.3 The Interstate Highway Network is Resilient, 283
15.3 Rail, 284
15.3.1 Birthof Regulation, 285
15.3.2 Freight Trains, 286
15.3.3 Passenger Rail, 286
15.3.4 Commuter Rail Resiliency, 286
15.4 Air, 288
15.4.1 Resilience of the Hub-and-Spoke Network, 289
15.4.2 Security of Commercial Air Travel, 291
15.4.3 How Safe and Secure is Flying?, 292
15.5 Airport Games, 292
15.5.1 GUARDS, 292
15.5.2 Bayesian Belief Networks, 293
15.6 Exercises, 294
References, 295
16 Supply Chains 296
16.1 The World is Fiat but Tilted, 297
16.1.1 Supply Side Supply Chains, 298
16.1.2 The Father of Containerization, 299
16.1.3 The Perus ofEfficient Supply Chains, 299
16.2 TheWTW, 301
16.2.1 Economic Contagions, 301
16.3 Risk Assessment, 304
16.3.1 MSRAM, 305
16.3.2 PROTECT, 306
16.4 Analysis, 307
16.5 Exercises, 308
References, 308
xii CONTENTS
17 Banking and Finance 310
17.1 The Financial System, 312
17.1.1 Federal Reserve versus U.S. Treasury, 313
17.1.2 Operating the System, 314
17.1.3 Balancing the Balance Sheet, 314
17.1.4 Paradox of Enrichment, 315
17.2 Financial Networks, 316
17.2.1 FedWire, 316
17.2.2 TARGET, 317
17.2.3 SWIFT, 317
17.2.4 Credit Card Networks, 317
17.2.5 3-D Secure Payment, 318
17.3 Virtual Currency, 318
17.4 Hacking the Financial Network, 320
17.5 HotMoney, 320
17.5.1 The Dutch Disease, 323
17.6 The End of Stimulus?, 323
17.7 Fractal Markets, 323
17.7.1 EMH, 324
17.7.2 FMH, 325
17.7.3 Predicting Collapse, 326
17.8 Exercises, 327
References, 329
Appendix A: Math: Probability Primer 330
A.l A Priori Probability, 330
A.2 A Posteriori Probability, 332
A.3 Random Networks, 334
A.4 Conditional Probability, 334
A.5 Bayesian Networks, 335
A.6 Bayesian Reasoning, 336
References, 338
Further Reading, 338
Appendix B: Math: Risk and Resilience 340
B.l EUT, 340
B.l.l Fault Trees, 340
B.l.2 FaultTree Minimization, 342
B.1.3 XOR Fault Tree Allocation Algorithm, 342
B.2 Bayesian Estimation, 342
B.2.1 Bayesian Networks, 343
B.3 Exceedence Probability and Probable Maximum Loss Risk, 344
B.3.1 ModelingEP, 345
B.3.2 Estimating EP from Data, 345
B.3.3 How to Process Time-Series Data, 346
B.4 Network Risk, 347
B.5 MBRA, 349
B.5.1 Network Resource Allocation, 350
B.5.2 Simulation, 352
B.5.3 Cascade Risk, 353
B.5.4 Flow Risk, 353
References, 353
CONTENTS
Appendix C: Math: Spectral Radius 355
C.l Network as Matrix, 355
C.2 Matrix Diagonalization, 355
C.3 Relationship to Risk and Resilience, 357
C.3.1 Equation 1, 357
C.3.2 Equation 2, 358
Appendix D: Math: Tragedy of the Commons 359
D.l Lotka-Volterra Model, 359
D.2 Hopf-Holling Model, 359
Appendix E: Glossary 361
Index 363
|
any_adam_object | 1 |
author | Lewis, T. G. 1941- |
author_GND | (DE-588)109078675 |
author_facet | Lewis, T. G. 1941- |
author_role | aut |
author_sort | Lewis, T. G. 1941- |
author_variant | t g l tg tgl |
building | Verbundindex |
bvnumber | BV042605891 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ZG 9240 |
ctrlnum | (OCoLC)915678031 (DE-599)BVBBV042605891 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Technik Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02427nam a2200613 c 4500</leader><controlfield tag="001">BV042605891</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150706 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">150609s2015 xxuabd| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">014018628</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118817636</subfield><subfield code="9">978-1-118-81763-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)915678031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042605891</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZG 9240</subfield><subfield code="0">(DE-625)156053:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lewis, T. G.</subfield><subfield code="d">1941-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)109078675</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical infrastructure protection in homeland security</subfield><subfield code="b">defending a networked nation</subfield><subfield code="c">Ted G. Lewis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 376 S.</subfield><subfield code="b">Ill., graph. Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield><subfield code="x">Planning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public utilities</subfield><subfield code="x">Protection</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Internationaler Terrorismus</subfield><subfield code="0">(DE-588)4162078-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028038859&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028038859</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV042605891 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:15:39Z |
institution | BVB |
isbn | 9781118817636 |
language | English |
lccn | 014018628 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028038859 |
oclc_num | 915678031 |
open_access_boolean | |
owner | DE-83 DE-706 |
owner_facet | DE-83 DE-706 |
physical | XIX, 376 S. Ill., graph. Darst., Kt. |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spellingShingle | Lewis, T. G. 1941- Critical infrastructure protection in homeland security defending a networked nation Politik Terrorismus Computer networks Security measures United States Computer security United States Planning Terrorism United States Prevention Terrorism Government policy United States Civil defense United States Public utilities Protection United States Internationaler Terrorismus (DE-588)4162078-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Eindringerkennung (DE-588)4706627-1 gnd Bekämpfung (DE-588)4112701-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
subject_GND | (DE-588)4162078-1 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4706627-1 (DE-588)4112701-8 (DE-588)4127888-4 |
title | Critical infrastructure protection in homeland security defending a networked nation |
title_auth | Critical infrastructure protection in homeland security defending a networked nation |
title_exact_search | Critical infrastructure protection in homeland security defending a networked nation |
title_full | Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis |
title_fullStr | Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis |
title_full_unstemmed | Critical infrastructure protection in homeland security defending a networked nation Ted G. Lewis |
title_short | Critical infrastructure protection in homeland security |
title_sort | critical infrastructure protection in homeland security defending a networked nation |
title_sub | defending a networked nation |
topic | Politik Terrorismus Computer networks Security measures United States Computer security United States Planning Terrorism United States Prevention Terrorism Government policy United States Civil defense United States Public utilities Protection United States Internationaler Terrorismus (DE-588)4162078-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Eindringerkennung (DE-588)4706627-1 gnd Bekämpfung (DE-588)4112701-8 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
topic_facet | Politik Terrorismus Computer networks Security measures United States Computer security United States Planning Terrorism United States Prevention Terrorism Government policy United States Civil defense United States Public utilities Protection United States Internationaler Terrorismus Rechnernetz Computersicherheit Eindringerkennung Bekämpfung Innere Sicherheit USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028038859&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lewistg criticalinfrastructureprotectioninhomelandsecuritydefendinganetworkednation |