Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
" ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
John Wiley & Sons
2014
|
Ausgabe: | 2nd edition. |
Links: | https://learning.oreilly.com/library/view/-/9781118817667/?ar |
Zusammenfassung: | " ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but it should be equally valuable for current practitioners ... this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices. |
Umfang: | 1 Online-Ressource (400 Seiten) |
ISBN: | 9781118817667 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-108526151 | ||
003 | DE-627-1 | ||
005 | 20241001123224.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241001s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781118817667 |9 978-1-118-81766-7 | ||
035 | |a (DE-627-1)108526151 | ||
035 | |a (DE-599)KEP108526151 | ||
035 | |a (ORHE)9781118817667 | ||
035 | |a (DE-627-1)108526151 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Lewis, Ted |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Critical Infrastructure Protection in Homeland Security |b Defending a Networked Nation, 2nd Edition |c Lewis, Ted |
250 | |a 2nd edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b John Wiley & Sons |c 2014 | |
300 | |a 1 Online-Ressource (400 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a " ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but it should be equally valuable for current practitioners ... this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices. | ||
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118817667/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-108526151 |
---|---|
_version_ | 1821494927155003392 |
adam_text | |
any_adam_object | |
author | Lewis, Ted |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | Lewis, Ted Safari, an O'Reilly Media Company |
author_role | aut |
author_sort | Lewis, Ted |
author_variant | t l tl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)108526151 (DE-599)KEP108526151 (ORHE)9781118817667 |
edition | 2nd edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02523nam a22003252 4500</leader><controlfield tag="001">ZDB-30-ORH-108526151</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123224.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118817667</subfield><subfield code="9">978-1-118-81766-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108526151</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108526151</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118817667</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108526151</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lewis, Ted</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical Infrastructure Protection in Homeland Security</subfield><subfield code="b">Defending a Networked Nation, 2nd Edition</subfield><subfield code="c">Lewis, Ted</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (400 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">" ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but it should be equally valuable for current practitioners ... this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118817667/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-108526151 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:09Z |
institution | BVB |
isbn | 9781118817667 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (400 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Lewis, Ted VerfasserIn aut Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition Lewis, Ted 2nd edition. [Erscheinungsort nicht ermittelbar] John Wiley & Sons 2014 1 Online-Ressource (400 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier " ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but it should be equally valuable for current practitioners ... this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices. Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | Lewis, Ted Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition |
title | Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition |
title_auth | Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition |
title_exact_search | Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition |
title_full | Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition Lewis, Ted |
title_fullStr | Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition Lewis, Ted |
title_full_unstemmed | Critical Infrastructure Protection in Homeland Security Defending a Networked Nation, 2nd Edition Lewis, Ted |
title_short | Critical Infrastructure Protection in Homeland Security |
title_sort | critical infrastructure protection in homeland security defending a networked nation 2nd edition |
title_sub | Defending a Networked Nation, 2nd Edition |
work_keys_str_mv | AT lewisted criticalinfrastructureprotectioninhomelandsecuritydefendinganetworkednation2ndedition AT safarianoreillymediacompany criticalinfrastructureprotectioninhomelandsecuritydefendinganetworkednation2ndedition |