|
|
|
|
LEADER |
02856nam a22005775i 4500 |
001 |
978-3-642-28920-0 |
003 |
DE-He213 |
005 |
20151204173252.0 |
007 |
cr nn 008mamaa |
008 |
120315s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642289200
|9 978-3-642-28920-0
|
024 |
7 |
|
|a 10.1007/978-3-642-28920-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Critical Infrastructure Protection
|h [electronic resource] :
|b Information Infrastructure Models, Analysis, and Defense /
|c edited by Javier Lopez, Roberto Setola, Stephen D. Wolthusen.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2012.
|
300 |
|
|
|a XIV, 357 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7130
|
520 |
|
|
|a The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
700 |
1 |
|
|a Lopez, Javier.
|e editor.
|
700 |
1 |
|
|a Setola, Roberto.
|e editor.
|
700 |
1 |
|
|a Wolthusen, Stephen D.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642289194
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7130
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28920-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|