Listing 1 - 3 of 3 |
Sort by
|
Choose an application
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection V describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, and Infrastructure Modeling and Simulation. This book is the 5th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 14 edited papers from the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2011. Critical Infrastructure Protection V is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Computer networks --- Computer security --- Information networks --- Cyberinfrastructure --- Security measures --- Cyber-based information systems --- Cyber-infrastructure --- Automated information networks --- Networks, Information --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- Information services --- Information storage and retrieval systems --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Civilization and computers --- Civilization --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Communication systems --- Data protection. --- Cryptography. --- Data and Information Security. --- IT Operations. --- Computer and Information Systems Applications. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Information networks -- Security measures -- Congresses. --- Computer networks --- Computer security --- Information networks --- Cyberinfrastructure --- Computer Science --- Telecommunications --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Computer science. --- Computer programming. --- Data structures (Computer science). --- Coding theory. --- User interfaces (Computer systems). --- Management information systems. --- Computer Science. --- Programming Techniques. --- Coding and Information Theory. --- User Interfaces and Human Computer Interaction. --- Data Structures, Cryptology and Information Theory. --- Management of Computing and Information Systems. --- Computer Science, general. --- Data structures (Computer scienc. --- Information Systems. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Informatics --- Science --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems --- Programming --- Cyber-based information systems --- Cyber-infrastructure --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Automated information networks --- Networks, Information --- Information services --- Information storage and retrieval systems --- Distributed processing --- Human-computer interaction. --- IT Operations. --- Management. --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems)
Choose an application
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection IV, is the fourth volume in the annual series produced by IFIP Working Group 11.10 on Critical Infr- tructure Protection, an active international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at the National Defense University, Washington, DC, March 15– 17, 2010. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure prot- tion.
Computer networks --- Computer security --- Information networks --- Cyberinfrastructure --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Cyberterrorism --- Automated information networks --- Networks, Information --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Computer science. --- Computer programming. --- Data structures (Computer science). --- Coding theory. --- Computers. --- Management information systems. --- Computer engineering. --- Computer Science. --- Programming Techniques. --- Theory of Computation. --- Computer Engineering. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Management of Computing and Information Systems. --- Information services --- Information storage and retrieval systems --- Computer crimes --- Terrorism --- Information theory. --- Data structures (Computer scienc. --- Information Systems. --- Data Structures and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication theory --- Communication --- Cybernetics --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems --- Design and construction --- Programming --- Computer networks. --- Computer Engineering and Networks. --- IT Operations. --- Management. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Network computers --- Distributed processing
Listing 1 - 3 of 3 |
Sort by
|