|
|
|||
|
||||
OverviewCritical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008. Full Product DetailsAuthor: Mauricio Papa , Sujeet ShenoiPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of hardcover 1st ed. 2008 Volume: 290 Dimensions: Width: 15.50cm , Height: 1.50cm , Length: 23.50cm Weight: 0.457kg ISBN: 9781441946959ISBN 10: 1441946950 Pages: 278 Publication Date: 25 November 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of print, replaced by POD We will order this item for you from a manufatured on demand supplier. Table of ContentsThemes And Issues.- Emergent Risks In Critical Infrastructures.- Cyberspace Policy For Critical Infrastructures.- Infrastructure Security.- Security Assessment Of A Turbo-Gas Power Plant.- Detecting Cyber Attacks On Nuclear Power Plants.- Control Systems Security.- Applying Trusted Network Technology To Process Control Systems.- Towards A Taxonomy Of Attacks Against Energy Control Systems.- Attribution Of Cyber Attacks On Process Control Systems.- Modeling And Detecting Anomalies In Scada Systems.- Assessing The Integrity Of Field Devices In Modbus Networks.- Designing Security-Hardened Microkernels For Field Devices.- Combating Memory Corruption Attacks On Scada Devices.- Mitigating Accidents In Oil And Gas Production Facilities.- Security Strategies.- Automated Assessment Of Compliance With Security Best Practices.- Collaborative Access Control For Critical Infrastructures.- Infrastructure Interdependencies.- Modeling Dependencies In Critical Infrastructures.- Metrics For Quantifying Interdependencies.- An Integrated Approach For Simulating Interdependencies.- Infrastructure Modeling And Simulation.- Simulation Of Advanced Train Control Systems.- An Integrated Methodology For Critical Infrastructure Modeling And Simulation.- Using 3D Models And Discrete Simulations In Infrastructure Security Applications.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |