It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 09055cam 2200985Ii 4500
001 ocn868638991
003 OCoLC
005 20220331043747.0
008 140121t20132013gw a ob 100 0 eng d
006 m o d
007 cr |||||||||||
040 $aDKDLA$beng$erda$epn$cDKDLA$dOCLCO$dSFB$dGZM$dGW5XE$dOHS$dZMC$dUKMGB$dOCLCO$dOCLCF$dCOO$dYDXCP$dOCL$dOCLCO$dEBLCP$dOCLCQ$dOCLCO$dOCLCQ$dOCLCO$dDIBIB$dOCLCO$dDGU$dZ5A$dESU$dOCLCQ$dIOG$dOCLCO$dNJR$dOCLCA$dBUF$dOCLCO$dCEF$dOCLCQ$dU3W$dAU@$dOCLCO$dWYU$dOCLCA$dYOU$dOCLCA$dTKN$dOL$$dOCLCQ$dUKAHL$dOCLCO
016 7 $a016607349$2Uk
020 $a9783642453304$q(electronic bk.)
020 $a3642453309$q(electronic bk.)
020 $a3642453295$q(print)
020 $a9783642453298$q(print)
020 $z9783642453298
024 8 $a10.1007/978-3-642-45330-4
035 $a(OCoLC)868638991
050 4 $aQA76.9.A25
060 4 $aQA76.9.A25
082 04 $a005.8$223
111 2 $aIFIP Working Group 11.10 International Conference on Critical Infrastructure Protection$n(7th :$d2013 :$cWashington, D.C.)
245 10 $aCritical infrastructure protection VII :$b7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, revised selected papers /$cJonathan Butts, Sujeet Shenoi (eds.).
246 30 $a7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, revised selected papers
264 1 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg :$bImprint :$bSpringer,$c2013.
264 4 $c©2013
300 $a1 online resource (xvi, 227 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
490 1 $aIFIP advances in information and communication technology,$x1868-4238 ;$v417
504 $aIncludes bibliographical references.
505 00 $tThemes and Issues.$tPolitical and Economic Implications of Authoritarian Control of the Internet /$rDaniel Arnaudo, Aaron Alva, Phillip Wood, Jan Whittington --$tData Handling in the Smart Grid: Do We Know Enough? /$rRichard Chow, Alvaro Cardenas, Emiliano De Cristofaro --$tControl Systems Security.$tDesign and Implementation of Industrial Control System Emulators /$rRobert Jaromin, Barry Mullins, Jonathan Butts, Juan Lopez --$tZigBee Device Verification for Securing Industrial Control and Building Automation Systems /$rClay Dubendorfer, Benjamin Ramsey, Michael Temple --$tDefensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks /$rBenjamin Ramsey, Barry Mullins --$tA Distributed Real-Time Event Correlation Architecture for SCADA Security /$rYi Deng, Sandeep Shukla --$tInfrastructure Security.$tProtecting Infrastructure Assets from Real-Time and Run-Time Threats /$rJonathan Jenkins, Mike Burmester --$tAnomaly Detection in Liquid Pipelines Using Modeling, Co-Simulation and Dynamical Estimation /$rSaed Alajlouni, Vittal Rao --$tFactors Impacting Attacker Decision-Making in Power Grid Cyber Attacks /$rAunshul Rege --$tTimely Delivery of Messages in Positive Train Control /$rAndre Bondi, Damindra Bandara, Michael Smith [and others] --$tInfrastructure Modeling and Simulation.$tModeling Service Migration and Relocation in Mission-Critical Systems /$rYanjun Zuo --$tCascading Effects of Common-Cause Failures in Critical Infrastructures /$rPanayiotis Kotzanikolaou, Marianthi Theoharidou, Dimitris Gritzalis --$tA Platform for Disaster Response Planning with Interdependency Simulation Functionality /$rAbdullah Alsubaie, Antonio Di Pietro, Jose Marti [and others] --$tRisk Assessment.$tMission-Based Analysis for Assessing Cyber Risk in Critical Infrastructure Systems /$rThomas Llanso, Gregg Tally, Michael Silberglitt, Tara Anderson --$tAssessing the Impact of Cyber Attacks on Interdependent Physical Systems /$rAntonio Di Pietro, Chiara Foglietta, Simone Palmieri, Stefano Panzieri.
520 8 $aThe information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection VII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure security; infrastructure modeling and simulation; and risk assessment. This book is the seventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fifteen edited papers from the Seventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at George Washington University, Washington, DC, USA in the spring of 2013. Critical Infrastructure Protection VII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
650 0 $aComputer security$vCongresses.
650 0 $aComputer science.
650 0 $aData protection.
650 0 $aComputers$xLaw and legislation.
650 0 $aComputer security.
650 2 $aComputer Security
650 2 $aComputers$xorganization & administration
650 2 $aComputers$xlegislation & jurisprudence
650 2 $aElectronic Data Processing
650 6 $aSécurité informatique$vCongrès.
650 6 $aInformatique.
650 6 $aProtection de l'information (Informatique)
650 6 $aSécurité informatique.
650 7 $aComputer science.$2fast$0(OCoLC)fst00872451
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aComputers$xLaw and legislation.$2fast$0(OCoLC)fst00872821
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
655 2 $aCongress
655 4 $aEbook.
655 4 $aElectronic books.
655 7 $aConference papers and proceedings.$2fast$0(OCoLC)fst01423772
655 7 $aConference papers and proceedings.$2lcgft
655 7 $aActes de congrès.$2rvmgf
700 1 $aButts, Jonathan,$eeditor.
700 1 $aShenoi, Sujeet,$eeditor.
776 08 $iPrinted edition:$z9783642453298
830 0 $aIFIP advances in information and communication technology ;$v417.$x1868-4238
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=3091963
856 40 $3Scholars Portal$uhttp://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2014-05-07/1/9783642453304
856 40 $3Scholars Portal Books$uhttp://www.library.yorku.ca/e/resolver/id/2548593
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-3-642-45330-4
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-3-642-45330-4$aSpringerLink
856 40 $3SpringerLink$uhttp://link.springer.com/openurl?genre=book&isbn=978-3-642-45329-8
856 40 $3SpringerLink$uhttp://link.springer.com/10.1007/978-3-642-45330-4
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-642-45330-4
856 40 $3SpringerLink$uhttp://www.library.yorku.ca/e/resolver/id/2548594
856 40 $uhttps://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-642-45330-4$zConnect to Springer e-book
856 40 $uhttps://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642453304
938 $aAskews and Holts Library Services$bASKH$nAH29497238
938 $aProQuest Ebook Central$bEBLB$nEBL3091963
938 $aYBP Library Services$bYANK$n11561259
029 1 $aAU@$b000057656529
029 1 $aDKDLA$b820120-katalog:000661614
029 1 $aNLGGC$b37461962X
029 1 $aNZ1$b15569139
029 1 $aNZ1$b15738186
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 339 OTHER HOLDINGS