Cargando…

Critical Infrastructure Protection II

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, eme...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Papa, Mauricio (Editor ), Shenoi, Sujeet (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer US : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:IFIP Advances in Information and Communication Technology, 290
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Themes And Issues
  • Emergent Risks In Critical Infrastructures
  • Cyberspace Policy For Critical Infrastructures
  • Infrastructure Security
  • Security Assessment Of A Turbo-Gas Power Plant
  • Detecting Cyber Attacks On Nuclear Power Plants
  • Control Systems Security
  • Applying Trusted Network Technology To Process Control Systems
  • Towards A Taxonomy Of Attacks Against Energy Control Systems
  • Attribution Of Cyber Attacks On Process Control Systems
  • Modeling And Detecting Anomalies In Scada Systems
  • Assessing The Integrity Of Field Devices In Modbus Networks
  • Designing Security-Hardened Microkernels For Field Devices
  • Combating Memory Corruption Attacks On Scada Devices
  • Mitigating Accidents In Oil And Gas Production Facilities
  • Security Strategies
  • Automated Assessment Of Compliance With Security Best Practices
  • Collaborative Access Control For Critical Infrastructures
  • Infrastructure Interdependencies
  • Modeling Dependencies In Critical Infrastructures
  • Metrics For Quantifying Interdependencies
  • An Integrated Approach For Simulating Interdependencies
  • Infrastructure Modeling And Simulation
  • Simulation Of Advanced Train Control Systems
  • An Integrated Methodology For Critical Infrastructure Modeling And Simulation
  • Using 3D Models And Discrete Simulations In Infrastructure Security Applications.