Critical Infrastructure Protection Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense / [electronic resource] :
edited by Javier Lopez, Roberto Setola, Stephen Wolthusen.
- 1st ed. 2012.
- XIV, 357 p. online resource.
- Security and Cryptology, 7130 2946-1863 ; .
- Security and Cryptology, 7130 .
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.
9783642289200
10.1007/978-3-642-28920-0 doi
Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Algorithms.
Application software.
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Algorithms.
Computer and Information Systems Applications.
QA76.9.A25
005.8
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.
9783642289200
10.1007/978-3-642-28920-0 doi
Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Algorithms.
Application software.
Data and Information Security.
IT Operations.
Cryptology.
Computers and Society.
Algorithms.
Computer and Information Systems Applications.
QA76.9.A25
005.8