A scientific approach to the new field of critical infrastructure protection
This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector.
The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure--the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector.
A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows(r) and Apple Macintosh(r) compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us.
This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue.
"synopsis" may belong to another edition of this title.
TED G. LEWIS, PHD, is Professor of Computer Science and Academic Associate of the Homeland Defense and Security curriculum at the Naval Postgraduate School. Dr. Lewis is the former senior vice president of Digital Development for Eastman Kodak.
A scientific approach to the new field of critical infrastructure protection
This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector.
The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector.
A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows® and Apple Macintosh® compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us.
This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue.
"About this title" may belong to another edition of this title.
Seller: Your Online Bookstore, Houston, TX, U.S.A.
hardcover. Condition: Good. Seller Inventory # 0471786284-3-35793224
Seller: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00071874005
Seller: ThriftBooks-Phoenix, Phoenix, AZ, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471786284I4N00
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471786284I4N00
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471786284I4N00
Seller: ThriftBooks-Reno, Reno, NV, U.S.A.
Hardcover. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471786284I4N00
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471786284I3N00
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Hardcover. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Seller Inventory # G0471786284I3N00
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Har/Cdr. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Seller Inventory # 6198238-6
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Har/Cdr. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Seller Inventory # 11100923-6