Unavailable
Unavailable
Unavailable
Ebook488 pages10 hours
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
By Ted G. Lewis
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
A scientific approach to the new field of critical infrastructureprotection
This book offers a unique scientific approach to the new field ofcritical infrastructure protection: it uses network theory,optimization theory, and simulation software to analyze andunderstand how infrastructure sectors evolve, where they arevulnerable, and how they can best be protected. The authordemonstrates that infrastructure sectors as diverse as water,power, energy, telecommunications, and the Internet have remarkablysimilar structures. This observation leads to a rigorous approachto vulnerability analysis in all of these sectors. The analyst canthen decide the best way to allocate limited funds to minimizerisk, regardless of industry sector.
The key question addressed in this timely book is: What should beprotected and how? The author proposes that the answer lies inallocating a nation's scarce resources to the most criticalcomponents of each infra-structure--the so-called critical nodes.Using network theory as a foundation, readers learn how toidentifya small handful of critical nodes and then allocateresources to reduce or eliminate risk across the entiresector.
A comprehensive set of electronic media is provided on a CD-ROM inthe back of the book that supports in-class and self-tutoredinstruction. Students can copy these professionally producedaudio-video lectures onto a PC (Microsoft Windows(r) and AppleMacintosh(r) compatible) for repeated viewing at their own pace.Another unique feature of the book is the open-source software fordemonstrating concepts and streamlining the math needed forvulnerability analysis. Updates, as well as a discussion forum, areavailable from www.CHDS.us.
This book is essential for all corporate, government agency, andmilitary professionals tasked with assessingvulnerability anddeveloping and implementing protection systems. In addition, thebook is recommended for upper-level undergraduate and graduatestudents studying national security, computing, and otherdisciplines where infrastructure security is an issue.
This book offers a unique scientific approach to the new field ofcritical infrastructure protection: it uses network theory,optimization theory, and simulation software to analyze andunderstand how infrastructure sectors evolve, where they arevulnerable, and how they can best be protected. The authordemonstrates that infrastructure sectors as diverse as water,power, energy, telecommunications, and the Internet have remarkablysimilar structures. This observation leads to a rigorous approachto vulnerability analysis in all of these sectors. The analyst canthen decide the best way to allocate limited funds to minimizerisk, regardless of industry sector.
The key question addressed in this timely book is: What should beprotected and how? The author proposes that the answer lies inallocating a nation's scarce resources to the most criticalcomponents of each infra-structure--the so-called critical nodes.Using network theory as a foundation, readers learn how toidentifya small handful of critical nodes and then allocateresources to reduce or eliminate risk across the entiresector.
A comprehensive set of electronic media is provided on a CD-ROM inthe back of the book that supports in-class and self-tutoredinstruction. Students can copy these professionally producedaudio-video lectures onto a PC (Microsoft Windows(r) and AppleMacintosh(r) compatible) for repeated viewing at their own pace.Another unique feature of the book is the open-source software fordemonstrating concepts and streamlining the math needed forvulnerability analysis. Updates, as well as a discussion forum, areavailable from www.CHDS.us.
This book is essential for all corporate, government agency, andmilitary professionals tasked with assessingvulnerability anddeveloping and implementing protection systems. In addition, thebook is recommended for upper-level undergraduate and graduatestudents studying national security, computing, and otherdisciplines where infrastructure security is an issue.
Unavailable
Related to Critical Infrastructure Protection in Homeland Security
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5
Reviews for Critical Infrastructure Protection in Homeland Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews